July 2, 2009
René Struik (Certicom Research) Slide 1
RFIDSec 2009
Sensor Security: A Kaleidoscopic View
René Struik (Certicom Research) E-mail: rstruik@certicom.com
Certicom Corp. is a wholly owned subsidiary of Research in Motion, Ltd.
Sensor Security: A Kaleidoscopic View Ren Struik (Certicom - - PowerPoint PPT Presentation
July 2, 2009 RFIDSec 2009 Sensor Security: A Kaleidoscopic View Ren Struik (Certicom Research) E-mail: rstruik@certicom.com Certicom Corp. is a wholly owned subsidiary of Research in Motion, Ltd. Slide 1 Ren Struik (Certicom Research)
July 2, 2009
René Struik (Certicom Research) Slide 1
RFIDSec 2009
Certicom Corp. is a wholly owned subsidiary of Research in Motion, Ltd.
July 2, 2009
René Struik (Certicom Research) Slide 2
RFIDSec 2009
2
Wheeling-Pittsburg Steel Corporation
Photo courtesy Dust Networks
July 2, 2009
René Struik (Certicom Research) Slide 3
RFIDSec 2009
3
The Promise of Wireless The Promise of Wireless
The Economist, April 28, 2007
July 2, 2009
René Struik (Certicom Research) Slide 4
RFIDSec 2009
This document is provided strictly for the purpose of gathering information leading to the development of an ISA standard, recommended practice or technical report. Copies may be reproduced and distributed, in whole or in part, but
draft standard development process.
July 2, 2009
René Struik (Certicom Research) Slide 5
RFIDSec 2009 Source: D. Balfanz, G. Durfee, R.E. Grinter, D.K. Smetters, P. Stewart, “Network-in-a-Box: How to Set Up a Secure Wireless Network in under a Minute,” in Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004.
July 2, 2009
René Struik (Certicom Research) Slide 6
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 7
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 8
RFIDSec 2009
This document is provided strictly for the purpose of gathering information leading to the development of an ISA standard, recommended practice or technical report. Copies may be reproduced and distributed, in whole or in part, but
draft standard development process.
July 2, 2009
René Struik (Certicom Research) Slide 9
RFIDSec 2009
PHY* PHY* Data Link TCP /IP Network Transport APP
Gateway
Data Link Network Data Link*
“Tunnel”
PHY Data Link Network
Router
APP Transport Network Data Link PHY
Edge Node
Network PHY
Source: Networking-Transport Diagrams ISA SP100.11a (Jay Werb, March 1, 2007).ppt
July 2, 2009
René Struik (Certicom Research) Slide 10
RFIDSec 2009
PHY functions Data Link functions Network functions Transport functions APP functions Device- wide parameters PHY parameters Data Link parameters Network parameters Transport parameters APP parameters AES RNG ECC Security protocols Security policies Keying material DeviceID communication stack layer-specific parameters shared functions and parameters Device potential implementation Address translation table DeviceID DLL address MAC address APP address Trans address Handed out by IEEE-RAC; static throughout lifecycle (no cloning, copying, etc.) short MAC add = Dynamically assigned; can be changed at will
Trusted module includes all security processing and secure and authentic storage
device, as well as policies
July 2, 2009
René Struik (Certicom Research) Slide 11
RFIDSec 2009
PHY functions Data Link functions Network functions Transport functions APP functions Device- wide parameters PHY parameters Data Link parameters Network parameters Transport parameters APP parameters AES RNG ECC Security protocols Security policies Keying material DeviceID communication stack layer-specific parameters shared functions and parameters Device potential implementation Address translation table DeviceID DLL address MAC address APP address Trans address Handed out by IEEE-RAC; static throughout lifecycle (no cloning, copying, etc.) short MAC add = Dynamically assigned; can be changed at will
July 2, 2009
René Struik (Certicom Research) Slide 12
RFIDSec 2009
PHY functions Data Link functions Network functions Transport functions APP functions Device- wide parameters PHY parameters Data Link parameters Network parameters Transport parameters APP parameters AES RNG ECC Security protocols Security policies Keying material DeviceID communication stack layer-specific parameters shared functions and parameters Device potential implementation Address translation table DeviceID DLL address MAC address APP address Trans address Handed out by IEEE-RAC; static throughout lifecycle (no cloning, copying, etc.) short MAC add = Dynamically assigned; can be changed at will
July 2, 2009
René Struik (Certicom Research) Slide 13
RFIDSec 2009
PHY functions Data Link functions Network functions Device- wide parameters PHY parameters Data Link parameters Network parameters AES RNG ECC Security protocols Security policies Keying material DeviceID communication stack layer-specific parameters shared functions and parameters Device potential implementation Address translation table DeviceID DLL address MAC address Handed out by IEEE-RAC; static throughout lifecycle (no cloning, copying, etc.) short MAC add = Dynamically assigned; can be changed at will
July 2, 2009
René Struik (Certicom Research) Slide 14
RFIDSec 2009
PHY functions MAC functions Device- wide parameters PHY parameters MAC parameters AES RNG ECC Security protocols Security policies Keying material DeviceID communication stack layer-specific parameters shared functions and parameters Device potential implementation Address translation table DeviceID MAC address Handed out by IEEE-RAC; static throughout lifecycle (no cloning, copying, etc.) short MAC add = Dynamically assigned; can be changed at will
July 2, 2009
René Struik (Certicom Research) Slide 15
RFIDSec 2009
PHY functions MAC functions Device- wide parameters PHY parameters MAC parameters AES RNG ECC Security protocols Security policies Keying material DeviceID communication stack layer-specific parameters shared functions and parameters Device potential implementation Address translation table DeviceID MAC address Handed out by IEEE-RAC; static throughout lifecycle (no cloning, copying, etc.) short MAC add = Dynamically assigned; can be changed at will
July 2, 2009
René Struik (Certicom Research) Slide 16
RFIDSec 2009
Network functions Transport functions APP functions Device- wide parameters Network parameters Transport parameters APP parameters AES RNG ECC Security protocols Security policies Keying material DeviceID communication stack layer-specific parameters shared functions and parameters Device potential implementation Address translation table DeviceID APP address Trans address Handed out by IEEE-RAC; static throughout lifecycle (no cloning, copying, etc.) = Dynamically assigned; can be changed at will
July 2, 2009
René Struik (Certicom Research) Slide 17
RFIDSec 2009
PHY functions Data Link functions Network functions Transport functions Device- wide parameters PHY parameters Data Link parameters Network parameters Transport parameters APP1 funct(1) APP parm(1) AES RNG ECC Security protocols Security policies Keying material DeviceID communication stack layer-specific parameters shared functions and parameters Device potential implementation Address translation table DeviceID DLL address MAC address APP addr(1,…,n) Trans address Handed out by IEEE-RAC; static throughout lifecycle (no cloning, copying, etc.) short MAC add = Dynamically assigned; can be changed at will
APP funct(n) APP parm(n) … …
July 2, 2009
René Struik (Certicom Research) Slide 18
RFIDSec 2009
Stack device (communication module) Application “plug-ins”
A Multi-application Module (single device) … App(1) App(2) App(n-1) App(n)
July 2, 2009
René Struik (Certicom Research) Slide 19
RFIDSec 2009
“Lower”-stack devices (plug-in transceivers) “Upper”-stack device (“router function”)
A1 B
A(n-1)
A2 An … Multi-device Module
July 2, 2009
René Struik (Certicom Research) Slide 20
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 21
RFIDSec 2009 “Perimeter Security” “No Perimeter Security”
July 2, 2009
René Struik (Certicom Research) Slide 22
RFIDSec 2009
“Perimeter Security” “No Perimeter Security”
July 2, 2009
René Struik (Certicom Research) Slide 23
RFIDSec 2009 “Perimeter Security” “No Perimeter Security”
July 2, 2009
René Struik (Certicom Research) Slide 24
RFIDSec 2009
engine
July 2, 2009
René Struik (Certicom Research) Slide 25
RFIDSec 2009
1Deployment scenarios discussed with ZigBee, ISA SP100.11a user community
July 2, 2009
René Struik (Certicom Research) Slide 26
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 27
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 28
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 29
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 30
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 31
RFIDSec 2009
A RA CA (qA, QA) QA IdA (IdA, QA) (IdA, QA) A N C (IdCA, WCA) A Policies (qA, QA), IdA
ConfigSet:=∅ CASet:=∅
IdA, CertCA(IdA,KeyInfoA), signCA Name server IdA InfoA Device roles Keying information Device information
A Ordinary device (qA, QA) ephemeral private/public key A IdA identifier of device A RA Registration authority (a, CertA) private key, resp. certificate A IdCA identifier of CA CA Certificate authority WCA public root key CA IdC identifier of C N Name server signCA signature over certificate info C Configuration manager KeyInfoA keying information for device A
(qA, QA), IdA
ConfigSet:={IdC} CASet:={(IdCA,WCA)}
(a, CertA), IdA
ConfigSet:={IdC} CASet:={(IdCA,WCA)}
(IdA, CertA)
qCA
July 2, 2009
René Struik (Certicom Research) Slide 32
RFIDSec 2009
A RA CA (qA, QA) QA IdA (IdA, QA) (IdA, QA) A N C (IdCA, WCA) A Policies (qA, QA), IdA
ConfigSet:=∅ CASet:=∅
IdA, CertCA(IdA,KeyInfoA), signCA Name server IdA InfoA Device roles Keying information Device information
A Ordinary device (qA, QA) ephemeral private/public key A IdA identifier of device A RA Registration authority (a, CertA) private key, resp. certificate A IdCA identifier of CA CA Certificate authority WCA public root key CA IdC identifier of C N Name server signCA signature over certificate info C Configuration manager KeyInfoA keying information for device A
(qA, QA), IdA
ConfigSet:={IdC} CASet:={(IdCA,WCA)}
(a, CertA), IdA
ConfigSet:={IdC} CASet:={(IdCA,WCA)}
(IdA, CertA)
qCA
Bootstrapping mechanism Device identification
July 2, 2009
René Struik (Certicom Research) Slide 33
RFIDSec 2009
(a, CertA), IdA
CASet:={(IdCA,WCA)}
A (a, CertA) IdA LabelA Device roles Keying information Device information
A Ordinary device (a, CertA) private key, resp. certificate A IdA identifier of device A CA Certificate authority WCA public root key CA IdCA identifier of CA
Type of binding
KeyInfoA keying information for device A LabelA label of device A logical link physical link
(IdCA, WCA) A WA IdA a LabelA CertCA(IdA, KeyInfoA) KeyInfoA
July 2, 2009
René Struik (Certicom Research) Slide 34
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 35
RFIDSec 2009
Communication technology
may be possible without routing)
Devices
Network Characteristics
Interaction with outside world
NOTE: Presentation relies on concepts only, but assumes distinct network coordinator role
July 2, 2009
René Struik (Certicom Research) Slide 36
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 37
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 38
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 39
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 40
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 41
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 42
RFIDSec 2009
1Figures indicative only, courtesy Melexis Telecom (June 2003)
July 2, 2009
René Struik (Certicom Research) Slide 43
RFIDSec 2009
1Figures on ATMel ATMega 128L processor, 16 MHz, 128K RAM 2Johann Großschädl, 2001
July 2, 2009
René Struik (Certicom Research) Slide 44
RFIDSec 2009
22 octets 8 octets 8 octets 10 octets
(total: 48 octets)
1Certicom-internal 2SAC 2008 conference
July 2, 2009
René Struik (Certicom Research) Slide 45
RFIDSec 2009
This document is provided strictly for the purpose of gathering information leading to the development of an ISA standard, recommended practice or technical report. Copies may be reproduced and distributed, in whole or in part, but
draft standard development process.
July 2, 2009
René Struik (Certicom Research) Slide 46
RFIDSec 2009
Note: Security architectural framework with symmetric-key key establishment is very similar to that with public-key key establishment (details omitted here).
July 2, 2009
René Struik (Certicom Research) Slide 47
RFIDSec 2009
key distribution A B Data key repository Data key maintenance Data key repository Data key maintenance Wrapped data key info Wrapped data key info data transfer A B Wrapped data Wrapped data Encryptor/ decryptor Encryptor/ decryptor data data Data key Key info Key info Data key Upper layers Upper layers Network and down Network and down ACL Maintenance
ACL ACL
ACL Maintenance ACL initialization ACL initialization
B
A Authentication, key establishment Wrapped public key info Extracted public key info Wrapped public key info Extracted public key info Public key verification CA key initialization Certificate maintenance Public key verification CA key initialization Certificate maintenance (Link key, A, B) (Link key, A, B)
July 2, 2009
René Struik (Certicom Research) Slide 48
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 49
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 50
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 51
RFIDSec 2009
challenge response
July 2, 2009
René Struik (Certicom Research) Slide 52
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 53
RFIDSec 2009
Informational elements (provided by device itself) (1) Global device Id. Each device has own static global device Id (IEEE MAC address). (2) Public key (in public-key scenario). Each device has its own public/private key pair (PA, SA). {The public key PA need not to be stored on the device itself.} (3) Access control list (ACL) (if desired). Each device has own set of devices it may wish to establish a secure peer-to-peer link key with. (4) TrustSet (in dynamic-trust scenario). Each device has own set of devices it trusts to assume the role of security manager. (5) CA-Set (in dynamic-trusted party scenario). Each device has own set of devices it trusts to assume the role of trusted third party. (6) ConfigSet (in dynamic configuration manager scenario). Each device has own set of devices it trusts to assume role of configuration manager. (7) ACL-Δ-Set (in dynamic-trust scenario). Each device has own set of devices it trusts to change the ACLSet. (8) Trust-Δ-Set (in dynamic-trust scenario). Each device has own set of devices it trusts to change the TrustSet. (9) CA-Δ-Set (in dynamic trusted party scenario). Each device has own set of devices it trusts to change the CA-Set. (10)Config-Δ-Set (in dynamic configuration manager scenario). Each device has own set of devices it trusts to change the ConfigSet.
July 2, 2009
René Struik (Certicom Research) Slide 54
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 55
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 56
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 57
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 58
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 59
RFIDSec 2009
1 1 4 to 20 1 0, 1, 5, or 9 0-4 0, 4, 8, or 16 2
D1
Frame Control Sequence Number Addressing fields Security Control Field Explicit Key Identifier Frame Counter Integrity code (encrypted) FCS Integrity code MFR Payload field MAC payload New MHR MHR n Data Payload (encrypted) Auxiliary security frame header
Fields to be authenticated Fields to be authenticated and encrypted Remaining fields
2 1 4 to 20 1 0, 1, 5, or 9 0-4 0, 4, 8, or 16 2
D1
Frame Control Sequence Number Addressing fields Security Control Field Explicit Key Identifier Frame Counter Integrity code (encrypted) FCS Integrity code MFR Payload field MAC payload New MHR MHR n Data Payload (encrypted) Auxiliary security frame header 2 1 4 to 20 1 0, 1, 5, or 9 0-4 0, 4, 8, or 16 2
D1
Frame Control Sequence Number Addressing fields Security Control Field Explicit Key Identifier Frame Counter Integrity code (encrypted) FCS Integrity code MFR Payload field MAC payload New MHR MHR n Data Payload (encrypted) Auxiliary security frame header
No crypto expansion No crypto expansion Reduce Security overhead Reduce MAC header overhead
July 2, 2009
René Struik (Certicom Research) Slide 60
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 61
RFIDSec 2009
Fields to be authenticated Fields to be authenticated and encrypted Remaining fields
2 1 4 to 20 1 0, 1, 5, or 9 0-4 0, 4, 8, or 16 2
D1
Frame Control Sequence Number Addressing fields Security Control Field Explicit Key Identifier Frame Counter Integrity code (encrypted) FCS Integrity code MFR Payload field MAC payload New MHR MHR n Data Payload (encrypted) Auxiliary security frame header 1 1 4 to 20 1 0, 1, 5, or 9 0-4 0, 4, 8, or 16 2
D1
Frame Control Sequence Number Addressing fields Security Control Field Explicit Key Identifier Frame Counter Integrity code (encrypted) FCS Integrity code MFR Payload field MAC payload New MHR MHR n Data Payload (encrypted) Auxiliary security frame header
Reduce Security overhead Reduce MAC header overhead No frame check sequence
1 with typical payloads
5 7 9 13 6 8 10 14 7 9 11 15 8 10 12 16 9 11 13 17 small +CRC +authenticity MAC payload
July 2, 2009
René Struik (Certicom Research) Slide 62
RFIDSec 2009
1 1 n+3
A1
sFCF Sequence Number ACK payload (encrypted and authenticated) FCS Payload field MFR MAC payload MHR MAC Header
2 1 2 Frame Control Sequence Number FCS MFR MHR
Fields to be authenticated Fields to be authenticated and encrypted Remaining fields
1 With incorporation of “frame security dream” 2 With removal of CRC-16 FCS
July 2, 2009
René Struik (Certicom Research) Slide 63
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 64
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 65
RFIDSec 2009
ACL ACL
ACL Maintenance ACL Maintenance ACL initialization ACL initialization
B
A Authentication, key establishment Wrapped public key info Extracted public key info Wrapped public key info Extracted public key info Public key verification CA key initialization Certificate maintenance Public key verification CA key initialization Certificate maintenance (Link key, A, B) (Link key, A, B)
July 2, 2009
René Struik (Certicom Research) Slide 66
RFIDSec 2009
Step 1: Key contributions Each party randomly generates a short-term (ephemeral) public key pair and communicates the ephemeral public key to the other party (but not the private key). Step 2: Key establishment Each party computes the shared key based on static and ephemeral public keys received from the other party and static and ephemeral private keys it generated itself. Step 3: Key authentication Each party verifies the authenticity of the static key of the
Step 4: Key confirmation Each party evidences possession of the shared key to the
party.
Alice RND X, Certificate A RND Y, Certificate B MAC over messages MAC over messages Bob
July 2, 2009
René Struik (Certicom Research) Slide 67
RFIDSec 2009
Step 1: Key contributions Each party randomly generates a short-term (ephemeral) public key pair and communicates the ephemeral public key to the other party (but not the private key). Step 2: Key establishment Each party computes the shared key based on static and ephemeral public keys received from the other party and static and ephemeral private keys it generated itself. Step 3: Key authentication Each party verifies the authenticity of the static key of the
Step 4: Key confirmation Each party evidences possession of the shared key to the
party.
Alice RND X, Certificate A RND Y, Certificate B MAC over messages MAC over messages Bob
Offline fixed point multiplication Online variable point multiplication Online verification of public key certificate
July 2, 2009
René Struik (Certicom Research) Slide 68
RFIDSec 2009
…
July 2, 2009
René Struik (Certicom Research) Slide 69
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 70
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 71
RFIDSec 2009
July 2, 2009
René Struik (Certicom Research) Slide 72
RFIDSec 2009
Security constraints
Adhoc networks
Sensor networks
July 2, 2009
René Struik (Certicom Research) Slide 73
RFIDSec 2009
Contact info René Struik Phone: +1 (905) 501-6083 Certicom Research Email: rstruik@certicom.com Research interests Core crypto
Adhoc sensor networks
Security constraints
Adhoc networks
Sensor networks