Secure Environment management based on CoAP Sebastian Hans

advertisement
Secure Environment management based on CoAP
Sebastian Hans
[ETSI CoAP workshop]
S hi Antipolis
Sophia
A ti li November
N
b 2012
©2012
1
@GlobalPlatform_
www.linkedin.com/company/globalplatform
GlobalPlatform reaches 100 Members
3
Result of Collaboration
TCG
PCI
EMVCo
SDA
Contactl
ess
Payment
ISO
GlobalPlatform
•
•
•
•
•
GSMA Pay-Buy Mobile
Mobey Forum
Payez Mobile
European Payments Council (EPC)
StolPan
• ISO SC17/WG4
• ISO TC204/WG 8
Govern
ment
ETSI/
SCP
National Institute of Standards and Technology (NIST)
European Committee for Standardization (CEN)
NICSS
Public
Transit
• IFM project
Collaboration with ETSI
• Started in 1999 with ETSI SCP
– Liaison statement and join meetings
• 1999-2004 – First collaborations
– Collaboration on OTA Application management and security perspective
• 2005-2011 – Strong technical integration
– Hosting and OTA management of 3rd Party applications
• Allowing to host non Telecommunication related application in a UICC
– NFC and contactless application management
• End user activation of contactless services
Result : GlobalPlatform UICC configuration with the associated compliance
program
• THE market reference for Secure element for the mobile NFC contacltess
• endorsed by different organizations such as GSMA, EMVCO, EPC, AEPM, …
5
What GP has today
• A set of specifications to manage keys
• and
d applications
li ti
iin a secure element
l
t
– load, install (multiple instances), delete, personalize
• To establish a secure channel between entities in the secure element and an
entities outside the secure element
– based on 3DES, AES, RSA and ECC
• specs are network agnostic
• can manage all kinds of secure environments
– smartcard,
smartcard SIM
SIM, SD
SD-card,
card embedded secure element
– management of Trusted Executions Environment
• to represent
p
multiple
p service p
provider in the secure element
– the concept is called Security Domain
• a conformance process for devices, tools and conformance labs
• a proven technology used in SIM card, payment and ID card all over the world
6
Remote management
• Remote management of SIM/UICC cards based on GP (references in ETSI
SCP 3GPP) ttechnology
SCP,
h l
wellll established
t bli h d iin th
the market
k t
– but very specific to the mobile network technology and SIM card technology
– based on SMS and SIM Toolkit technology
– typically under the control of the operator
• OTA management over HTTP of SIM cards already deployed in the market
– but targeting networks with high bandwith e.g.
e g UMTS
UMTS, LTE
• OTA management based on GP technology references by ETSI M2M in TS
102 690
– but is focusing on the SIM/UICC platform
7
Devices in scope for this work item
examples …
• In General all device hosting at least one Secure Environment
–
–
–
–
UICC
smart micro SD for industrial environments
build in Secure Element
Trusted Execution Environment
• Gateway
– The German BSI has p
produced a specification
p
where they
y request
q
to have a p
physical
y
EAL 4+ certified secure token in the Gateway
– https://www.bsi.bund.de/ContentBSI/Publikationen/TechnischeRichtlinien/tr03109/ind
ex_htm.html;jsessionid=801BCBAF4841E42CB80E185B4BB3510D.2_cid241
– Such a secure element needs to be managed and keys needs to be provisioned
• ETSI M2M devices with a Security Environment
– can be
b a UICC b
butt can b
be any other
th ttype off secure environment,
i
t e.g. SE
SE, TEE
Smart metering use case from ETSI M2M
Smart metering device
– as described in TR 102 935 (4.2.5) making explicit references to TS 102 241, 225
and 226 which are based on GlobalPlatform mechanim
– such devices require isolated applications and secure end-to-end communications
b t
between
device
d i and
d service
i b
backend
k d
Why are we considering CoAP
• much better for constrained devices like a smartcard chip as HTTP
• ETSI M2M is referencing CoAP in their service architecture
– integrate the management of the secure environment as a service in the overall
service architecture
• ETSI M2M talks about secure environments in their specs
– SIM is only one possible implementation for the secure environment
– we want to cover all secure environments not only SIM cards that can be deployed in
an M2M / IoT environment
• Main focus at the moment is alignment with ETSI M2M service architecture
10
HTTP based management in GP
• GP has two solutions for HTTP based management of secure environments
– they will be the starting point for the adaptation to CoAP
– Æ mapping the existing HTTP mechanism to CoAP mechanism
• Amendment B
– based on the OMA Smart Card web server
– focus on a migration from legacy card management to HTTPS based remote
management
• POST APDU encoded messages to a Security Domain in the card
• naming is AID based
• focus on the ISO 7816 and Java Card Classic application model
– based on TLS_PSK as security
• Network Framework
–
–
–
–
11
allll managementt commands
d are encoded
d d iin ASN
ASN.1
1 notation
t ti
naming is based on URI’s
HTTP is one mechanism to transport GlobalPlatform commands
can handle different type of application models and is in general more extendable
Integration with HTTP infrastructure
• GlobalPlatform relies on the network integration of the device or the secure
environment
i
t
– today this is done in ETSI SCP, 3GPP, 3GPP2 and OMA SCWS specifications
• For secure environment with no direct network connections hosted in network
device we use
– Secure Element Remote Application Management
– It defines an admin agent in the device and is reusing the mechanism from
Amendment B for the management
12
Technical stuff that is under discussion
• Data can be cached on the Gateway/Proxy and delivered at a later point in
titime
– sleepy device are not in the scope of GP today
– group management is not in the scope of GP today
• Gateway communication over HTTP/TLS/TCP with the server, device
communication via CoAP/DTLS/UDP
– mapping of HTTP based management to CoAP based management
– DTLS as secure mechanism
– provisioning and management of credentials for DTLS
• CoAP in mobile networks architectures
• Web-linking for discovery of GlobalPlatform resources and services in the
de ice
device
13
Thank you!
Questions ?
14
Download