App and Management End- to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm,

Slides:



Advertisements
Similar presentations
CMDH Refinement Contribution: oneM2M-ARC-0397
Advertisements

Draft-ietf-dhc-stateless-dhcpv6- renumbering-01 Tim Chown dhc WG, IETF 60, San Diego, August 2, 2004.
SEC Clarification Group Name: WG4 (SEC-2014-xxxx) Decision  Meeting Date: Discussion  Source: OBERTHUR Technologies Information  Contact:
Access Control Mechanism for User Group Name: SEC WG Source: Seongyoon Kim, LG Electronics, Meeting Date: Agenda Item:
Problem of Current Notification Group Name: ARC WG Source: Heedong Choi, LG Electronics, Meeting Date: ARC 9.0 Agenda Item: TBD.
IPv6 Header & Extensions Joe Zhao SW2 Great China R&D Center ZyXEL Communications, Inc.
Problem of non-Blocking Synchronous mode Group Name: ARC WG Source: Yuan Tao, Mitch Tseng, Huawei Technologies Meeting Date: ARC 15.0 Agenda Item: TBD.
Service Layer Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP16 Agenda Item:
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
On Persistent AE Identifiers Group Name: SEC#12.2 Source: Phil Hawkes, Qualcomm Inc (TIA), Francois Ennesser,
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Announcement Resources ARC Announcement_Issues Group Name: WG2 Source: Barbara Pareglio, NEC Meeting Date: Agenda Item: Input Contribution.
Introduction of PRO WG activities Group Name: TP Source: Shingo Fujimoto, FUJITSU, Meeting Date: Agenda Item:
End-to-End security definition Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date:
New Cryptographic Techniques for Active Networks Sandra Murphy Trusted Information Systems March 16, 1999.
3GPP Rel-13 Interworking discussions
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Usage Scenarios for CSE Group Name: WG2(ARC-WG) Source: Shingo Meeting Date: Agenda Item: Message.
Discussion on the problem of non- Blocking Synchronous mode Group Name: ARC WG Source: Yuan Tao, Mitch Tseng, Huawei Technologies Meeting Date: ARC 15.2.
Csci5233 computer security & integrity 1 Cryptography: an overview.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Discussion on the problem of non- Blocking Synchronous mode Group Name: ARC WG Source: Yuan Tao, Mitch Tseng, Huawei Technologies Meeting Date: ARC 15.2.
Status Report on Access TP8 Group Name: WG2 Decision  Meeting Date: Discussion  Source: OBERTHUR Technologies Information  Contact:
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Primitive End-to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting.
Draft-ietf-fecframe-config-signaling-02 1 FEC framework Configuration Signaling draft-ietf-fecframe-config-signaling-02.txt IETF 76 Rajiv Asati.
Introducing concept of M2M-application data modeling Group Name: MAS Source: FUJITSU Meeting Date: Agenda Item: Semantics and Device Configuration.
OneM2M Challenges of M2M Security and Privacy
M2M Service Session Management (SSM) CSF
E2EKey Resource Group Name: SEC WG Source: Qualcomm Inc., Wolfgang Granzow & Phil Hawkes Meeting Date: SEC#20.3, Agenda Item: End-to-End Security.
SE abstraction scenarios Group Name: SEC Source: Claus Dietze, Giesecke & Devrient Meeting Date: Agenda Item: WI SE abstraction.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
Protocol Issues related to Plugtest Group Name: TST Source: Wolfgang Granzow, Qualcomm Inc., Meeting Date: Agenda.
App End-to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date:
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
SEC #11 WG4 Status & Release 1 Outlook Group Name: Source:,, Meeting Date: Agenda Item:
End-to-End Primitive Security: Challenges and Suggestions Group Name: SEC WG Source: Qualcomm Inc., Phil Hawkes, Wolfgang Granzow, Josef Blanz Meeting.
Group Name: oneM2M WG1 Requirements Source: Phil Hawkes, Rapporteur “Benefits of oneM2M technology” TR,
Adding Non-blocking Requests Contribution: oneM2M-ARC-0441R01R01 Source: Josef Blanz, Qualcomm UK, Meeting Date: ARC 7.0,
Authorization Architecture Discussion Group Name: SEC WG Source: Seongyoon Kim, LG Electronics, Meeting Date: 28 MAY, 2014 Agenda.
Subscription and Notification Issue Group Name: WG2 Source: Qi Yu, Mitch Tseng- Huawei Technologies, Co. LTD. Meeting Date: ~23 Agenda Item:
Consideration Security Issues on Registration Group Name: WG4 (SEC) Source: Shingo Fujimoto, FUJITSU, Meeting Date:
Securing Access to Data Using IPsec Josh Jones Cosc352.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Thoughts on the LMAP protocol(s) LMAP Interim meeting, Dublin, 15 th September 2014 Philip Eardley Al Morton Jason Weil 1.
Introduction to Service Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP8 Agenda Item:
Possible options of using DDS in oneM2M Group Name: ARC Source: KETI, Huawei, Hitachi, China Unicom Meeting Date: Agenda Item: DDS binding.
[authenticationProfile] <mgmtObj> specialization
3GPP MBMS protocol stack
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
Service Enabled AE (SAE)
End-to-End Security for Primitives
Encryption and Network Security
Group multicast fanOut Procedure
2nd Interoperability testing issues
Possible options of using DDS in oneM2M
NIDD Discussion Points
MAF&MEF Interface Specification discussion of the next steps
Considering issues regarding handling token
CMDH Refinement Contribution: oneM2M-ARC-0397R01
Service Layer Dynamic Authorization [SLDA]
draft-ipdvb-sec-01.txt ULE Security Requirements
Uplink Broadcast Service
Summary of the MAF and MEF Interface Specification TS-0032
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
BPSec: AD Review Comments and Responses
Presentation transcript:

App and Management End- to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date: Agenda Item: WI-0016

Classifying scenarios Classify scenarios according who is trusted and who is untrusted (i.e. potential adversaries) Case 1: Only App/Mgmt End-points trusted – App/Mgmt end-points := entities producing and consuming the app/mgmt payloads – Trusted: App/mgmt end-points – Untrusted: Host CSE(s), Transit CSEs, everything not on delivery path – This is addressed in the present contribution Case 2: Host CSE also trusted – Trusted: App/mgmt end-points, Host CSE’s – Untrusted: Transit CSEs, everything not on delivery path – This is addressed in a separate contribution Case 3: Transit CSE’s also trusted – Trusted: everything on the delivery path – Untrusted: everyone not on the delivery path – Hop-by-hop security: TLS/DTLS already covers this case. – No need to discuss this case further 2

About the Adversaries The Host CSE(s) and Transit CSEs are assumed to be untrusted for this case – Otherwise can just use the existing hop-by-hop security Can assume that the Host CSE(s) will know – Resource path, type/structure of the resource, size of all attributes. Time of creation/update App/Mgmt end-points can only protect RW (Read/Write) attributes – Confidentiality of individual RW attributes – Integrity Detecting if individual RW attributes were altered Detecting if RW attributes were given the wrong name Detecting if the correct combination of RW attributes are in the same resource Detecting if the RW attributes are in the correct resource Detecting if the RW attributes are in the requested resource You can’t tell if Host CSE is lying about existence of resources 3

Primary target for this protection Application use cases –.content Management Use Cases –.[objectAttributes] (list) Consider firmware and software updates as a separate topic. –.execReqArgs Anything we specify to protect these attributes could also be applied to other attributes – But there does not seem to be a compelling use case Note that this case addresses protecting a resource (payload) and attributes - not protecting a primitive (message) 4

Application Case Characteristics (1) What is being protected? –.content Media Type – App protocol specific We are not even sure what protocols these will be! There could be many protocols Number of destinations? –.content supports “Multicast” behaviour: one sender, many receivers E.g. An AE CREATEs a resource which is RETRIEVEd by multiple Aes..content may be used with “Unicast” behavior: one sender and one receiver – Content producer might not know who the content consumer will be 5

Application Case Characteristics (2) Frequency – Frequency would depend on the specific scenario Some cases might have low frequency (e.g. emergency alerts). Other cases might have high frequency (home temperate sensor updates) – On average, content generally expect to created often Importance/Value of payload to the application stakeholders – Again, depends on the specific scenario Some cases might have high importance/value (e.g. emergency alerts). Most cases expected to have low importance/value (most home temperate sensor updates) – On average, content expected to have low importance/value 6

Management Case Characteristics (1) What is being protected? –.[objectAttributes] –.execReqArgs Media Type will be management protocol specific – We know what protocols are supported by oneM2M – There are only a few protocols, all support XML media type Number of destinations? – “Unicast” behaviour: one sender, one receiver Firmware and software updates and some other generic configuration may have same data sent to multiple destinations, but these can always use unicast if desired. Further, such data is likely to require data origin authentication and not protecting from Host CSE compromising confidentiality. This can be addressed with digital signatures. We are currently proposing to ignore these cases for Rel 2 – or at least discuss separately from other cases. – Content producer always knows who content consumer will be 7

Management Case Characteristics (2) Frequency – Mgmt use cases create resources with low frequency There may be occasionally scenarios creating resources with high frequency – but such cases would be expected to happened with very low frequency Importance/Value of payload to the management stakeholders layer – Generally, mgmt payloads have medium-high importance/value (when compared to app payloads) 8

Impact/Benefit Analysis.content System Impact: – many media types – multicast security – Provider doesn’t always know consumer – High frequency – Large system impact Benefit: – Low av. payload value Proposed Conclusion: – Generally* Large impact outweighs low benefit – Don’t consider general case in Rel 2.[objectAttributes] &.execReqArgs System Impact: – XML media type – unicast security – Provider always knows consumer – Low frequency – Small system impact Benefit: – Med-High payload value Proposed Conclusion: – Med-High Benefit outweighs small impact! – Consider for Rel 2 *In specific cases, benefit may be higher, and outweigh impact9

Analysis Conclusion Targeted – End-to-end security solution for.[objectAttributes] &.execReqArgs – Allow using to protect any resource Characteristics – XML media type – Unicast security – Content producer knows who the content consumer is – Infrequent transmission of high value resources Implies we can accept high overheads of using asymmetric (public key) crypto in every message “Sessionless” security (like S/MIME or OpenGPG) are viable 10

Recommended requirement The system shall support an end-to-end security mechanism protecting infrequent transmission of XML content to a single, known target entity 11