Facing the Challenges of M2M Security and Privacy

Slides:



Advertisements
Similar presentations
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Advertisements

Cryptography and Network Security
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Pre-Shared Key TLS with GBA support Thesis presentation ESPOO, Finland.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
SEC Clarification Group Name: WG4 (SEC-2014-xxxx) Decision  Meeting Date: Discussion  Source: OBERTHUR Technologies Information  Contact:
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
A Survey of WAP Security Architecture Neil Daswani
Service Layer Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP16 Agenda Item:
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Session 4 – IoT data platform based on oneM2M Dr.
Credential Identifiers Group Name: SEC#14.2 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
TAKING A LOOK INSIDE Nicolas Damour
THE DICOM 2014 Chengdu Workshop August 25, 2014 Chengdu, China Keeping It Safe Brad Genereaux, Agfa HealthCare Product Manager Industry Co-Chair, DICOM.
Windows 2003 and 802.1x Secure Wireless Deployments.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Authors list to be completed.
Presentation of ETSI TC M2M security features Group Name: WG4 Securtity Source: Francois Ennesser, Gemalto Meeting Date: Agenda Item: SEC.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
On Persistent AE Identifiers Group Name: SEC#12.2 Source: Phil Hawkes, Qualcomm Inc (TIA), Francois Ennesser,
Authors list to be completed.
September, 2005What IHE Delivers 1 G. Claeys, Agfa Healthcare Audit Trail and Node Authentication.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Certificate Enrolment STEs Group Name: SEC#17.2 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
End-to-End security definition Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date:
Module 9: Fundamentals of Securing Network Communication.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Authorization for IoT Group Name: oneM2M SEC WG Source: Francois Ennesser, Gemalto NV Meeting Date: Agenda Item:
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
A Secure JBoss Platform Nicola Mezzetti Acknowledgments: F. Panzieri.
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
Certificate Enrolment STEs Group Name: SEC#17.3 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
Overview of analysis of existing SDO M2M architectures Group Name: REQ ARC#2 Source: Alcatel-Lucent.
Primitive End-to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting.
Certificate Enrolment STEs Group Name: SEC#18 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
IEEE MEDIA INDEPENDENT HANDOVER DCN: Sec Title: Considerations on use of TLS for MIH protection Date Submitted: January 14, 2010.
An introduction to oneM2M
OneM2M Challenges of M2M Security and Privacy
Interworking with an External Dynamic Authorization System Group Name: SEC WG Source: Qualcomm Inc., Wolfgang Granzow & Phil Hawkes Meeting Date: SEC#20.2,
Credential Identifiers Group Name: SEC#14.2 Source: Phil Hawkes, Qualcomm Inc, Meeting Date:
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
M2M Service Subscription Profile Discussion Group Name: oneM2M TP #19.2 Source: LG Electronics Meeting Date: Agenda Item:
3GPP GBA Overview Adrian Escott.
App and Management End- to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm,
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
Michael G. Williams, Jeremey Barrett 1 Intro to Mobi-D Host based mobility.
End-to-End Primitive Security: Challenges and Suggestions Group Name: SEC WG Source: Qualcomm Inc., Phil Hawkes, Wolfgang Granzow, Josef Blanz Meeting.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
COMPUTER NETWORKS Hwajung Lee. Image Source:
On-Boarding and Enrolment Group Name: SEC WG Source: Qualcomm Inc., Phil Hawkes, Wolfgang Granzow, Josef Blanz Meeting Date: SEC#22, Agenda.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Discussion on oneM2M and OSGi Interworking Group Name: ARC Source: Jessie, Huawei, Meeting Date: Agenda Item:
Lightweight security protocols for the IoT
Possible options of using DDS in oneM2M Group Name: ARC Source: KETI, Huawei, Hitachi, China Unicom Meeting Date: Agenda Item: DDS binding.
ONEM2M RELEASE 2: SETTING THE STANDARD FOR IOT INTEROPERABILITY
Resource subscription using DDS in oneM2M
[authenticationProfile] <mgmtObj> specialization
Ian Deakin, iconectiv 3rd July 2017
End-to-End Security for Primitives
Possible options of using DDS in oneM2M
MAF&MEF Interface Specification discussion of the next steps
Overview of E2E Security CRs
An introduction to oneM2M
Summary of the MAF and MEF Interface Specification TS-0032
Presentation transcript:

Facing the Challenges of M2M Security and Privacy Phil Hawkes Principal Engineer at Qualcomm Inc. phawkes@qti.qualcomm.com oneM2M www.oneM2M.org

Overview oneM2M Architecture: a quick review Challenges Solutions Large variety of scenarios Any device in any deployment A device cannot make autonomous “judgment calls” on privacy Solutions Secure communication Remote provisioning Access control policies Future Challenges

oneM2M Architecture: A Quick Review Entities Nodes (=Devices) Common Service Entity (CSE) Application Entity (AE) Interactions: Mca: AE-to-CSE Mcc, Mcc’: CSE-to-CSE RESTful For more info see webinar Taking a look inside oneM2M AE CSE CSE AE AE AE CSE CSE Field Domain AE Infrastructure Domain CSE CSE AE AE

Challenges Large variety of scenarios Any device in any deployment A device cannot make autonomous “judgment calls” on privacy

Challenges Large variety of deployments Any device in any deployment “Assets” that need protecting can be unique to a deployment Content confidentiality, content integrity, anonymity, traffic efficiency Environment can be unique to a deployment Does wired or wireless transport layer provide adequate security? Tamper-resistance considerations (Continued on next slide) Any device in any deployment A device cannot make autonomous “judgment calls” on privacy

Challenges Large variety of deployments (continued) Variety of authentication scenarios Pre-shared Key provisioned to both by end-points PKI/Certificates (asymmetric cryptography) Centralized authentication Any device in any deployment A device cannot make autonomous “judgment calls” on privacy

Challenges Large variety of deployment scenarios Any device in any deployment Interoperability: agree on minimal set of cipher suites Credential management Provisioning at manufacture Human-assisted provisioning during deployment e.g. manual entry, via USB Remote provisioning of fielded devices Derivation from pre-existing credentials (e.g. transport network) Note: a, b are enabled but not specified by oneM2M A device cannot make autonomous “judgment calls” on privacy

Challenges Large variety of scenarios Any device in any deployment A device cannot make autonomous “judgment calls” on privacy M2M/IoT may expose information about our lives without our awareness Privacy = who can access information about me CSE needs to determine: “Should I allow access?” Can’t ask human to make case-by-case judgment call CSE needs clear rules

Challenges & Solutions Large variety of scenarios Any device in any deployment A device cannot make “judgment calls” on privacy Secure communication various authentication options Remote provisioning Access Control Policies expresses wide variety of rules

Secure Communication: Example Field Domain Sensor Gateway AE1 CSE1 E-Health Web-application AE2 CSE2 M2M SP’s Server Web App Server Infrastructure Domain

Secure Communication: Example Field Domain CoAP UDP AE1 passes sensor reading to CSE1 Sensor Gateway AE1 CSE1 AE2 CSE2 M2M SP’s Server Web App Server Infrastructure Domain

Secure Communication: Example Field Domain CoAP UDP AE1 passes sensor reading to CSE1 CSE1 forwards sensor reading to CSE2 Sensor Gateway AE1 CSE1 HTTP TCP AE2 CSE2 M2M SP’s Server Web App Server Infrastructure Domain

Secure Communication: Example Field Domain CoAP UDP AE1 passes sensor reading to CSE1 CSE1 forwards sensor reading to CSE2 AE2 retrieves sensor reading from CSE2 Sensor Gateway AE1 CSE1 HTTP TCP AE2 CSE2 M2M SP’s Server Web App Server HTTP TCP Infrastructure Domain

Secure Communication Hop-by-Hop Transited CSEs see clear text Field Domain Hop-by-Hop Transited CSEs see clear text Trusted to behave Sensor Gateway AE1 CSE1 AE2 CSE2 M2M SP’s Server Web App Server Infrastructure Domain

Secure Communication Hop-by-Hop TLS/DTLS v1.2 DTLS if UDP transport Field Domain CoAP DTLS UDP Hop-by-Hop TLS/DTLS v1.2 DTLS if UDP transport Sensor Gateway AE1 CSE1 AE2 CSE2 M2M SP’s Server Web App Server Infrastructure Domain

Secure Communication Hop-by-Hop TLS/DTLS v1.2 DTLS if UDP transport Field Domain Hop-by-Hop TLS/DTLS v1.2 DTLS if UDP transport TLS if TCP transport Sometimes write (D)TLS or just TLS for both Sensor Gateway AE1 CSE1 HTTP TLS TCP AE2 CSE2 M2M SP’s Server Web App Server HTTP TLS TCP Infrastructure Domain

Secure Communication Hop-by-Hop TLS/DTLS v1.2 AE-CSE Field Domain Hop-by-Hop TLS/DTLS v1.2 AE-CSE AE: TLS Client (C) CSE: TLS Server (S) Sensor Gateway C S AE1 CSE1 C S AE2 CSE2 M2M SP’s Server Web App Server Infrastructure Domain

Secure Communication Hop-by-Hop TLS/DTLS v1.2 AE-CSE CSE-CSE Field Domain Hop-by-Hop TLS/DTLS v1.2 AE-CSE AE: TLS Client (C) CSE: TLS Server (S) CSE-CSE CSE1: TLS Client (C) CSE2: TLS Server (S) Sensor Gateway C S AE1 CSE1 C S C S AE2 CSE2 M2M SP’s Server Web App Server Infrastructure Domain

Authentication Options Pre-Shared Key (PSK) TLS Client & Server provisioned with a shared key# Certificate TLS Client & Server both have certificates M2M Authentication Function (MAF) MAF operated by 3rd Party or M2M Service Provider TLS Client and MAF provisioned with a shared key# MAF assists authentication of TLS Client & Server #This shared key can be remotely provisioned

Certificates Somewhat aligned with CoAP Security RFC7252 X.509/PKIX (RFC 5280) RawPublicKey Certificates Contains only X.509 SubjectPublicKeyInfo element Suits less complex deployments & debugging Certificates chaining to a trust anchor. E.g. Device Certificate (e.g. manufacturer issued) M2M SP issued certificate identifying CSE or AE

Remote Provisioning Process provisioning a shared key to two entities M2M Enrolment Function (MEF) Assists remote provisioning Operated by 3rd Party or M2M Service Provider Mechanisms for establishing shared key TLS Client & MEF perform (D)TLS, export shared key PSK Certificates Derived from Network Access credentials Network Access Provider assists in mutual authentication Generic Bootstrapping Architecture (GBA) 3GPP TS 33.220

Access Control Requirements oneM2M uses a RESTful architecture API: request to perform an operation on a resource Operations: Create, Retrieve, Update, Delete Webinar Taking a look inside oneM2M has more info CSEs can’t make resource access judgement calls CSE need clear rules dictating, for each resource WHO (which CSEs and AEs) are authorized to access, WHAT operations (see above), and under… WHICH circumstances (e.g. time, location of entity)

Access Control Policies (ACP) Resources links contains Resource1 ACP1 ACP Rule1 Resource2 Resource3 ACP2 ACP Rule2 Resource4 ACP3 ACP Rule3 Resource access is authorized upon satisfying at least one ACP rule in one of the linked ACPs

Access Control Policies (ACP) Resources links contains with conditions on Resource1 ACP1 ACP Rule1 WHO: entities CSE-ID AE-ID Resource2 WHAT: operations Create, Retrieve Update Delete Resource3 ACP2 ACP Rule2 WHICH: circumstances Time, location, IP address Resource4 ACP3 ACP Rule3 ACP rule is satisfied if WHO and WHAT and WHICH are satisfied by requesting entity, requested operation and circumstances

oneM2M Security Documents TR-0008 “Analysis of Security Solutions for the oneM2M System” http://onem2m.org/images/files/deliverables/oneM2M_TR-0008-Security-V1_0_0.doc TS-0003 “Security Solutions” http://onem2m.org/images/files/deliverables/TS-0003-Security_Solutions-V-2014-08.pdf Latest versions available from ftp://ftp.onem2m.org/Work%20Programme/WI0007/

Limitations of initial release A “minimum deployable solution” addressing short term needs Focus: Vertically deployed industrial applications Centralized client-server architectures Most devices have limited number of static connections Deployments are managed by skilled workforce Nodes are trusted to behave Our solutions meet these needs while having a place in future M2M/IoT (consumer) scenarios

Future Challenges Decentralization Technological Challenges: Increasingly complex interactions Sharing Information between deployments Complex authentication and authorization scenarios Confidentiality & integrity concerns Unskilled Consumers managing their “Things” Technological Challenges: End-to-End (multi-hop) message security Many connections per device Authentication & Authorization mechanisms

Conclusion: Challenges & Solutions Large variety of scenarios Any device in any deployment A device cannot make “judgment calls” on privacy Secure communication various authentication options Remote provisioning Access Control Policies expresses wide variety of rules

Join us for the next webinar “On Management, Abstraction & Semantics” by Dr. Yongjing Zhang Standard Research Project Lead at Huawei Technologies Co., Ltd 27 November 2014 at 0700 UTC http://www.onem2m.org/btchannel.cfm

Check out the recorded webinars “How standardization enables the next internet evolution” by Marc Jadoul Strategic Marketing Director, Alcatel-Lucent “Taking a look inside” by Nicolas Damour Senior Manager for Business and Innovation Development, Sierra Wireless http://www.onem2m.org/btchannel.cfm

Join us at the oneM2M showcase event OneM2M project partners, rationale and goals OneM2M Service Layer Specification release Showcase demos that demonstrate oneM2M “live" 9 December 2014, Sophia-Antipolis, France (free of charge, but online registration is required) http://www.onem2m.org/Showcase Followed by the ETSI M2M workshop

Q & A

Backup Slides

PSK-Based Authentication Client Server

Provision identical PSK, PSK-ID to A, B Client Server PSK, PSK-ID PSK, PSK-ID

PSK Client Server 2. TLS/DTLS A provides PSK-ID B identifies PSK from PSK-ID PSK, PSK-ID PSK, PSK-ID

PSK Client Server 2. (D)TLS A provides PSK-ID B identifies PSK from PSK-ID PSK, PSK-ID PSK, PSK-ID Advantages: Challenges: Simple Concept May need multiple keys provisioned Doesn’t scale well

PKI/Certificate-Based Authentication Client Server

PKI 1. Provision certificate 1’. Provision certificate Client Server Client’s Cert Server’s Cert Client Server

PKI 2. Configure trust anchors 2’. Configure trust anchors Client Client’s Cert Server’s Cert Client Server Client’s Trust Anchors Server’s Trust Anchors

PKI Client Server 2. (D)TLS Client’s Cert Server’s Cert Client Server Client’s Trust Anchors 2. (D)TLS Server’s Trust Anchors Validate server’s cert against client’s trust anchors Validate client cert against server’s trust anchors

MAF Assisted (D)TLS Client MAF (D)TLS Server

Provision symmetric key Km, KmId MAF Assisted Provision symmetric key Km, KmId (D)TLS Client MAF Km, KmID Km, KmId (D)TLS Server

2. Generate Kc, KcId from Km MAF Assisted 2. Generate Kc, KcId from Km (D)TLS Client MAF Km, KmID Km, KmId (D)TLS Server Kc, KcId Kc, KcId

MAF Assisted (D)TLS Client MAF (D)TLS Server 3a. (D)TLS: KcId Kc, KcId

MAF Assisted (D)TLS Client MAF (D)TLS Server 3a. (D)TLS: KcId 3b. KcId Kc, KcId Kc, KcId

MAF Assisted (D)TLS Client MAF (D)TLS Server 3a. (D)TLS: KcId 3b. KcId 3c. Kc Kc, KcId Kc, KcId Kc, KcId

MAF Assisted (D)TLS Client MAF (D)TLS Server 3a. (D)TLS: KcId 3b. KcId (D)TLS w/ Kc 3b. Kc Kc, KcId Kc, KcId Kc, KcId

Remote Provisioning PArticipants Process provisions a shared key to two entities M2M Enrolment Function (MEF) Assists remote provisioning Operated by 3rd Party or M2M Service Provider Enrolee Entity requesting to be provisioned Enrolment Target Other entity that will ends up with the shared key

Remote Provisioning M2M Enrolment Function Enrolee Enrolment Target

Mutual Authentication Remote Provisioning M2M Enrolment Function Enrolee Mutual Authentication Enrolment Target

Mutual Authentication Remote Provisioning M2M Enrolment Function Ke, KeId Ke, KeId Enrolee Mutual Authentication Generate Ke, KeId Generate Ke, KeId Enrolment Target

KeId in (D)TLS Handshake Remote Provisioning M2M Enrolment Function Ke, KeId Ke, KeId Enrolee KeId in (D)TLS Handshake Enrolment Target

KeId in (D)TLS Handshake Remote Provisioning M2M Enrolment Function Ke, KeId Ke, KeId Enrolee KeId in (D)TLS Handshake KeId Enrolment Target

KeId in (D)TLS Handshake Remote Provisioning M2M Enrolment Function Ke, KeId Ke, KeId Enrolee + Enrolment Target ID + Enrolment Target ID Shared Key Shared Key KeId in (D)TLS Handshake KeId Enrolment Target

KeId in (D)TLS Handshake Remote Provisioning M2M Enrolment Function Enrolee Shared Key Shared Key KeId in (D)TLS Handshake KeId Enrolment Target Shared Key

Complete (D)TLS using Shared Key to verify provisioning Remote Provisioning M2M Enrolment Function Enrolee Shared Key Complete (D)TLS using Shared Key to verify provisioning Enrolment Target Shared Key

GBA Network Access Authentication Server UE (HSS, HLR, AAA) Network Access Credentials Network Access Credentials Network Access Authentication Server (HSS, HLR, AAA) UE (hosts TLS Client) GBA Bootstrap Server Function (plays role of MEF) TLS Server

GBA Network Access Authentication Server UE (HSS, HLR, AAA) Network Access Credentials Network Access Credentials Network Access Authentication Server (HSS, HLR, AAA) UE (hosts TLS Client) GBA Bootstrap Server Function (plays role of MEF) TLS Server

GBA Network Access Authentication Server UE (HSS, HLR, AAA) Network Access Credentials Network Access Credentials Network Access Authentication Server (HSS, HLR, AAA) UE (hosts TLS Client) B-TID, Ks B-TID, Ks GBA Bootstrap Server Function (plays role of MEF) TLS Server

GBA Network Access Authentication Server UE (HSS, HLR, AAA) (hosts TLS Client) B-TID, Ks B-TID, Ks GBA Bootstrap Server Function (plays role of MEF) (D)TLS: B-TID TLS Server

GBA Network Access Authentication Server UE (HSS, HLR, AAA) (hosts TLS Client) B-TID, Ks B-TID, Ks GBA Bootstrap Server Function (plays role of MEF) (D)TLS: B-TID B-TID TLS Server

GBA Network Access Authentication Server UE (HSS, HLR, AAA) (hosts TLS Client) B-TID, Ks B-TID, Ks GBA Bootstrap Server Function (plays role of MEF) TLS Server FQDN (D)TLS: B-TID B-TID TLS Server Shared Key Shared Key

GBA Network Access Authentication Server UE (HSS, HLR, AAA) (hosts TLS Client) GBA Bootstrap Server Function (plays role of MEF) (D)TLS: B-TID B-TID TLS Server Shared Key Shared Key Shared Key Shared Key

GBA Network Access Authentication Server UE (HSS, HLR, AAA) (hosts TLS Client) GBA Bootstrap Server Function (plays role of MEF) (D)TLS: B-TID TLS Server Continue (D)TLS Shared Key Shared Key