Download presentation
Presentation is loading. Please wait.
Published byProsper Kennedy Modified over 9 years ago
1
End-to-End security definition Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, phawkes@qti.qualcomm.comphawkes@qti.qualcomm.com Meeting Date: 2015-05-18 Agenda Item: WI-0016
2
What is End-to-End Security End-to-End suggests that security protocol end-points are also the end-points of the protected protocol – Assumes that all other entities on the delivery path are untrusted. Application protocol Examples – End-to-End security for AE protocols would have AEs as the security protocol end-points – End-to-End security for management protocol content would have mgmt server and mgmt target as the security protocol end-points oneM2M Service Layer protocol examples – End-to-End security for oneM2M primitives would have the Originator and resource-hosting CSE asthe security protocol end-points Is this what we wanted? – Sometimes it is OK (or preferable) for one or more trusted CSEs on the delivery path to be the security protocol end-points
3
Example 1: Smart Meter Smart Meter deployment – Smart meter contains AEs and a CSE: generates readings Trusted by utility to maintain confidentiality & integrity of readings – Home gateway (Transit CSE): provides internet NOT trusted by utility to maintain integrity of readings – IN-CSE: Stores readings Trusted by utility to maintain confidentiality & integrity of readings – Utility AE retrieves readings from IN-CSE – Assume all hops secured using TLS A sensible choice of security end-points to protect readings from untrusted home gateway is – Smart-meter CSE: encryption and digital signature/MAC generation – IN-CSE decryption and digital signature/MAC verification
4
Example 2: eHealth eHealth deployment – Sensor contains AE: generates readings Talks securely to medical sensor hub, but can’t talk securely with eHealth Service AE – eHealth Hub CSE: stores readings for retrieval by eHealth Service AE Trusted by eHealth service to maintain confidentiality & integrity of readings – IN-CSE: forward messages between eHealth Hub and medical service AE Not trusted, by law, see readings in decrypted form – eHealth Service AE: retrieves readings from eHealth Hub CSE A sensible choice of security end-points to protect readings from IN-CSE is – eHealth Hub CSE : encryption and digital signature/MAC generation – eHealth Service AE decryption and digital signature/MAC verification
5
Proposed Definition End-to-End Security: mechanisms securing a payload or message so that it can be handled by untrusted entities on the delivery path The corresponding change to TR-0012 is proposed in SEC-2015-0512 “TR-0012 End-to-End Security Definition” © 2014 oneM2M Partners 5
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.