14
PAWS: Security PAWS: Security Considerations Considerations Yizhuang WU, Yang CUI PAWS WG IETF#84 @Vancouver 2012.07.30

PAWS: Security Considerations

  • Upload
    yepa

  • View
    40

  • Download
    0

Embed Size (px)

DESCRIPTION

PAWS: Security Considerations. Yizhuang WU, Yang CUI PAWS WG IETF#84 @Vancouver 2012.07.30. Motivations. White space spectrum is a valuable resource, Business chances Attract attention from regulatory bodies in different countries A great number of potential users - PowerPoint PPT Presentation

Citation preview

Page 1: PAWS: Security Considerations

PAWS: Security PAWS: Security ConsiderationsConsiderations

Yizhuang WU, Yang CUI

PAWS WGIETF#84

@Vancouver 2012.07.30

Page 2: PAWS: Security Considerations

MotivationsMotivationsWhite space spectrum is a

valuable resource,◦Business chances◦Attract attention from regulatory

bodies in different countries◦A great number of potential users◦Security and Privacy need to be

carefully taken care of…Refer to PAWS WG charter,

further

Page 3: PAWS: Security Considerations

Security threatsSecurity threatsVarious security threats can be

summarized as follows from a security point of view:◦ Impersonation of a master device◦ Impersonation of a database◦ Man in the middle node on the interface

between master device and database◦ Attacks on the link of interface between

master device and database◦ Attacks on the master device itself

Page 3

Page 4: PAWS: Security Considerations

Security featuresSecurity featuresTo thwart the above security threats, the

security mechanism shall be able to provide the following security features:◦ Mutual entity authentication and both of them shall

be authorized ◦ Data confidentiality◦ Data integrity◦ Anti-Replay◦ Trusted environment or something equivalent

The security mechanism TLS is recommended to be used in PAWS.

Page 4

Page 5: PAWS: Security Considerations

This proposalThis proposalAn informational draft,

◦Design and implement PAWS security◦Check security and privacy (ongoing) requ.◦Provide Autho. & Authe. models.

RBWS models TLS mutual authentication (rather than

unilateral)◦Protection in different layers by distinct

use cases.◦Agility of Crypto and Security Protocols

(ongoing)◦…

A WG draft on security, as a starting point to discuss?

Page 6: PAWS: Security Considerations

AppendixAppendix

Page 7: PAWS: Security Considerations

Authentication model Authentication model For business reasons or ease of

management, databases may be deployed by different third-party that is authorized by regulatory body of white space. There are two possible deployment cases: 1. one is that the databases deployed by the third-party

which are authorized by regulatory body of white space;

2. the other is that the databases are directly deployed by regulatory body of white space

The requirements on authentication should be considered respectively

Page 7

Page 8: PAWS: Security Considerations

Database deployed by third-Database deployed by third-partyparty

Authentication model 1

◦ the security channel will be established between master device and database, only the database can establish connection with RBWS.

◦ In this model ,the master device needs to obtain IP connectivity with database, which require an access authentication, which is independent of authentication run in authorized procedure in RBWS(Regulatory Body of White Space ). It means that the mutual authentication shall be implemented in TLS establishment procedure before the authorized procedure of RBWS.

◦ Two suites credentials are needed: one is provided by trusted authority of third-party, the other is provided by authority of RBWS

Page 8

Page 9: PAWS: Security Considerations

Database deployed by third-Database deployed by third-partyparty Authentication model 2

◦ the security channel will be established between master device and database, both of master device and database can connect to RBWS.

◦ The differences from model 1 is master device can directly connect to RBWS to get the authorized information.

Page 9

Page 10: PAWS: Security Considerations

Databases deployed by Databases deployed by regulatory body of white spaceregulatory body of white space

Authentication model 3

◦ Only one suite credential is needed which is provided by authority of RBWS

◦ the secure channel shall be established to protect the communication between the master device and the database.

Page 10

Page 11: PAWS: Security Considerations

TLS establishment TLS establishment procedureprocedure

Page 11

Page 12: PAWS: Security Considerations

TLS establishment TLS establishment procedureprocedureThe first stage: security capabilities including

protocol version, session ID, cipher suite, compression method, and initial random numbers are established.

The second stage: certificate, key exchange, and request certificate may be sent by database.

The third phase: master device sends certificate if requested. Key exchange and certificate verification may be sent by master device.

The last phase: change cipher suite and finish handshake protocol.

Page 12

Page 13: PAWS: Security Considerations

A bad example - Mutual A bad example - Mutual authentication in mixed authentication in mixed layerslayers

Authentication of both parties in TLS establishment procedure

TLS for database authentication, and master device authentication over TLS by running other authentication protocol. This method is not recommended because such a mixed mode usage opens up the possibility to run a man-in-the-middle attack for impersonating the legitimate client.◦ RFC4196◦ Asokan et al’s attack since 2002

Page 14: PAWS: Security Considerations

Thank you!Thank you!