1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID

Slides:



Advertisements
Similar presentations
Security Issues In Mobile IP
Advertisements

Keiji Maekawa Graduate School of Informatics, Kyoto University Yasuo Okabe Academic Center for Computing and Media Studies, Kyoto University.
M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
UWB UWB: High speed(>100Mbps), small area(WPAN), accurate positioning and distance measuring. Blue tooth: although it’s low speed, it has a more mature.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 “draft-urien-eap-smartcard-type-00.txt” EAP Smart Card Protocol (EAP-SC)
Deployment of the Light Weight IPv6 protocols In the Internet of Things(IoT) draft-fu-lwig-iot-usecase-00 Qiao Fu China Mobile
ECGR-6185 ZIGBEE Advanced Embedded Systems University of North Carolina –Charlotte Gajendra Singh Some figures borrowed from Zigbee Alliance web pages.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Wireless Sensor Network. A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
1 Secure Zero Configuration in a Ubiquitous Computing Environment Shenglan Hu and Chris J. Mitchell Information Security Group Royal Holloway, University.
OCR Computing for GCSE © Hodder Education 2011
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 /12 Pascal URIEN, IETF 72 rd, Monday July 28 th Dublin, Ireland draft-urien-hip-tag-00.txt HIP support for RFID
1 /11 Pascal URIEN, IETF 77 th, Monday March 22 nd Anaheim, California draft-urien-hip-tag-03.txt HIP support for RFID
Host Identity Protocol
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
Chapter 10: Authentication Guide to Computer Network Security.
指導教授:黃秋煌 報告者:黃明維 無線射頻辨識 論文報告 1. RFID Lab, Dept. IECS, FCU Outline Internet of Things architecture for a RFID-based product tracking business model SHARDIS:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
MICA: A Wireless Platform for Deeply Embedded Networks
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
Computation for Physics 計算物理概論 Introduction to Linux.
The Computer for the 21 st Century Mark Weiser – XEROX PARC Presented By: Mihail Ionescu.
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Secure Socket Layer (SSL)
WSN Done By: 3bdulRa7man Al7arthi Mo7mad AlHudaib Moh7amad Ba7emed Wireless Sensors Network.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Status of IEEE A Suite of Smart Transducer Interface Standards for Sensors and Actuators November 28, 2006 Kang Lee
KARTIK DABBIRU Roll # EE
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
IPv6, the Protocol of the Future, Today Mathew Harris.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
Wireless Interface Options for 1451 Mike Moore Steve Smith Oak Ridge National Laboratory Presented at Sensors Expo San Jose, CA May 20, 2002.
1 /14 Pascal URIEN, IETF 75 th, Tuesday July 28th Stockholm, Sweden draft-urien-hip-tag-02.txt HIP support for RFID
King Fahd University of Petroleum & Minerals Electrical Engineering Department EE400 PROJECT Personal Area Networks Instructed by Dr.AlGhadbanPresenters.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
INTRODUCTION TO WEB APPLICATION Chapter 1. In this chapter, you will learn about:  The evolution of the Internet  The beginning of the World Wide Web,
June 5 – Orlando "Writing RFID Tags" Bob Brennan Technical Evangelist Integrated Manufacturing Systems, Inc.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Client/Server Model: A Business View The different Client/server implementations differ according to: 1.Where the processing for the presentation of information.
Doc.: IEEE HIP-over-TG9 Submission May 2012 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless Personal.
Virtual Machines Created within the Virtualization layer, such as a hypervisor Shares the physical computer's CPU, hard disk, memory, and network interfaces.
1 /10 Pascal URIEN, IETF 80 th, Tuesday 29 th March 2011, Prague, Czech Republic draft-irtf-hiprg-rfid-02 HIP support for RFIDs
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Internet of Things in Industries
Welcome to Early Bird Class
Networking Components
Wikipedia Edit. Internet of Things It is the idea of enabling everyday objects with software, sensors and network connectivity. The connectivity would.
Communication and Security in Machine-to-Machine Systems Date │ Reporter │ 李雅樺 1.
HIP & MIP V 6 SECURITY Research: Security Architecture IRT Lab, Columbia University.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Security of the Internet of Things: perspectives and challenges
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
SHIP: Performance Reference: “SHIP mobility management hybrid SIP-HIP scheme” So, J.Y.H.; Jidong Wang; Jones, D.; Sixth International Conference on
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 draft-urien-eap-smartcard-06.txt “EAP-Support in Smartcard”
OSI model vs. TCP/IP MODEL
Discussions on Heterogeneous Identification Service
Presentation transcript:

1 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan draft-urien-hip-iot-00.txt HIP support for RFID

2 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan Goal The goal of this document is to analyze issues raised by the deployment of the Internet Of Things (IoT), and to propose a framework based on an Identity Layer such as the HIP protocol

3 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan What is IoT: Internet of Tags ReaderTag Start EPC-Code URI ConversionONS Resolver EPCIS Server Local System DNS Cloud PML Files EPC: Electronic Product Code ONS: Object Name Service EPCIS: EPC Information Service PML: Physical Markup language

4 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan What is IOT : Internet Of Object Until recently, smart objects were realized with limited communication capabilities, such as RFID tags, but the new generation of devices has bidirectional wireless communication and sensors that provide real-time data such as temperature, pressure, vibrations, and energy measurement. Smart objects can be battery-operated, but not always, and typically have three components: a CPU (8-, 16- or 32-bit micro-controller), memory (a few tens of kilobytes) and a low-power wireless communication device (from a few kilobits/s to a few hundreds of kilobits/s). The size is small and the price is low: a few square mm and few dollars. The Internet of Things: IP for Smart Objects

5 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan Open Issues What is a thing? We distinguish two classes of things Things that are computers equipped with communication interfaces. Things that are not computers, but who are associated with computers equipped with communication interfaces. What is the identifier of a thing? They are several proposals: A serial number, such as an EPC code. An IP address. Other, for example a fix hash value, or adhoc naming scheme. Authentication Is there a need/way to authenticate a thing? In other words is it possible and needed to prove the identity of a thing.

6 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan Open issues Identity Protection Things can be used to track people or objects, which are identified by a set of things. Identity protection enforces privacy by hiding things identities thanks to cryptographic means. Communication Protocol A thing communicates with the Internet network by various interfaces Via MAC (OSI2) radio protocols, as defined by EPCGLOBAL Thanks the IP protocol, in that case the thing is an IP node, and is natively plugged in the Internet Cloud. Other, for example the Host Identity Protocol Things to Things communications In some cases, things communicate with other things. If identity protection is required, the associated infrastructure is complex from a cryptographic or physical point of view, because classical routing techniques can't be used.

7 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan HIP for IoT HIP Benefits We suggest defining a new version of the HIP protocol, dedicated to the Internet Of Things issues, according to the following arguments : Things are associated to Identifiers. IP addresses are usually understood as locators and not identifiers. In this identity- based approach the infrastructure to which the thing is connected belongs to the internet network, but even if the thing comprises an IP stack, the IP address is not correlated with the thing identity. The actual version of HIP provides inter HIP nodes communications thanks to ESP secure channels. This paradigm could be re-used for things to things communication, compatible with the IP infrastructure.

8 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan HIP for IoT HIP issues for the Internet Of things Identifiers. HIP Identifiers (HIT) rely on cryptographic procedures, i.e. a digest of an RSA public key. A new naming scheme SHOULD be defined Identity Protection. No Identity Protection is supported. Therefore HIP nodes MAY be easily tracked. We believe that Identity Protection MUST be supported. Communication Architecture. If identity protection is supported, some trusted gateways SHOULD be used in order to establish communications with things.

9 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan Example: draft-urien-hip-tag-02.txt IP MAC PHY IP MAC PHY RFID-MAC RFID-PHY RFID-MAC RFID-PHY HIP PortalTagReader HAT HIP Identity Solver SPI-I SPI-R EPC-Code

10 /10 Pascal URIEN, IETF 76 th, Monday November 9 th Hiroshima Japan Questions ?