SEC-2015-0558R01-use-case-requirements-end-to - FTP

advertisement
SEC-2015-0558R01-use-case-requirements-end-to-end-authentication-using-delegation
Change Request
CHANGE REQUEST
Meeting:*
SEC 18
Source:*
Vinod Choyi, Interdigital, vinod.choyi@interdigital.com
Date:*
2015-07-12
Contact:*
Same as above
Reason for Change/s:*
Use case and requirements for providing End-to-End Message
Authentication using Delegation
R01 addresses comments during SEC session
CR against: Release*
oneM2M R2
CR against: WI*
X Active WI-0016
MNT Maintenace / < Work Item number(optional)>
STE Small Technical Enhancements / < Work Item number
(optional)>
Only ONE of the above shall be ticked
CR against: TS/TR*
TR-0012 oneM2M End-to-End Security and Group Authentication
Clauses/Sub Clauses*
Type of change: *
Editorial change
Bug Fix or Correction
Change to existing feature or functionality
X New feature or functionality
Only ONE of the above shall be ticked
Post Freeze checking:*
This CR contains only essential changes and corrections? YES
NO X
NO X if YES, please indicate the
document number of the original CR:
<Document Number)<CR Number of the original CR to the current
Release>
This CR is a mirror CR? YES
Template Version:23 February 2015 (Dot not modify)
2
3
oneM2M Notice
4
5
6
7
8
The document to which this cover statement is attached is submitted to oneM2M. Participation in, or attendance at, any
activity of oneM2M, constitutes acceptance of and agreement to be bound by terms of the Working Procedures and the
Partnership Agreement, including the Intellectual Property Rights (IPR) Principles Governing oneM2M Work found in
Annex 1 of the Partnership Agreement.
© 2016 oneM2M Partners
Page 1 (of 5)
SEC-2015-0558R01-use-case-requirements-end-to-end-authentication-using-delegation
Change Request
9
GUIDELINES for Change Requests:
10
Provide an informative introduction containing the problem(s) being solved, and a summary list of proposals.
11
Each CR should contain changes related to only one particular issue/problem.
12
13
In case of a correction, and the change apply to previous releases, a separated “mirror CR” should be posted at the same
time of this CR
14
15
16
Follow the principle of completeness, where all changes related to the issue or problem within a deliverable are
simultaneously proposed to be made E.g. A change impacting 5 tables should not only include a proposal to change
only 3 tables. Includes any changes to references, definitions, and acronyms in the same deliverable.
17
Follow the drafting rules.
18
All pictures must be editable.
19
Check spelling and grammar to the extent practicable.
20
Use Change bars for modifications.
21
22
23
The change should include the current and surrounding clauses to clearly show where a change is located and to provide
technical context of the proposed change. Additions of complete sections need not show surrounding clauses as long as
the proposed section number clearly shows where the new section is proposed to be located.
24
25
Multiple changes in a single CR shall be clearly separated by horizontal lines with embedded text such as, start of
change 1, end of change 1, start of new clause, end of new clause.
26
27
When subsequent changes are made to content of a CR, then the accepted version should not show changes over
changes. The accepted version of the CR should only show changes relative to the baseline approved text.
28
Introduction
29
30
31
32
33
In an oneM2M system, entities may require service layer messaging in order to communicate with another entity that
may be multiple hops away. Messages may traverse multiple intermediate entities before the message reaches the final
destination (receiver). An entity may require a high-level of assurance that a message originated from a particular end
entity. A constrained M2M entity would like to delegate certain security functions (e.g. End-to-End Message
Authentication) to another trusted entity that may have much more computing power/memory/battery resources.
34
35
-----------------------Start of change 1-------------------------------------------
36
38
5.6 Use case of End-to-End Message Authentication using
Delegated Means
39
5.6.1 Description
40
41
42
43
44
In an oneM2M system, entities may require service layer messaging in order to communicate with another entity that
may be multiple hops away. Messages may traverse multiple intermediate entities before the message reaches the final
destination (receiver). An entity may require a high-level of assurance that a message originated from a particular end
entity. A constrained M2M entity would like to delegate certain security functions (e.g. End-to-End Message
Authentication) to another trusted entity that may have much more computing power/memory/battery resources.
37
© 2016 oneM2M Partners
Page 2 (of 5)
SEC-2015-0558R01-use-case-requirements-end-to-end-authentication-using-delegation
Change Request
45
5.6.2 Actors
46
47
The entities involved in the use case are shown in Figure 5.6.2-1 and described as follows:
48
49
50
M2M Application: It represents an application that uses sensor data to perform certain application-specific operations.
The M2M Application is multiple hops away from a sensor and may be connected to the sensor by entities that may
belong to different administrative domains.
51
52
M2M Server: It represents an infrastructure entity that is responsible for enabling an M2M application to obtain
services provided by the M2M service provider.
53
54
55
M2M Gateway: It represents a gateway that is responsible for processing and / or forwarding messages that are sent
from an M2M Application and from M2M Devices. The M2M Gateway may function as a Delegated End-to-End
Message Authentication Agent on behalf of the M2M Device.
56
57
M2M Device: It represents a sensor application or a sensor device that is responsible for measuring sensor data and
communicating the data to an application. The M2M Device is assumed to be a very constrained device.
58
59
60
Trusted Third-Party (TTP): It represents an entity that can broker trust relationships between entities that may belong
within the same administrative domain or outside. The TTP may also facilitate in providing credential registration as
well as credential requisition services.
61
Trusted
Third-Party
(TTP)
M2M
Device
M2M
Gateway
M2M
Server
M2M
Application
Delegated E2E
Message
Authentication Agent
62
63
Figure 5.6.2-1: Entities involved in oneM2M messaging
64
5.6.3 Pre-Conditions
65
66
M2M Device registers with the M2M Gateway in order that an M2M Application may be able to access the sensor data
provided by M2M Device.
67
68
69
Either by policies determined by M2M service provider or by explicit signalling, the M2M Gateway is assigned as the
delegated end-to-end message authentication agent on behalf of the M2M Device
70
M2M Gateway requests and or registers end-to-end message authentication credentials with a TTP.
71
72
Any message originating from the M2M Gateway is integrity protected by the M2M Gateway using end-to-end
message authentication credentials on behalf of the M2M Device.
73
74
Any message destined to the M2M Gateway or M2M Device is verified to check for authenticity / integrity by the M2M
Gateway on behalf of the M2M Device
75
© 2016 oneM2M Partners
Page 3 (of 5)
SEC-2015-0558R01-use-case-requirements-end-to-end-authentication-using-delegation
Change Request
76
5.6.4 Normal Flow
77
Procedure for oneM2M messaging:
78
1. An M2M Device registers its sensor resource with an M2M Gateway
79
80
81
82
83
2. The M2M Gateway based on policies and security requirements determines that the messages originating from it
may have to be integrity protected using End-to-End Message Authentication mechanisms using cryptographic
mechanisms and therefore may generate appropriate end-to-end credentials, identifiable by a credential identifier
and registers the credentials with a TTP. Alternatively, the M2M Gateway may request for appropriate credentials
from the TTP, which is then used for protecting the integrity / authenticity of messages originating from it.
84
85
3. An M2M Application would like to subscribe to sensor resource that is provided by an M2M Device. In order to
obtain the data, the M2M Application sends a request message to the M2M Gateway via the M2M Server.
86
4. The M2M Server receives the message and forwards the message to the appropriate M2M Gateway.
87
88
5. The M2M Gateway on receiving the message from the M2M Server verifies if the M2M Application is authorized to
send the request message.
89
90
6. Upon verification, the M2M Gateway sends an integrity protected response message to the M2M Application using
the end-to-end message authentication credentials that was registered with a TTP via the M2M Server.
91
7. The M2M Server forwards the integrity protected response message to the M2M Application.
92
93
94
95
8. Based on the type of credentials (symmetric or assymetric) that has been used for integrity protection of the
messagte the M2M Application may or may not be able to verify the integrity / authenticity of the message. If the
M2M Application does not have the appropriate credentials, identified by the credential identifier, it requests for
the credentials with the TTP.
96
97
9. The TTP checks for the authorization of the M2M Application, if authorized, the TTP provisions the M2M
Applciation with the appropriate credentials using the credential identifier.
98
10. The M2M Application is able to verify the integrity / authenticity of the message and processes it.
99
100
101
It must be noted that the mechanisms described above may be used by the M2M Gateway to verify the integrity /
authenticity of the request message at Step 5, originating from a M2M Application using similar mechanisms
102
103
104
Message authentication may be performed by verifying a message authentication code / authentication tag that is
appended to the original message if using symmetric credentials or by verifying the Digital Signature associated with
the message if using asymmetric credentials.
105
106
5.6.5 Potential Requirements
107
108
1 M2M system shall support an entity to delegate security functions (e.g. message authentication / integrity
protection) to a trust-worthy entity on behalf of the originator entity.
109
2
110
-----------------------End of change 1 ---------------------------------------------
111
112
113
CHECK LIST
114
115
 Does this change request include an informative introduction containing the problem(s) being solved, and a
summary list of proposals.?
116
 Does this CR contain changes related to only one particular issue/problem?
117
 Have any mirror crs been posted?
© 2016 oneM2M Partners
Page 4 (of 5)
SEC-2015-0558R01-use-case-requirements-end-to-end-authentication-using-delegation
Change Request
118
119
120
 Does this change request make all the changes necessary to address the issue or problem? E.g. A change
impacting 5 tables should not only include a proposal to change only 3 tables. Includes any changes to
references, definitions, and acronyms in the same deliverable?
121
 Does this change request follow the drafting rules?
122
 Are all pictures editable?
123
 Have you checked the spelling and grammar?
124
 Have you used change bars for all modifications?
125
126
127
 Does the change include the current and surrounding clauses to clearly show where a change is located and to
provide technical context of the proposed change? (Additions of complete sections need not show surrounding
clauses as long as the proposed section number clearly shows where the new section is proposed to be located.)
128
129
 Are multiple changes in this CR clearly separated by horizontal lines with embedded text such as, start of change
1, end of change 1, start of new clause, end of new clause.?
130
© 2016 oneM2M Partners
Page 5 (of 5)
Download