ZigBee Security. Robert Cragie Chair, ZigBee Alliance ZARC Securit y Task Group Principal Engineer, Jennic Ltd.



Similar documents
An Overview of ZigBee Networks

UG103.5 EMBER APPLICATION DEVELOPMENT FUNDAMENTALS: SECURITY

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

ZigBee Security. Introduction. Objectives

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Chapter 17. Transport-Level Security

The Secure Sockets Layer (SSL)

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Wireless security. Any station within range of the RF receives data Two security mechanism

Chapter 6 CDMA/802.11i

As enterprises conduct more and more

Web Security Considerations

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Recommended Practices Guide For Securing ZigBee Wireless Networks in Process Control System Environments Draft

Huawei WLAN Authentication and Encryption

Network Security Technology Network Management

Network Access Security. Lesson 10

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Network Security Part II: Standards

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Networking Test 4 Study Guide

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Considerations on Security in ZigBee Networks

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Savitribai Phule Pune University

tcpcrypt Andrea Bittau, Dan Boneh, Mike Hamburg, Mark Handley, David Mazières, Quinn Slack Stanford, UCL

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Secure SCADA Network Technology and Methods

AN1066. MiWi Wireless Networking Protocol Stack CONSIDERATIONS INTRODUCTION TERMINOLOGY FEATURES

Communication Systems SSL

Chapter 9. IP Secure

Wireless Networks. Welcome to Wireless

GSM and UMTS security

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

Internet of #allthethings

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

How To Secure The Internet Of Things

Computer Networks. Secure Systems

First Semester Examinations 2011/12 INTERNET PRINCIPLES

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Recommended Wireless Local Area Network Architecture

ETHERNET ENCRYPTION MODES TECHNICAL-PAPER

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

4.1: Securing Applications Remote Login: Secure Shell (SSH) PEM/PGP. Chapter 5: Security Concepts for Networks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Grant agreement no: Project Acronym: INTrEPID Project Title: INTelligent systems for Energy Prosumer buildings at District level

Chapter 10 Security Protocols of the Data Link Layer

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

Cornerstones of Security

Using etoken for SSL Web Authentication. SSL V3.0 Overview

WIRELESS SECURITY IN (WI-FI ) NETWORKS

Chapter 10. Network Security

Web Security: Encryption & Authentication

Overview. SSL Cryptography Overview CHAPTER 1

chap18.wireless Network Security

A Comprehensive Review of Wireless LAN Security and the Cisco Wireless Security Suite

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

ACC , Cisco Systems, Inc. All rights reserved.

Chapter 7 Transport-Level Security

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Netzwerksicherheit: Anwendungen

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

ZigBee IP Network Performance, Part I Unicast Messaging under SEP2.0 HAN Messaging Profile

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Securing IP Networks with Implementation of IPv6

CS 356 Lecture 29 Wireless Security. Spring 2013

Thingsquare Technology

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

TECHNICAL NOTE REFERENCE DOCUMENT. Improving Security for Axis Products. Created: 4 October Last updated: 11 October Rev: 1.

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

The next generation of knowledge and expertise Wireless Security Basics

Properties of Secure Network Communication

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Secure Network Communications FIPS Non Proprietary Security Policy

Chapter 2 - The TCP/IP and OSI Networking Models

APPLICATION NOTE. Atmel AT02597: ZigBee PRO Packet Analysis with Sniffer. Atmel MCU Wireless. Features. Description

Lecture 17 - Network Security

Internet of Things. Laurent Toutain. June 11, Caen () IPv6 opérateur June 11, / 14

Network Authentication X Secure the Edge of the Network - Technical White Paper

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Case Study for Layer 3 Authentication and Encryption

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Securing Distribution Automation

Module 1: e- Learning

Transcription:

ZigBee Security Robert Cragie Chair, ZigBee Alliance ZARC Securit y Task Group Principal Engineer, Jennic Ltd. 1

Security in the ZigBee stack 2

Specification constraints The specification assumes an 'open trust' model where the protocol stack layers trust each other This is not unreasonable for the type of devices ZigBee is aimed at, e.g. single-chip wireless microcontrollers executing the whole stack on a single CPU This implies that cryptographic protection only occurs bet ween devices The same security suite level is used for all services 3

Security services provided The ZigBee Security Services provided in the specificat ion are: Key est ablishment Key transport Frame protection Device authorization 4

The Trust Center To function securely in a network, a device must have a counterpart device which it can trust to obtain keys and which controls access ZigBee therefore introduces the concept of the Trust Center, which Stores the keys for the network Uses the security services to configure a device with its key(s) Uses the security services to authorize a device onto the network The ZigBee Coordinator is usually designated the Trust Center 5

Sym metric key dist ribution ZigBee security is based on symmetric keys Both originator and recipient of a protected transaction need to share the same key That key is used directly in the security t ransformat ion How does this key get to both ends? Three basic met hods Pre-inst allat ion Transport Est ablishment 6

Distribution m ethods Pre-installation is where keys are placed into device using out-of-band method, e.g. commissioning t ool Transport is where the Trust Center sends the key (securely wherever possible) to the device Establishment is where the device negotiates with the Trust Center and keys are established at either end without being transported SKKE (Symmetric Key Key Establishment) CBKE (Certificate-based Key Establishment) ASKE (Alpha-secure Key Est ablishment) 7

Key types There are three key types: Master key Shared key for SKKE only Link key Network key 8

Link key Key which is uniquely shared between two and only two devices for protecting frames at the APS layer One of those devices is normally the Trust Cent er Usually dynamically established using key est ablishment service Can also be pre-installed or transported from the Trust Center 9

Network key Global key which is used by all devices in the net work A set of network keys is held by the Trust Center and current network key is identified by a key sequence number Usually transported from the Trust Center Can also be pre-inst alled Two stage update mechanism Update new key and associated key sequence number Switch to new key sequence number 10

Common Security Model Some confusion due to flexibility in specificat ion A common secur ity model was developed Use of network key with pre-configured Trust Center link keys Pre-configured TC link key protects the transport of the network key Additional link keys can be transported or est ablished using higher-layer mechanism Secure communication cluster in SE/ HC profile 11

Fram e protection The security suite used is AES-CCM* The security level used in ZigBee (level 5) means AES_CCM* is the same as AES-CCM AES-CCM is NIST special publicat ion 800-38C Low-cost implementation in terms of resources Some wireless microcontrollers have hardware support for AES-CCM or AES-CCM* Two parts to protection Encrypt ion Integrity protection ZigBee security uses level 5 in the AES-CCM* suite Encrypt ed MIC length 4 octets 12

Encryption and Integrity protection Encryption scrambles the original data (called plaintext in 'security speak') into cipher text Encryption prevents an eavesdropper from being able to int erpret frame payload Integrity protection adds a Message Integrity Code (MIC) to be transported along with the data to be protected The MIC 'signs' the data and allows the recipient to verify that the data has not been tampered with The MIC is also bound to the identity (IEEE address) of the originator and thus provides origin authenticity Without integrity protection, a rogue device could modify a transmitted frame and the modification may not be detected by the recipient 13

Protecting at NWK layer PDU SYNC MAC Plaintext MAC Payload FCS Unsecured NWK PDU NWK Plaintext NWK Payload PDU SYNC MAC Plaintext MAC Payload FCS Secured NWK PDU NWK Auxiliary Header Ciphertext NWK Payload MIC 14

Protecting at APS layer PDU SYNC MAC Plaintext MAC Payload FCS Unsecured NWK PDU NWK Plaintext NWK Payload Unsecured APS PDU APS Plaintext APS Payload PDU SYNC MAC Plaintext MAC Payload FCS Unsecured NWK PDU NWK Plaintext NWK Payload Secured APS PDU APS Auxiliary Header Ciphertext APS Payload MIC 15

Protecting at NWK and APS layer PDU SYNC MAC Plaintext MAC Payload FCS Unsecured NWK PDU NWK Plaintext NWK Payload Unsecured APS PDU APS Plaintext APS Payload PDU SYNC MAC Plaintext MAC Payload FCS Secured NWK PDU NWK Auxiliary Header Ciphertext NWK Payload MIC Secured APS PDU APS Auxiliary Header Ciphertext APS Payload MIC 16

Joining scenario ZigBee Coordinator normally acts as Trust Center Walk through device without network key and with preconfigured TC link key Common security model Coordinator Router End Device Mesh link End device star link 17

Joining scenario walkthrough 1: Device does unsecured join 2 3 4 1 5 2: Router sends device update to TC for authorization 3: TC prepares network key transport for joining device secured with pre-configured TC link key shared between TC and joining device and tunnels it to router Trust Center Router End Device Mesh link End device star link APSME commands 4: Router unpacks tunneled network key transport and sends to device unsecured at network layer 5: Device retrieves network key from network key transport using pre-configured TC link key 18

ZigBee SE 2.0 security requirem ents SE 2.0 requires a more flexible security implementation Both federated and end-to-end models need to be considered Existing standards from IETF, IEEE, IEC etc. need to be used Multiple sources for implementation and multiple CAs required 19

ZigBee SE 2.0 security initial technical requirem ents Link layer security provided by 802.15.4-2006 frame prot ection EAP (Extensible Authentication Protocol) used for net work admission Certificates Passphrases PINs TLS (Transport Layer Security) used for secure associations at application level Locally within HAN Across the wider network to utility TRD available on ZigBee/ Homeplug document server 20