15-03-0320-02-0400 Submission November, 2003 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks.

Slides:



Advertisements
Similar presentations
1 November, 2002 doc:.: /480r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Advertisements

Doc.: IEEE b Submission March 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE b Submission March 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
IEEE mag Submission Amarjeet Kumar, Procubed Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE e Submission November 13, 2008 René Struik (Certicom Research)Slide 1 Project: IEEE P Working Group for Wireless.
IEEE e Submission: Wireless Ping for Network Management 8 September 2008 Bhatti, Mitsubishi ElectricSlide 1 Project: IEEE P
Submission January, 2005 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /037r0 Submission January 2003 Ed Callaway, Motorola Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /xxxr0 Submission Phil Jamieson November 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE /123r0 Submission February, 2002 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
1 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: e Submission Liang Li, J Shen,Betty ZhouSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE b Submission January 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE b Submission March 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Submission January, 2005 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: IEEE :
Doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE e Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security.
Doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission November 16, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission November 18, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /174r0 Submission March, 2003 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /315r1 Submission July 2001 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Doc.: IEEE c SubmissionSlide 1 Qualcomm 2/29/2016 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE b Submission Aug H. Shao, H. Dai, J. Zhang, Mitsubishi ElectricSlide 1 Project: IEEE P Working Group for Wireless.
b Submission May, 2004 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Communicating.
Doc.: IEEE /250r0 Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: IEEE :
Doc.: IEEE e Submission July 2009 Andy Summers, Skip Ashton, EmberSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE g Submission July 14, 2009 René Struik (Certicom Research)Slide 1 Project: IEEE P Working Group for Wireless Personal.
June 16, 2018 doc.: IEEE r0 January, 2005
June 17, 2018 doc.: IEEE r0 January, 2005
doc.: IEEE <doc#>
November 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES-256 for ] Date Submitted:
doc.: IEEE <doc#>
doc.: IEEE <doc#>
Submission Title:[MPDU Fragmentation Format Refinement Ideas]
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
November 2011 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: MAC common concepts and merge strategy.
doc.: IEEE <doc#>
doc.: IEEE <doc#>
November 18, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Resolutions] Date Submitted:
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Call for Proposals] Date Submitted:
December 7, 2018 doc.: IEEE r0 July, 2003
doc.: IEEE <doc#>
< November, 2011 > Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [More Low Energy Mechanism Details]
May 2009 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ 1-octet MAC Header frame types ] Date Submitted:
January 16, 2019 doc.: IEEE r0 September, 2004
November 18, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Resolutions] Date Submitted:
January 2010 doc.: IEEE /0825r2 January 2010
November 2009 doc.: IEEE /0825r0 November 2009
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Frame signaling options for Security.
February 24, 2019 doc.: IEEE r0 July, 2003
April 4, 2019 doc.: IEEE r0 July, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suggestions.
Sept Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Add the Authentication to Enhance the Security.
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
f- 433 MHz PHY and MAC for TG4f - Preliminary Proposal July 2009 Project: IEEE P Working Group for Wireless Personal.
Submission Title: LB Resolutions from kivinen
November 16, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Resolutions] Date Submitted:
May 10, 2019 doc.: IEEE r0 November, 2002
May 14, 2019 doc.: IEEE r0 November, 2002
doc.: IEEE <doc# >
doc.: IEEE <doc# >
July 15, 2019 doc.: IEEE r0 May, 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES.
March 2005 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Draft 1 security change proposal] Date Submitted:
Submission Title: [JPKG comment suggestions]
doc.: IEEE <doc#1>
Source: [Chunhui Zhu] Company [Samsung]
doc.: IEEE <doc#1>
doc.: IEEE <doc#>
Presentation transcript:

Submission November, 2003 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suggestions for Improvement of the IEEE WPAN Standard] Date Submitted: [November 11, 2003] Source: [René Struik] Company [Certicom Corp.] Address [5520 Explorer Drive, 4th Floor, Mississauga, ON Canada L4W 5L1] Voice:[+1 (905) ], FAX: [+1 (905) ], Re: [Current IEEE Low-Rate WPAN standard (Draft D18).] Abstract:[This document gives some recommendations to assist in improving the security and flexibility of the IEEE Low-Rate WPAN standard.] Purpose:[Assist in improving the IEEE WPAN standard (Draft D18).] Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P

Submission November, 2003 Rene Struik, Certicom Corp.Slide 2 Suggestions for Improvement of the IEEE WPAN Standard René Struik, Certicom Research

Submission November, 2003 Rene Struik, Certicom Corp.Slide 3 Outline: Security Suite Specification - Implementation cost Multicasting Support Security Status Information overhead - Reduction of bandwidth cost Security Suite Selection and Usage - Effectiveness and efficiency Other remarks More security and efficiency concerns - more on IEEE /ZigBee interface

Submission November, 2003 Rene Struik, Certicom Corp.Slide 4 Security Suite Specification (1) Current draft specification distinguishes 8 security suites, depending on combination of encryption and data authentication used: Encryption: ON/OFF Data authentication/integrity: #integrity bits  {L 0, L 1, L 2, L 3 }= {0,32,64,128} Current security suite specifications are based on 3 security mechanisms: 1.CBC-MAC mode, to provide for data authentication only; 2.AES-CTR mode, to provide data confidentiality only; 3.AES-CCM mode, to provide both data confidentiality and data authenticity. Problems: - Different security suites have to use different keys (see § ), for security concerns - The AES-CBC-MAC specification (§7.6.4) is vulnerable to replay attacks, since it does not provide for ‘freshness’ guarantees Consequences: - Need to implement 3 security mechanisms, to allow for flexibility (thus, impact on code size) - Higher layer mechanisms cannot re-use MAC keying material, because of security concerns (thus, impact on key storage size)

Submission November, 2003 Rene Struik, Certicom Corp.Slide 5 Security Suite Specification (2) Proposed security suite specification - secure Specification of security suites is based on 1 security mechanism: AES-CCM * mode, to provide data confidentiality only, data authenticity only, or both data confidentiality and data authenticity/integrity Consequences: - AES-CCM * mode has same security properties as the AES-CCM mode specification in Annex B - AES-CCM * mode allows secure re-use of same key, both in MAC and higher layers - AES-CCM * mode has same format as AES-CCM mode specification for NIST - Data authenticity-only mode (‘CBC-MAC’) not vulnerable to replay attack any more - Need to implement only 1 security mechanism (thus, favorable for code size) CCM* vs. CCM: - CCM* allows the length M of the authentication field to be zero (‘encryption-only’); - CCM* imposes restriction on nonce if different authentication tag lengths used (this prevents attack on CCM with variable tags [Rogaway, David Wagner, 2003]) For details, see

Submission November, 2003 Rene Struik, Certicom Corp.Slide 6 Multicasting Support (1) Current draft specification does not support multicasting Consequences: - No advantage taken of broadcast character PAN communications (without relay) - Need to retransmit same data to different devices in a group * bandwidth and energy inefficient * latency issues (e.g., with lighting applications) - No secured broadcast possible Proposed encoding of multicast info: Destination address allows differentiation between multicast address, peer-to- peer address, and broadcast address) - Multicast indicator: 1-bit value in MAC Header (e.g., in Frame Control Field) - Group address (components): * group creator address: address of the device that originated (=created) the group: with mode options * group sequence number: 1-octet field, to allow up to 256 groups per originating device: in same spot as key sequence counter

Submission November, 2003 Rene Struik, Certicom Corp.Slide 7 Multicasting Support (2) Property of group address format: - No confusion between group addresses created by different devices (due to partitioning address space according to group originator) A receiving device (§ ) accepts group address if the group address (DestAddress, KeySeqNo) indicates a group of which it is a member Notes: 1.Frame filtering implementation: - hardware-based: peer-to-peer (full address), unsecured broadcast traffic - software-based: peer-to-peer (short address), multicast, secured broadcast traffic 2.Group membership test: To be implemented at higher layer GroupId  G={group members} (secured MAC broadcasts require multicast addressing capability)

Submission November, 2003 Rene Struik, Certicom Corp.Slide 8 Multicasting Support (3) Addressing fields: ::= ::= | {option indicated by 1-bit multicast indicator} ::= implicit: coordinator | | | {option indicated by 2-bit addressing mode} ::= “Atoms” (end symbols in grammar): ::= 16-bit address ::= 64-bit address ::= 16-bit PAN address ::= 1-octet field {this allows 256 groups with same group source}

Submission November, 2003 Rene Struik, Certicom Corp.Slide 9 Multicasting Support (4) MAC Header Frame Control Addressing Fields Sequence Counter Frame PayloadFrame Control Sequence MAC PayloadMAC Footer Status InfoData MAC Header Frame Control Addressing Fields Sequence Counter Frame PayloadFrame Control Sequence MAC PayloadMAC Footer Security Status Info Key Counter Data Secured Data Frame Counter MAC Header Frame Control Addressing Fields Sequence Counter Frame PayloadFrame Control Sequence MAC PayloadMAC Footer Status Info Group Counter Data Unprotected frame (peer-to-peer, broadcast) Unprotected frame (multicast) Protected frame (peer-to-peer, broadcast, multicast) Key Counter not necessary for peer-to-peer!

Submission November, 2003 Rene Struik, Certicom Corp.Slide 10 Reducing Security Status Information Overhead (1) Current draft specification adds 5 bytes of security status info overhead to protected frames providing confidentiality (see §7.6.2 for AES-CTR and §7.6.3 for AES-CCM) Consequences: - Large fixed overhead of 5 bytes per secured frame, whether security status info is already reliably available at recipient’s side or not Proposed encoding of security status information: - Security status information is represented more efficiently, exploiting side information - Sending device may decide for itself whether to send all security status info completely (uncompressed) or only partially (compressed) - Sending device has way of determining whether receiving device might have lost synchronization of security status info (e.g., via slightly modified ACK mechanism) Consequences: - Security status info only sent when required, due to loss of synchronization - Expected bandwidth saving per protected frame: (almost) 4 bytes - Bandwidth saving range per protected frame: from 1 byte (uncompressed) to 4 bytes (compressed)

Submission November, 2003 Rene Struik, Certicom Corp.Slide 11 Reducing Security Status Information Overhead (2) MAC Header Frame Control Addressing Fields Sequence Counter Frame PayloadFrame Control Sequence MAC PayloadMAC Footer Security Status Info Key Counter Data Secured Data Frame Counter New Frame Counter Seq. No. Sequence Counter New Security Status Info Key Counter Data Secured Data New Frame Counter Sequence Counter Existing protected frame format Proposed uncompressed protected frame format (note the removal of the duplicate string) Illustration of how to save 1 byte security status information overhead, by exploiting side information on the sequence counter I. Reduction of security status info overhead by 1 byte per protected frame

Submission November, 2003 Rene Struik, Certicom Corp.Slide 12 Reducing Security Status Information Overhead (3) I. Reduction of security status info overhead by 1 byte per protected frame (cont’d) - Frame Counter N: 32-bit non-repeating value, used for providing security - Sequence Counter DSN: 8-bit integer value, used for loose synchronization between sent messages and ACK hereon. Incremented by 1 (mod 256) per sent frame Proposed method (lazy updates by sender) Frame counter N: initialized at any value; when used, updated from N to value N 0  N such that N 0 :=min{N’  N | N’  DSN (mod 256)}. (Here, DSN is current value of Sequence Counter in frame to be sent) Outgoing frames that require ACK are re-encrypted in exactly the same way till ACK received or till retries exhausted Corollary: The property N  DSN (mod 256) is invariant at each time instance N is used Note: It is easy to compute N 0 from N (hint: compare N (mod 256) and DSN).

Submission November, 2003 Rene Struik, Certicom Corp.Slide 13 Reducing Security Status Information Overhead (4) MAC Header Frame Control Addressing Fields Sequence Counter Frame PayloadFrame Control Sequence MAC PayloadMAC Footer New Frame Counter New Security Status Info Key Counter Data Secured Data Sequence Counter Proposed uncompressed protected frame format Proposed compressed protected frame format Illustration of how to save 3 bytes security status information overhead, by exploiting the re-synch capabilities of the sequence counter New Frame Counter Compr. Security Status Info Key Counter Data Secured Data Sequence Counter II. Removing security status info overhead per protected frame altogether† †: the KeySeqCtr is always sent for robustness reasons: it allows smooth ZigBee key updates and facilitates easy future extensions of the standard using multicasting, whether secured or not.

Submission November, 2003 Rene Struik, Certicom Corp.Slide 14 Reducing Security Status Information Overhead (5) II. Removing of security status info overhead per protected frame altogether (cont’d) - Frame Counter N: 32-bit non-repeating value, used for providing security - Sequence Counter DSN: 8-bit integer value, used for loose synchronization between sent messages and ACK hereon. Incremented by 1 (mod 256) per sent frame Proposed method (lazy updates by recipient) Frame counter N: initialized at value 0; when used, updated from N to value N 0  N such that N 0 :=min{N’  N | N’  DSN (mod 256)}. (Here, DSN is current value of Sequence Counter in received frame) Corollary: Let N A be the value of the frame counter used by sender. If the recipient’s value of N satisfies N  N A  N+256, then N 0 = N A and decryption proceeds exactly the same as in the current D17 draft. If the recipient’s value of N 0 satisfies N A  N or N A  N A +256, then N 0  N A and decryption proceeds incorrectly* (same effect as active change of Frame Counter in uncompressed scenario). This is so-called loss of synchronization. *: of course, this can only be detected if the protected frame provides for authenticity (as an encryption-only mechanism does not provide for authenticity)

Submission November, 2003 Rene Struik, Certicom Corp.Slide 15 Reducing Security Status Information Overhead (6) Security fields (in-order receipt indicator): ::= | {option indicated by 1-bit reduced nonce indicator} “Atoms” (end symbols in grammar): ::= 1-octet field ::= 4-octet field

Submission November, 2003 Rene Struik, Certicom Corp.Slide 16 Reducing Security Status Information Overhead (7) III. Reduction of security status info overhead – what if re-synchronization needed? Proposed error-handling (3 cases): Feedback channel always on (always ACKs): Rules: Frame transmitted in uncompressed format, if no ACK received (and in compressed format otherwise) {Note: no change to ACK necessary} Loss-of-synchronization NEVER occurs, so behavior exactly as in current draft. Feedback channel never on (no ACKs at all): Rules: Avoid error-handling altogether by sending uncompressed frames regularly This always works if receiving device is awake at least once in every 256-frame counter interval; in that case, exactly the same behavior as in draft Feedback channel sometimes on (ACKs sometimes): Rules: - Recipient: If decryption on compressed frame rejected, do not send ACK next time - Sender: If no ACK received, next frame sent in uncompressed form (this makes sure that re-synch is achieved with a delay of 1 ACK’ed frame only)

Submission November, 2003 Rene Struik, Certicom Corp.Slide 17 Reducing Security Status Information Overhead (7a) III. Reduction of security status info overhead – re-synchronization examples Feedback channel always on (always ACKs): Loss-of-synchronization NEVER occurs, so behavior exactly as in current draft (including number of retries afforded) – Remark: if decryption fails long enough, [hacker] recipient runs out-of-synch still (Note: this can be fixed as on next slide (6b)) msg 1 ACK msg 2 ACK msg 3 NAK msg 3 ACK Message flow Frame Counter Frame Counter uncompressed compressed msg 4 ACK

Submission November, 2003 Rene Struik, Certicom Corp.Slide 18 Reducing Security Status Information Overhead (7b) III. Reduction of security status info overhead – re-synchronization examples Feedback channel sometimes on (ACKs sometimes): Loss-of-synchronization might occur, but is solved with a delay of 1 ACK’ed frame msg 1 ACK msg 2  loss msg 3 ACK msg Message flow Frame Counter Frame Counter uncompressed compressed msg 5 NAK (due to error-flag) Enable error-flag: decryption error  reject (due to error-flag) msg 5 ACK Disable error-flag: frame counter OK Message sent with ACK request

Submission November, 2003 Rene Struik, Certicom Corp.Slide 19 Reducing Security Status Information Overhead (7c) III. Reduction of security status info overhead – re-synchronization examples Feedback channel never on (no ACKs at all): Loss-of-synchronization might occur, but is solved with next received uncompressed frame msg msg 2  loss msg msg Message flow Frame Counter Frame Counter uncompressed compressed msg msg  loss msg 7 805

Submission November, 2003 Rene Struik, Certicom Corp.Slide 20 Reducing Security Status Information Overhead (8) IV. Reduction of security status info overhead – distinguishing (un)compressed formats Proposed encoding of compressed vs. uncompressed protected frame formats: Indicate compressed/uncompressed mode option in Frame Control Field. (This does not cost anything, since one can simply use 1 of the 6 reserved bits for this). Other potential options: - Indicate compressed/uncompressed mode option in Frame Field (This does cost 8 bits, since there are currently no reserved bits available to encode this information.) - Do not indicate compressed/uncompressed mode option (This is instable (!!!), since it causes instability of the system and might necessitate 2 decryption executions, to determine which one of the compressed or uncompressed modes was actually used)

Submission November, 2003 Rene Struik, Certicom Corp.Slide 21 Reducing Security Status Information Overhead (9) Impact of change on draft (cont’d): Changes to Clause 7.6: - (Re)construct Full Frame Counter from Sequence Counter and stored Frame Counter - Add to the acceptance rules for incoming frames (in § ) the following text: ‘If the Compression Error Flag is set, the received frame shall be in uncompressed format, i.e, the Compression Enabled field in the Frame Control Field shall be disabled’. - During the secure processing of incoming frames (in § , §7.6.3), set the Compression Error Flag if the received frame was sent in compressed format and decryption fails; disable a set Compression Error Flag if the received frame was sent in uncompressed format and decryption succeeds. - If a message is sent with the ACK field set and no ACK is received, the message shall be resent in uncompressed format, i.e., with the Compression Enabled field in the Frame Control Field enabled (in § , § , §7.6.3). - Incoming and outgoing secured messages shall be processed as if these are in uncompressed format (thus, making re-encryption and retransmission unnecessary) - Adapt notational conventions in Clauses : remove lines 19-29, Page Change the format of the AES-CCM MAC Payload (Figure 67, § ) as follows: Have options for the length of the Frame Counter field: 0 or 3 octets, depending upon the (see document 02/468r1)

Submission November, 2003 Rene Struik, Certicom Corp.Slide 22 Security Suite Selection (1) Current specification distinguishes 8 security suites, depending on combination of encryption and data authentication used: Encryption: ON/OFF Data authentication/integrity: #integrity bits  {L 0, L 1, L 2, L 3 }= {0,32,64,128} Existing security suite selection and usage (as in Draft D18) SEC field indicates whether data is secured or not Security services (data encryption/authentication) statically depend on security suite negotiated between devices, irrespective of frame type Mechanism for negotiation of security suite not defined in current standard Consequences: - Out-of-scope mechanism needed for authentic exchange of info on what security suite to use. Need to re-negotiate every time security properties communication change - Communication to multiple recipients with different security suites requires data protection using each of these mechanisms, thus causing extra bandwidth overhead and extra processing (up to 8 times as much) - Inflexible, since security services cannot be tailored towards protection requirements for individual frame types

Submission November, 2003 Rene Struik, Certicom Corp.Slide 23 Security Suite Selection (2) Current specification distinguishes 8 security suites, depending on combination of encryption and data authentication used: Encryption: ON/OFF Data authentication/integrity: #integrity bits  {L 0, L 1, L 2, L 3 }= {0,32,64,128} Proposed security suite selection: - SEC field indicates the security services (data encryption/authenticity) that are provided over frame type (beacon, ACK, command, data frame). - Communicating device may decide for itself on how to protect frames it sends: SEC=Encr  Auth, where Encr={ON, OFF} and where Auth={0,32-bit,64-bit,128-bit} Consequences: - Inside-scope mechanism for determining what security suite to use - Communication to multiple recipients requires protection using only 1 mechanism *, thus eliminating previously necessary extra bandwidth overhead and processing - Flexible, since security services can be tailored towards protection requirements for individual frame types (e.g., authenticity for beacons, something else for others) - Allows reduction of #security suites, effectively from 8 to 1 (in §7.6)

Submission November, 2003 Rene Struik, Certicom Corp.Slide 24 Security Suite Selection (3) Security fields: ::= := On, OFF ::= none, low, medium, high {corresponds to 0, 4, 8, 16 bytes} {security options indicated by 3-bit protection level indicator}

Submission November, 2003 Rene Struik, Certicom Corp.Slide 25 Other Remarks — Selection (1) Security concerns Message protection is currently a function of the recipient, whereas it should be a function of the sender (for his information is at stake). This is extremely bad security practice If devices do not yet share a key, they automatically use the default key. This creates a false sense of security. As a minimum, an attempt must be made to derive a shared key The ACL mode is not defined if encryption is enabled (see § ) Broadcast encryption (i.e., use of the default key) is insecure, since it does not provide for freshness guarantees Efficiency Each recipient can only share 1 key with each sender. This unnecessarily complicates secure communications (e.g., it means that if A  B, and A  B,C, then the latter communications initiated by A towards B and C cannot use the same key for B and C).

Submission November, 2003 Rene Struik, Certicom Corp.Slide 26 Other Remarks — Selection (2) Efficiency, Trade-offs IEEE /ZigBee There is no mechanism that enables one to distinguish keys from one another. This is bad practice, since key updates might be necessary. Moreover, it makes the definition of Key Management at the ZigBee level unnecessarily hard Solution: Change the definition of the Key Sequence Counter (§ ) as follows: ‘The key sequence counter is a counter that is fixed by the higher layer. This value may be used by the higher layers to facilitate key management: the value of the key sequence counter identifies the key that is shared by devices that are engaged in a security relationship I would be happy to work with the editors to get the comments incorporated in the standard, to allow a more secure operation of and a smooth interface between and external standards, such as ZigBee

Submission November, 2003 Rene Struik, Certicom Corp.Slide 27 Fine-Grained Security Support – Description Grammar Security fields: ::= := On, OFF ::= none, low, medium, high {i.e., 0, 4, 8, 16 bytes} {options indicated by 3-bit protection level indicator} ::= | {option indicated by 1-bit ‘bastardized’ use of group key indicator} ::= emptyset ::= Freshness fields (in-order receipt indicator) ::= | {option indicated by 1-bit reduced nonce indicator} “Atoms” (end symbols in grammar): ::= 1-octet field ::= 4-octet field