security considerations for ieee 802.15.4 networks

35
Security Considerations for IEEE 802.15.4 Networks Karthikeyan Mahadevan

Upload: jennifer-lane

Post on 02-Jan-2016

25 views

Category:

Documents


2 download

DESCRIPTION

Security Considerations for IEEE 802.15.4 Networks. Karthikeyan Mahadevan. Martin Cooper’s Law. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Security Considerations for IEEE 802.15.4 Networks

Security Considerations for IEEE 802.15.4 Networks

Karthikeyan Mahadevan

Page 2: Security Considerations for IEEE 802.15.4 Networks

Martin Cooper’s Law

Cooper's Law, (after ArrayComm Chairman, Martin Cooper), states that the number of conversations (voice and data) conducted over a given area, in all of the useful radio spectrum, has doubled every two and a half years for the last 105 years, ever since Marconi discovered radio in 1895

Page 3: Security Considerations for IEEE 802.15.4 Networks

What is IEEE 802.15.4

IEEE 802.15.4 LR WPAN is a task group for developing a standard for Low – Rate Wireless Personal Area Networks

Wireless is gone beyond office and home to new environments like factories, hospitals and military applications

Page 4: Security Considerations for IEEE 802.15.4 Networks

Goals of IEEE 802.15.4

Very low power consumption: The largest consumer of energy on a wireless device is the radio.

Very low cost

Page 5: Security Considerations for IEEE 802.15.4 Networks

Constraints

Low power – Energy is very limited Must be carefully used

No human intervention Lifetime – depends order of

months to years In summary the software must be

correct and minimal

Page 6: Security Considerations for IEEE 802.15.4 Networks

Why are we interested?

Application domain ranges from wireless gaming to military applications

Certain classes of these applications needs security Communication medium is RF…

This concern is addressed in the 802.15.4 specification – Link Layer Security

Page 7: Security Considerations for IEEE 802.15.4 Networks

Contributions

Critical analysis of the security features of 802.15.4

Outlines the problems Recommendations Targeted audience

Radio designers Application Developers

Page 8: Security Considerations for IEEE 802.15.4 Networks

Overview of 802.15.4 Security

The basic features provided by the link layer security protocol are Access Control Message Integrity Message Confidentiality Replay Protection

Page 9: Security Considerations for IEEE 802.15.4 Networks

Access Control and Message Integrity

Unauthorized entities should not be part of a secure network

A mechanism to detect the above scenario

Message integrity – message tampering should be detected – MAC

Requires communicating parties to share a secret

Page 10: Security Considerations for IEEE 802.15.4 Networks

Confidentiality Means of achieving – encryption Notion of “Semantic Security”

The encryption must prevent an adversary from learning even partial information about the message

This means that encryption of the same plaintext twice should result in different cipher texts

Nonce

Page 11: Security Considerations for IEEE 802.15.4 Networks

Replay Protection

Adversary eavesdrops a message from a legitimate sender and replays it after a time delay ‘x’

Sequence numbers – increased with every packet

Page 12: Security Considerations for IEEE 802.15.4 Networks

802.15.4 Stack

LLC – Logical Link Control

SSCS – Service Specific Convergence Sub layer

Page 13: Security Considerations for IEEE 802.15.4 Networks

802.15.4 Protocol

Each node has 64 – bit Node ID 16 – bit Network ID

(A node could use 16-bit Node ID) Two types of packets (relevant to

security) Data ACK (Sender explicitly requests it)

Page 14: Security Considerations for IEEE 802.15.4 Networks

Data and ACK packet formats

Page 15: Security Considerations for IEEE 802.15.4 Networks

Where is security ? Handled by the Media access control layer The application controls the security required By default – “NO Security” Four types of packets

Beacon, Data, ACK, Control packets for MAC Layer NO Security for ACK packets The other packets can optionally use

encryption or integrity checks

Page 16: Security Considerations for IEEE 802.15.4 Networks

Security Suites No security – NULL AES-CTR - Encryption only, CTR Mode AES-CBC-MAC – MAC only (options of

32bit, 64bit and 128bit MAC’s) AES-CCM – Encryption and MAC (options

of 32bit, 64bit and 128bit MAC’s) Replay protection can be turned on or

off for any of the above

Page 17: Security Considerations for IEEE 802.15.4 Networks

How does it work? Application decides the choices on the

security level. (A bool value) Access Control Lists are used to enforce

these security levels (max up to 255 entries)

If security is enforced then the MAC layer looks up the ACL table for the cryptographic material for the destination

Page 18: Security Considerations for IEEE 802.15.4 Networks

Cont’d

On packet reception, based on the flags the MAC layer decides how to process the packet

ACL Entry Format

Page 19: Security Considerations for IEEE 802.15.4 Networks

Details of Security Suites

NULL – no security, mandatory in all chips

AES-CTR (Confidentiality alone) Break plain text into 16-byte blocks

p1,…,pn

Compute cipher text ci = pi xor Ek(xi) CTR or Nonce xi is necessary for the

receiver to decrypt

Page 20: Security Considerations for IEEE 802.15.4 Networks

Nonce Is made up of Static flags field Sender’s address 3 counters

4 byte frame counter (identifies the packet) 1 byte key counter 2 byte block counter (numbers the 16 byte

blocks in a packet)

Page 21: Security Considerations for IEEE 802.15.4 Networks

More on Nonce Frame counter controlled by the hardware radio Sender increments it after every packet When reaches max value no further encryptions

are possible Key counter – application’s control

Used when frame counter has reached its max value

Goal of frame and key counter is to prevent nonce reuse (in a single key’s life-time)

Use of block counter ensure different nonce’s are used for each block need not be transmitted

Page 22: Security Considerations for IEEE 802.15.4 Networks

AES-CBC-MAC Sender has options of 4, 8 or 16 byte

MAC Communicating parties have to share a

key

Page 23: Security Considerations for IEEE 802.15.4 Networks

AES-CCM Applies CBC-MAC over the header

and the data Encrypts the data MAC on both using AES-CTR mode

Page 24: Security Considerations for IEEE 802.15.4 Networks

Replay Counter

Applicable to AES-CTR and AES-CCM suites

The replay counter is 5 bytes long Frame counter Key Counter (MSB)

Note: This is same as the nonce but is used for a different purpose.

Page 25: Security Considerations for IEEE 802.15.4 Networks

Problems

Three classes Nonce management Key management Integrity protection

Page 26: Security Considerations for IEEE 802.15.4 Networks

Nonce Problems Same Key in Multiple ACL entries

If used, very likely that nonce is also reused This could break the confidentiality

Simple solution If using the same key then use only one ACL

entry, after sending the first packet, change the ACL entry (the software must keep track of which destinations are in play)

Page 27: Security Considerations for IEEE 802.15.4 Networks

Nonce Problems Loss of ACL – Power Failure

Assuming that the ACL is restored, what about the nonces?

The authors say that the 802.15.4 lacks clarity in this issue

Recommendation – re-key after power failure

Related issue – what happens when the node is sleeping

Again there is presumably no clarity in the specification

Page 28: Security Considerations for IEEE 802.15.4 Networks

Key Management Problems No group keying

First approach: Assign different ACL entries for all the nodes in the group and use the same key (Nonce management problem, ACL will be large)

Second approach: Single ACL entry – heavy, since for every destination the ACL has to be changed. Assuming the receivers also employ the same strategy then the receiver must switch the ACL before a packet arrives from a destination other than that in the current ACL

Page 29: Security Considerations for IEEE 802.15.4 Networks

Key Management Problems

Replay protection is incompatible with group keying Node x transmits 100 messages, so

replay counter is at 99 now Node y starts transmission, its replay

counter is going to 0, so the packets are dropped.

Page 30: Security Considerations for IEEE 802.15.4 Networks

Nonce and Replay Counter

Nonce is bound to the key – incremented with every message that is sent should use a different nonce (if two different entries use the same key, they share a nonce)

Replay counter is bound to the sender’s address. If two ACL entries share a key, they still have different replay counters.

Page 31: Security Considerations for IEEE 802.15.4 Networks

Integrity protection Problems Unauthenticated encryption

Recommendation – do not use AES-CTR DoS on AES-CTR

Two parties X and Y communicating (Replay protection is enabled)

Attacker sends a very high value for the key and frame counter with garbage with sender ID X

This would cause the messages from legitimate sender to be dropped.

Page 32: Security Considerations for IEEE 802.15.4 Networks

Integrity protection Problems

ACK without MAC Sequence number sent in clear Adversary can send ACK’s

Page 33: Security Considerations for IEEE 802.15.4 Networks

Take - away Application Designers

Do not use AES-CTR Do not rely on ACK

Hardware Designers Support for 255 ACL entries (depends on the

size of the network) Retail ACL in low power mode (if possible

nonces too) Do not support AES-CTR

Page 34: Security Considerations for IEEE 802.15.4 Networks

Take - away

Specification writers Warn against Dangerous ACL

configurations Better support for various keying

models Do not support AES-CTR Authenticated ACK

Page 35: Security Considerations for IEEE 802.15.4 Networks

References

Naveen Sastry and David Wagner, “Security Considerations for IEEE 802.15.4 Networks”. ACM Workshop on Wireless Security WiSe 2004, October 2004