Doc.: IEEE 802.15-05-0188-00 Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P802.15 Working Group for Wireless Personal.

Slides:



Advertisements
Similar presentations
Doc.: IEEE b Submission March 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Advertisements

Doc.: IEEE b Submission March 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE a-Updating-15-7-security Submission May 2015 Robert Moskowitz, HTT ConsultingSlide 1 Project: IEEE P Working Group for.
Doc.: IEEE s Submission January 2015 Mineo Takai, Space-Time EngineeringSlide 1 Project: IEEE P Working Group for Wireless Personal.
Submission January, 2005 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE f Submission May 11, 2009 René Struik (Certicom Research)Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /0136r0 Submission March 2006 Abbie Mathew, NewLANS Project: IEEE P Working Group for Wireless Personal Area Networks Submission.
Doc.: IEEE /xxxr0 Submission Phil Jamieson November 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE /123r0 Submission February, 2002 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
1 July, 2002 doc:.: /275r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE b Submission January 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE b Submission March 2005 Robert Cragie, Jennic Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Submission January, 2005 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Drafting of IEEE e.
Doc.: IEEE /0xxr0 Submission January, 2001 Allen Heberling, Eastman Kodak CompanySlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission doc. : IEEE March 2009 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed.
Doc.: IEEE Submission November 2003, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE Submission November 16, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /174r0 Submission March, 2003 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission September 2013 Li, Hernandez, Dotlic, Miura, NICT Slide 1 Project: IEEE P Working Group for Wireless.
Doc.: IEEE /407r2 Submission 30 January 2000 James Gilb, Mobilian Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE Submission Sept Byung-Jae Kwak, ETRISlide 1 NOTE: Update all red fields replacing with your information; they are.
Submission November 2015 Slide 1Li Qiang, Huawei Technologies Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE xxxxx Submission doc. : IEEE Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P
b Submission May, 2004 Rene Struik, Certicom Corp.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Communicating.
Doc.: wng0> Submission Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Using Host.
Doc.: IEEE g TG4g Presentation Jan 2010 C.S. Sum1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)‏
Doc.: IEEE /0111r1 Submission May 2006 LEE, CUNYSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE e Submission July 2009 Andy Summers, Skip Ashton, EmberSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE g Submission July 14, 2009 René Struik (Certicom Research)Slide 1 Project: IEEE P Working Group for Wireless Personal.
14 March 2002 doc.: IEEE /152r2 Gregg Rasor, MotorolaSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
June 16, 2018 doc.: IEEE r0 January, 2005
June 17, 2018 doc.: IEEE r0 January, 2005
doc.: IEEE <doc#>
doc.: IEEE <doc#>
June 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed Scenarios for Usage Model Document.
<month year> <doc.: IEEE doc> May 2015
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
doc.: IEEE <doc#>
December 2, 2018 doc.: IEEE r0 May, 2004
March 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Toumaz response to TG6 Call for Applications]
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Call for Proposals] Date Submitted:
December 7, 2018 doc.: IEEE r0 July, 2003
doc.: IEEE <doc#>
< November, 2011 > Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [More Low Energy Mechanism Details]
May 2009 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ 1-octet MAC Header frame types ] Date Submitted:
Submission Title: [Common rate resolution]
January 16, 2019 doc.: IEEE r0 September, 2004
Submission Title: [SG4b Closing Report May04]
<month year> <doc.: IEEE doc> March 2015
February 24, 2019 doc.: IEEE r0 July, 2003
doc.: IEEE /XXXr0 Sep 19, 2007 June 2009
Sept Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Add the Authentication to Enhance the Security.
May Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Add the Authentication to Enhance the Security.
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
<month year> <doc.: IEEE doc> March 2015
March 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [DF6 Radio-burst length over PSDU size] Date.
doc.: IEEE <doc#>
July 15, 2019 doc.: IEEE r0 May, 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES.
September 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suggested TG3c PAR Changes] Date Submitted:
Mar 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution for Comment 70 ] Date Submitted:
Mar 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution for Comment 70 ] Date Submitted:
<month year> <doc.: IEEE doc> September 2015
<month year> <doc.: IEEE doc> March 2015
Submission Title: [Common rate resolution]
Submission Title: [Common rate resolution]
August 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: MLME-SOUNDING and MLME-CALIBRATE comment.
Presentation transcript:

doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Out of Order Receipt with Security] Date Submitted: [March 17, 2005] Source: [Rene Struik] Company [Certicom Research] Address [5520 Explorer Drive, Fourth Floor, Mississauga, ON, L4W 5L1, Canada] Voice:[ ], FAX: [ ], Re: [Comment #1044 of comment database on b, Draft #1 (see b) ] Abstract:[This document details a suggested remedy to Comment #1044] Purpose:[This document is submitted for improvements to the b draft specification.] Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P

doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 2 Out-of-Order Receipt with Security (Comment #1044) Rene Struik (Certicom Research)

doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 3 Comment #1044 Clause 7.6, pp : Out-of-order frame receipt. Replay protection requires in-order frame receipt. In particular, this implies that protected frames that are received out-of- order yield a security processing failure at the destination address(es). This might hamper re-use of the same keying material across different layers and might also impact robustness within the MAC layer itself. Suggested remedy: keep track of a small window of last received frame counter values, rather than just the last received value. This allows modest out-of-order receipt without jeopardizing replay protection. The detailed text will be presented in an updated IEEE 802 document (04/539r3).

doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 4 Details (1) Source: ADestination: B (4) Check freshness: N A  N 0 A {N A  {used frame counters}} Case 1 (in-order receipt of frame N) Case 2 (out-of-order receipt of frame N-5) NN-2N-1N-3N-6N -5N -4N -7N -8N+1 NN-2N-1N-3N-6N -5N -4N -7N -8N+1N+2 NN-2N-1N-3N-6N -5N -4N -7N -8N+1 NN-2N-1N-3N-6N -5N -4N -7N -8N+1

doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 5 Details (2) Source: ADestination: B (4) Check freshness: N A  N 0 A {N A  {used frame counters}} Case 1 (in-order receipt of frame N) NN-2N-1N-3N-6N -5N -4N -7N -8N+1 NN-2N-1N-3N-6N -5N -4N -7N -8N+1N+2 Storage of external frame counter: -Store value N -Store 8-bit array b indicating which values in {N-8, N-7, …, N-1} have been received Update procedure: -Update N to N+1 -Shift-left b; set right-most value, corresponding to counter N, to TRUE Note: update of N to N+k induces k shift-lefts of b (filling to the right with 0s (or FALSE))

doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 6 Details (3) Source: ADestination: B (4) Check freshness: N A  N 0 A {N A  {used frame counters}} Case 2 (out-of-order receipt of frame N-5) NN-2N-1N-3N-6N -5N -4N -7N -8N+1 NN-2N-1N-3N-6N -5N -4N -7N -8N+1 Storage of external frame counter: -Store value N -Store 8-bit array b indicating which values in {N-8, N-7, …, N-1} have been received Update procedure: -Do not update N -Set value b corresponding to N-5 to TRUE

doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 7 Backup slides … … see also IEEE doc 04/245r2 (Slides 4-6)

doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 8 MAC Security (1) Data key repository Data key repository data transfer AB Wrapped data Encryptor/ decryptor Encryptor/ decryptor data Data key Key info Key info Data key Security objectives Confidentiality (Encryption: ON/OFF) Data authenticity (Integrity: No/Low/Medium/High {i.e., 0, 32, 64, 128-bit}) Weak freshness (Relative ordering in time: Enabled/disabled {via FrameCounter}) Security non-objectives Strong freshness (Absolute ordering in time: not provided) Required info Algorithm Id: specifies the particular crypto primitive used Key Id: prevents use of improper data keys Sequence number: prevents undetected reordering (or replay) of message frames

doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 9 MAC Security (2) Variations (1)A  B: : [x] SEC k, NA {k= f(A,B)} {unicast message} (2)A  G: : [x] SEC k, NA {k= f(A,G)}{multicast with multicast key} (3)A  G: Id G’ : [x] SEC k, NA {k=k G’, G  G’}{multicast with key of bigger group} Sender A: (1)Determine adequate security level: SEC  SEC 0 (A,G, x) (2)Determine key Key to be used for A  G (3)Determine frame counter N A (4)Perform crypto operations using (k, N A ) and protection level SEC (5)Update info Recipient B (B  G): (1) Check adequacy of purported security level: SEC  SEC 0 (A,G, x) (2) Retrieve key Key that was purportedly used (3) Retrieve frame counter N A that was purportedly used (4) Check freshness: N A  N 0 A {N A  {used nonces}} (5) Determine long address AddressA of sending device (6) Perform crypto operations using (k, N A ) and protection level SEC (7) Update info

doc.: IEEE Submission March 17, 2005 Poor & Struik / Ember & CerticomSlide 10 MAC Security (3) Adequate security level SEC  SEC 0 (A,G, x) Frame/Command Type Ordinary data Beacon Acknowledgement Command Associate Command Disassociate Special data SEC 0 ENC-MIC-64 MIC-64 None MIC-64 None