the Devices Profile for Web Services - Institut

advertisement
DPWSec: The Devices Profile for
Web Services Security
Sebastian Unger
Dirk Timmermann
University of Rostock, Germany
MuSAMA DFG Graduate Programme
Agenda
•
Motivation
•
Basic Principles & Related Work
•
Requirements
•
Methodology
•
Features of DPWSec
•
Conclusion & Outlook
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
2
Agenda
•
Motivation
•
Basic Principles & Related Work
•
Requirements
•
Methodology
•
Features of DPWSec
•
Conclusion & Outlook
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
3
Motivation
What it is about
AI
AAL
IoT
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
4
Motivation
Real-Life Threats I
Source: http://www.forbes.com/sites/singularity/2012/12/06/yes-you-can-hack-a-pacemaker-and-other-medical-devices-too/
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
5
Motivation
Real-Life Threats II
http://www.spiegel.de/netzwelt/web/defcon-konferenz-in-las-vegas-hacker-lieben-internet-der-dinge-a-985733.html
- Attackers love the IoT
- Once eradicated security flaws come back
 Botnet from fridges
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
6
Motivation
The Challenge
Ambient
Assisted
Living
Web
of
Things
Internet
of
Things
Pervasive
Computing
Ambient
Intelligence
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
7
Motivation
The Goal
DPWS
Device Profile for Web Services
This work:
Security scheme for DPWS based on
Web Services Security Specification Suite
 Devices Profile for WS Security (DPWSec)
This presentation:
• Requirements analysis
• Developed methodology
• DPWSec’s functionality
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
8
Agenda
•
Motivation
•
Basic Principles & Related Work
•
Requirements
•
Methodology
•
Features of DPWSec
•
Conclusion & Outlook
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
9
Basic Principles & Related Work
DPWS: the Devices Profile for Web Services
DPWS is a communication standard for distributed embedded devices
DPWS
=
+
+
Web Services for resource-constrained devices
Dynamic Discovery (bootstrap w/o central instance)
Eventing (asynchronous messaging)
Originally designed for integration of e.g. printers into enterprise networks
Found use in
• WSN
• Medical devices
• Automotive
• Building automation
• Industrial domain
• Internet of things
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
10
Basic Principles & Related Work
Security in DPWS: Profile Mechanism
Security in DPWS is covered by a flexible profile mechanism.
A profile is a set of rules and assumptions, two
devices agree on before communicating for
the first time.
Free choice of security profiles.
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
11
Basic Principles & Related Work
Security in DPWS: Default Profile
DPWS specification provides optional default profile
Authentication: X.509 – certificates
Secure channels: SSL/TLS
Secure UDP traffic: Compact XML-Signature format
optional
“secure interoperability guideline”
X.509 & TLS not ideal for embedded devices
No designated way to exchange or authenticate certificates
Authorization requires username and password
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
12
Basic Principles & Related Work
Security in DPWS: Related Work
Muller et al: [1]
Vulnerable against MITM-Attack
Hernández et al: [2]
Vulnerable against Replay-Attack
Martínez et al: [3]
Large office spaces
X.509 certificates, PKI
Does not consider res.-constrained devices
Unger et al: [4]
Automotive, few devices
X.509 certificates
Does not consider res.-constrained devices
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
13
Basic Principles & Related Work
Web Service Security Specification Suite
Trust brokering
Authorization brokering
WS-Policy
WS-Federation
WS-Trust
WS-SecureConversation
WS-Security
WS-Security ∈ WS Security Suite
Centralized authentication
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
14
Agenda
•
Motivation
•
Basic Principles & Related Work
•
Requirements
•
Methodology
•
Features of DPWSec
•
Conclusion & Outlook
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
15
Requirements
Three-tiered Requirements Analysis
Attacker models
Requirements from literature
Scenario 1
Scenario 2
Smart Home / AAL
Scenario n
Smart Office
…
Scenario
requirements
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
Requirements
list
16
Requirements
Three-tiered Requirements List
Basic security requirements
Requirements
list
Special requirements for intelligent environments
Requirements on interoperability
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
17
Requirements
Basic security-related Requirements
• DOLEV-YAO-attacker model
• Secure external communication
• Flexible support for different authorization concepts
• Avoid single points of failures
• Possibility to form organizational groups
• Different levels of security
• Secure continuous deployment
• Scalable
• Ease of use w/o impact on security
• Support of secure data persistence
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
18
Requirements
Basic security-related Requirements
• DOLEV-YAO-attacker model
• Secure external communication
• Flexible support for different authorization concepts
• Avoid single points of failures
• Possibility to form organizational groups
• Different levels of security
• Secure continuous deployment
• Scalable
• Ease of use w/o impact on security
• Support of secure data persistence
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
19
Requirements
Special Requirements for intelligent Environments
• Protect remaining network when member is lost / stolen
• Focus on devices, not users
• Consider heterogeneity of resources
• Coordinated sign-out
• Consider heterogeneity of user interfaces
• Consider maintenance by experts and end users
• Disburden constrained devices
• Delegation of access rights
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
20
Requirements
Special Requirements for intelligent Environments
• Protect remaining network when member is lost / stolen
• Focus on devices, not users
• Consider heterogeneity of resources
• Coordinated sign-out
• Consider heterogeneity of user interfaces
• Consider maintenance by experts and end users
• Disburden constrained devices
• Delegation of access rights
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
21
Requirements
Special Requirements on Interoperability
• Use a widely-deployed, well-accepted technology
• Secure protocol interoperability
• Secure manufacturer interoperability
• Interoperable end-2-end-security
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
22
Requirements
Special Requirements on Interoperability
• Use a widely-deployed, well-accepted technology
• Secure protocol interoperability
• Secure manufacturer interoperability
• Interoperable end-2-end-security
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
23
Agenda
•
Motivation
•
Basic Principles & Related Work
•
Requirements
•
Methodology
•
Features of DPWSec
•
Conclusion & Outlook
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
24
Methodology
Two Major Design Goals
Offload resource-intensive tasks
Restrict generality
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
25
Methodology
Offloading Efforts
Tasks to be offloaded mostly concern secure connection establishment
• Retrieving target’s metadata
• Parsing policies and matching connection parameters
• Authentication methods
• Encryption algorithms
• Support in direct authentication
• Offer brokered authentication
• Offer (semi)centralized authorization
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
26
Methodology
Eliminating Specification Parts
• Original specifications are very flexible
• Offer lots of design choices
 After all: designed for desktop PCs and server machines
Elimination of “unnecessary” or “unsuitable” parts:
• Some parts are simply not necessary (according to requirements)
• Other restrictions follow patterns:
• Trade statelessness for simplicity
• Respect communication model of DPWS
• Respect architecture of DPWS
• No extended multihop security
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
27
Agenda
•
Motivation
•
Basic Principles & Related Work
•
Requirements
•
Methodology
•
Features of DPWSec
•
Conclusion & Outlook
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
28
Features of DPWSec
Compact Message Security Scheme
• Securing single messages using a compact security scheme on
message level proposed earlier [5]
• Encrypt SOAP-Payload only, sign complete envelope
• Performs similar to Record Protocol of TLS (no sever performance
drawback)
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
29
Features of DPWSec
Authentication
Two authentication approaches
• Direct authentication based on OOB PIN exchange
• conduct authenticated Elliptic-Curve-Diffie-Hellman
• Optionally employ MM-devices to translate OOB channels [6]
• Brokered authentication between devices
• Optionally offered by “strong” participants
• Heavily disburdens “weak” as it relies on trust chains and does not
require cryptographic hand shakes
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
30
Features of DPWSec
Authorization
• Authorization is special, as it requires no cryptography
• Instead, it is about making decisions and communicating them
 DPWSec focuses on infrastructural part only
 How to ask for permission and how to deliver the decision
Proposed a complementary authorization concept
• Strong participants offer themselves as synchronous authorizers
• If the can’t make a decision, they ask the user asynchronously using
e.g. their smart phones
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
31
Agenda
•
Motivation
•
Basic Principles & Related Work
•
Requirements
•
Methodology
•
Features of DPWSec
•
Conclusion & Outlook
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
32
Conclusion
Evaluation
It works. Prototype implementation available open source [7]
DOLEV-YAO-attacker model
Consider heterogeneity of resources
Secure external communication
Focus on devices, not users
Flexible support for different authorization concepts
Protect remaining network when member is lost / stolen
Avoid single points of failures
Disburden constrained devices
Possibility to form organizational groups
Coordinated sign-out
Different Levels of Security
Consider maintenance by experts and end users
Secure continuous deployment
Consider heterogeneity of user interfaces
Scalable
Delegation of Access rights
Ease of use w/o impact on security
Support of secure data persistence
Use a widely-deployed, well-accepted technology
Secure protocol interoperability
Secure manufacturer interoperability
Interoperable end-2-end-security
Almostrequirement
Every
every requirement
met. met.
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
33
Outlook
Towards an Infrastructure for intelligent Environments
Security infrastructure for distributed embedded devices
DPWSec
Tech2Sec
TechnSec
DPWS
Technology 2
Technology n
Adapter 1
Adapter 2
Intelligent environment
Adapter3
Secure protocol interoperability incl. interoperable E2E-security
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
34
Future Work
Adapt to second Base Technology
Near future: Second technology next to DPWS
 Isolate requirements
 Actually port DPWSec
Far future: Research secure protocol interoperability
 Employ adapter / translator concept
 Research emerging issues esp. regarding interoperable E2E-security
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
35
Bibliography
[1] A. Muller et al., “An assisted device registration and service access system for future home networks,” in Wireless Days
(WD), 2009 2ndIFIP, Dezember 2009, p. 5.
[2] V. Hernández et al., “Security Framework for DPWS Compliant Devices,” Third International Conference on Emerging
Security Information, Systems and Technologies, 2009.
[3] J.-F. Martínez et al., “A security architectural approach for DPWS-based devices,” CollECTeR Iberoamérica, 2008.
[4] S. Unger et al., “Extending the devices profile for web services for secure mobile device communication,” in Internet of
Things Conference - TIoPTS Workshop, 2010.
[5] S. Unger, S. Pfeiffer, and D. Timmermann, “Dethroning transport layer security in the embedded world,” in 5th
International Conference on New Technologies, Mobility and Security (NTMS), 2012.
[6] S. Unger and D. Timmermann, “Bridging the gap for authentication in smart environments,” in Computers and
Communications (IEEE ISCC 2014), 19th IEEE Symposium on, Funchal,
[7] https://gitlab.amd.e-technik.uni-rostock.de/sebastian.unger/ws4d-mobile-authenticator/wikis/home
Thank you!
Questions?
Thank you very much for your attention!
Any questions?
Sebastian Unger
Institute for Applied Microelectronics and Computer Engineering,
University of Rostock, Germany
sebastian.unger@uni-rostock.de
09.04.2015 © 2015 UNIVERSITÄT ROSTOCK | S.Unger: „DPWSec: Devices Profile for Web Services Security“
37
Download