Doc: IEEE 802. 15-15-0xxx-00-0008 Submission April 2015 Woongsoo Na, et al., Chung-Ang University Project: IEEE P802.15 Working Group for Wireless Personal.

Slides:



Advertisements
Similar presentations
Doc.: IEEE xxx Submission January 2015 N. Sato and K. Fukui (OKI)Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Advertisements

Doc: IEEE Submission Mar 2014 Jeongseok Yu et al., Chung-Ang University Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission Jan Byung-Jae Kwak et al., ETRISlide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE Submission Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Reliable.
Doc.: IEEE xxxxx Submission doc. : IEEE Nov 2012 Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Reply.
Doc.: IEEE Submission Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [QoS.
Doc: IEEE Submission March 2015 Jeongseok Yu et al., Chung-Ang University Project: IEEE P Working Group for Wireless Personal.
July 2004 Jay Bain, Fearn Consulting doc.: IEEE /0379r0 Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE Submission doc. : IEEE March 2009 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc: IEEE xxx Submission March 2015 Jeongseok Yu et al., Chung-Ang University Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE xxxxx Submission doc. : IEEE Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P
Submission Title: [Discovery Latency] Date Submitted: [ ]
Submission Title: [Discovery Latency] Date Submitted: [ ]
Submission Title: [Add name of submission]
June 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed Scenarios for Usage Model Document.
doc.: IEEE <doc#>
<month year> <doc.: IEEE doc> May 2015
doc.: IEEE <doc#>
doc.: IEEE <doc#>
March 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Toumaz response to TG6 Call for Applications]
Submission Title: Proposed Text on Transmit Power Control for TGD
<May,2009> doc.: IEEE <doc .....> <July 2009>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
1/1/2019<month year> doc.: IEEE
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Reliable data transmission Date Submitted:
Submission Title: [Cross-Layer Context Management]
1/16/2019<month year> doc.: IEEE
August, 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Enhancing reliability of data transmission.
<month year> doc.: IEEE < e>
Submission Title: [WG WNG Liaison Report January08]
Submission Title: [One-to-many and many-to-many peering procedures]
March 2009 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: VLC – Application Category Terms & Mobility.
Sept 2004 doc.: IEEE b Sept 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
doc.: IEEE <doc#>
<month year> doc.: IEEE <xyz> November 2000
doc.: IEEE /XXXr0 Sep 19, 2007 June 2009
Submission Title: [Frame and packet structure in ]
November 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Simplified geometry for the usage model.
<month year> <doc.: IEEE doc> May 2015
<month year>20 Jan 2006
<month year> <Nov 2018>
doc.: IEEE <doc#>
doc.: IEEE <doc#>
Submission Title: [One-to-many and many-to-many peering procedures]
May 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Text for General Description of PAC Date Submitted:
March 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [DF6 Radio-burst length over PSDU size] Date.
Submission Title: [Multi-hop Peering for PAC]
doc.: IEEE <doc#>
<month year> <doc.: IEEE doc> March 2015
Submission Title: [Proposed Resolution for FSK/GFSK Prior Comments]
doc.: IEEE <doc#>
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Proposed Structure of Contention Free Period.
<month year> doc.: IEEE <030158r0> <March 2003>
June, 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [OFDM PHY Mode Representation] Date Submitted:
doc.: IEEE <doc#>
September 2009doc.: IEEE wng0
Mar 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution for Comment 70 ] Date Submitted:
Mar 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution for Comment 70 ] Date Submitted:
Nov Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Report on IEEE PAC Draft Status]
<month year> <doc.: IEEE doc> September 2015
August, 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Improve the latency between GTS request.
<month year> <doc.: IEEE doc> March 2015
July 2003 doc.: IEEE <03/242> July 2003
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Dependable Interest Group Closing.
Submission Title: TG9ma Agenda for September Meeting
Jan 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TeraHertz Closing Report Date Submitted: January.
Submission Title: TG9ma Closing Report for September Meeting
Presentation transcript:

Doc: IEEE xxx Submission April 2015 Woongsoo Na, et al., Chung-Ang University Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [PAC Authentication Procedure] Date Submitted: [March 10th, 2015] Source: [Woongsoo Na and Sungrae Cho] Company: [Chung-Ang University, Korea] Re: [This is the original document] Abstract: [Authentication procedure for IEEE TG] Purpose: [Material for discussion in TG] Notice: This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P

Doc: IEEE xxx Submission April 2015 Woongsoo Na, et al., Chung-Ang University Slide 2 MAC security for IEEE PAC Woongsoo Na, Sungrae Cho Chung-Ang University

Doc: IEEE xxx Submission April 2015 Woongsoo Na, et al., Chung-Ang University Security Parameters PAC_ADDR: PAC device address (unique for each device) AUTH_KEY: used for authentication purposes ENC_KEY: encryption key (for secure unicast) GENC_KEY: group encryption key RAND: frequently changing random or pseudo-random number made by the PAC device itself EntitySize PAC_ADDRxxx bits AUTH_KEY ENC_KEY GENC_KEY RAND Slide 3

Doc: IEEE xxx Submission April 2015 Woongsoo Na, et al., Chung-Ang University Key Derivation PRF PIN AUTH_KEY AB ENC_KEY Authentication Encryption Device ADevice B During peering Slide 4

Doc: IEEE xxx Submission April 2015 Woongsoo Na, et al., Chung-Ang University Authentication Process of verifying ‘who’ is at the other end of the link Performed for devices (PAC_ADDR) Authentication is achieved based on the stored authentication key (AUTH_KEY) or by peering procedure (entering a PIN). Slide 5

Doc: IEEE xxx Submission April 2015 Woongsoo Na, et al., Chung-Ang University Flow Chart for Authentication Authentication start Already authenticated Peering allowed Peering Authentication OKAuthentication fail Link key (AUTH_KEY) available no fail yes ok yes Slide 6

Doc: IEEE xxx Submission April 2015 Woongsoo Na, et al., Chung-Ang University Infrastructureless Architecture Authentication between PDs is done using PIN, or certificate issued by the third party Cf) Bluetooth pairing PIN establishment issue (1) offline establishment (2) online establishment  It is not secure against the man-in-the-middle attack and replay attack. Slide 7

Doc: IEEE xxx Submission April 2015 Woongsoo Na, et al., Chung-Ang University Authentication between PDs Slide 8

Doc: IEEE xxx Submission April 2015 Woongsoo Na, et al., Chung-Ang University Authentication without Infrastructure Slide 9

Doc: IEEE xxx Submission April 2015 Woongsoo Na, et al., Chung-Ang University Conclusion Offline PIN establishment is not suitable for IEEE PAC model due to scalability. PIN is distributed to each PD securely using the application level protocol (TLS, etc…) Since PIN is securely shared, proposed security technique can successfully eliminate MITM attack. Since sequential number is used for MIC, proposed security technique is secure against the replay attack. Slide 10