Internet DRAFT - draft-oualha-mikey-ext

draft-oualha-mikey-ext



Networking Working Group                                  Nouha Oualha
                                                         Mounir Kellil
                                                  Christophe Janneteau
Internet Draft                                              CEA, LIST
Intended status: Standards Track                         June 24, 2013
Expires: December 2013



      Extending Multimedia Internet KEYing (MIKEY) protocol for use in
                           constrained networks
                       draft-oualha-mikey-ext-00.txt


Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November
   10, 2008. The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six
   months and may be updated, replaced, or obsoleted by other documents
   at any time.  It is inappropriate to use Internet-Drafts as
   reference material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html

   This Internet-Draft will expire on December 24, 2013.



Oualha                Expires December 24, 2013               [Page 1]

Internet-Draft     Extending MIKEY for use in LLNs           June 2013

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors. All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document. Please review these documents
   carefully, as they describe your rights and restrictions with
   respect to this document.

Abstract

   The Multimedia Internet KEYing (MIKEY) protocol is a key management
   standard defined in RFC 3830 for streaming and real-time
   applications. In these applications, the MIKEY protocol may be used
   to provide group key management. With the base protocol, the change
   of one group member triggers the unicast transmission of a new group
   key to all members. In the context of an application delivering
   multicast streams to end-users located at multiple capillary
   networks, the key update messages may scale in proportion to the
   number of nodes; thus creating a substantial overhead. This I-D
   proposes an extension to the MIKEY protocol allowing the management
   of the group as a set of clusters, but with fewer changes to the RFC
   3830 standard. Clustering helps in reducing the communication
   overhead produced during key update by using unicast mode only with
   nodes that belong to clusters where group membership changes

Table of Contents


   1. Introduction ................................................ 3
      1.1. Terminology and definitions                                           ............................. 3
         1.1.1. Definitions                                ........................................ 3
         1.1.2. Abbreviations                                  ...................................... 4
         1.1.3. Rationale ......................................... 4
         1.1.4. Outline ........................................... 5
   2. Clustering-based approach overview                                             ........................... 5
      2.1. Context ................................................ 5
      2.2. Description ............................................ 5
         2.2.1. Demonstrative example                                          .............................. 6
   3. Extension elements to MIKEY                                      .................................. 7
   4. Security Considerations                                  ...................................... 7
   5. IANA Considerations ......................................... 7
   6. References .................................................. 8
      6.1. Normative References                                    .................................... 8
      6.2. Informative References                                      .................................. 9



Oualha                Expires December 24, 2013               [Page 2]

Internet-Draft     Extending MIKEY for use in LLNs           June 2013

1. Introduction

   The Multimedia Internet KEYing (MIKEY) protocol [RFC3830] is a key
   management standard that has been designed to be easily integrated
   with the existing security protocols. The extensions proposed for
   this protocol (like [RFC4650], [RFC4738], [RFC5197], [RFC6043], and
   [RFC6267]) focus mainly on providing different encryption modes and
   algorithms to be used by the protocol. Other efforts have recently
   been undertaken (e.g., [I-D.ietf-roll-mikey-lln-key-mgmt]) to
   lighten the protocol in order to extend the applicability of the
   protocol to resource constrained-device networks. To further adapt
   MIKEY to these networks, we propose a group-clustering-based
   approach that uses unicast mode only within a cluster of nodes of
   the group whenever group key update is needed. The approach requires
   few changes to the base MIKEY protocol.

     1.1. Terminology and definitions

   The following gives the definitions and abbreviations that are
   mostly a remainder from [RFC3830].

1.1.1. Definitions

   (Data) Security Protocol: the security protocol used to protect the
   actual data traffic.  Examples of security protocols are IPsec and
   SRTP.

   Data Security Association (Data SA): information for the security
   protocol, including a TEK and a set of parameters/policies.

   Crypto Session (CS): uni- or bi-directional data stream(s),
   protected by a single instance of a security protocol.

   Crypto Session Bundle (CSB): collection of one or more Crypto
   Sessions, which can have common TGKs and security parameters.

   Crypto Session ID: unique identifier for the CS within a CSB.

   Crypto Session Bundle ID (CSB ID): unique identifier for the CSB.

   TEK Generation Key (TGK): a bit-string agreed upon by two or more
   parties, associated with CSB. From the TGK, Traffic-encrypting Keys
   can then be generated without needing further communication.

   Traffic-Encrypting Key (TEK): the key used by the security protocol
   to protect the CS (this key may be used directly by the security
   protocol or may be used to derive further keys depending on the
   security protocol).  The TEKs are derived from the CSB's TGK.



Oualha                Expires December 24, 2013               [Page 3]

Internet-Draft     Extending MIKEY for use in LLNs           June 2013

   Key Index: The Key Index (KI) is used as identifier to allow
   referencing the key(s) that are associated with a given CS. Each TGK
   is associated with a KI as defined in [I-D.ietf-roll-mikey-lln-key-
   mgmt].

   TGK re-keying: the process of re-negotiating/updating the TGK (and
   consequently future TEK(s)).

   Initiator: the initiator of the key management protocol, not
   necessarily the initiator of the communication.

   Responder: the responder in the key management protocol.

1.1.2. Abbreviations

   CS     Crypto Session
   CSB    Crypto Session Bundle
   DoS    Denial of Service
   KI     Key Index
   MAC    Message Authentication Code
   MIKEY  Multimedia Internet KEYing
   PK     Public-Key
   PSK    Pre-Shared key
   RTP    Real-time Transport Protocol
   RTSP   Real Time Streaming Protocol
   SDP    Session Description Protocol
   SIP    Session Initiation Protocol
   SRTP   Secure RTP
   TEK    Traffic-encrypting key
   TGK    TEK Generation Key

1.1.3. Rationale

   The approach proposed in this I-D is intended for networks that are
   composed of resource constrained devices. Examples of such networks
   are wireless sensor networks or multiple of these networks receiving
   the same streaming content. Devices in these networks are generally
   large in number, but they can be divided into multiple clusters
   where they are highly correlated to each other (e.g., by type or by
   location). The dynamics of devices (e.g., device join/leave to the
   group, failure) could be different in these clusters.

   The proposed approach aims at MIKEY objective to establish a
   security association and keys for a security protocol like SRTP. It
   extends the base MIKEY protocol by considering the group divided
   into multiple clusters based on group members' dynamics. The group
   clustering reduces the communication overhead caused by group key
   updating due to members' dynamics, which contributed in unloading
   the constrained-network nodes.


Oualha                Expires December 24, 2013               [Page 4]

Internet-Draft     Extending MIKEY for use in LLNs           June 2013

1.1.4. Outline

   Section 2. describes the context for which the approach is proposed.
   The section gives also an overview of the architecture that is
   considered and illustrates the main contribution of the approach
   using a demonstrative example.

   Section Erreur ! Source du renvoi introuvable.details the practical
   extensions and added elements to the base MIKEY protocol [RFC3830].

2. Clustering-based approach overview

   This section gives an overview of the proposed approach. It first
   defines the context in which the approach can be applied. It then
   details the description of the approach pinpointing the changes
   proposed to the base MIKEY protocol.

     2.1. Context

   The proposed approach uses the architecture of [RFC3740] composed of
   the group controller/key server (GCKS) and a group of
   sender/receiver nodes. The GCKS authenticates nodes. If nodes are
   authorized to receive or send the stream, they will be provided from
   the GCKS with the required keying materials.

   The approach assumes that the group of receiver nodes is divided
   into a number of clusters. The management of clusters is handed out
   to the GCKS. Since the GKCS is responsible of the issuance and
   management of cryptographic keys and also user-authentication and
   authorization checks, we can assume that this entity is responsible
   of affecting nodes to clusters based on their location, their
   mobility pattern, etc. For example, clusters may be mapped to the
   physical network topology: each cluster may correspond to a
   different capillary network. The assignment of nodes to clusters is
   out of the scope of this I-D.

     2.2. Description

   The idea behind the proposed approach is summarized with the
   following:

   o The GCKS launches multiple instances of the MIKEY protocol. Each
      MIKEY protocol instance corresponds to a different cluster of
      receiver nodes (seen Figure 1).

   o Each cluster receives a set of TGKs. Subsets of these TGKs are
      shared with some other clusters. Additionally, each TGK is
      identified by the same KI along the different clusters. The GCKS
      ensures this dependency between the different protocol instances.


Oualha                Expires December 24, 2013               [Page 5]

Internet-Draft     Extending MIKEY for use in LLNs           June 2013

   o Key management is handled independently for each MIKEY instance;
      though the GCKS ensures that at all times, all clusters share at
      least one TGK that is used to establish common security
      associations for the underlying security protocol e.g., SRTP.

   o Whenever a node leaves or joins the group, the GCKS dynamically
      update the group key TGK, by synchronizing key update operation
      for each of the MIKEY protocol instances. The usual unicast key
      update is used for the cluster concerned with the membership
      change. On the other hand, the remaining clusters will update
      their security association based on the KI associated with the
      new shared TGK.

   +------------------+
   |    +----------+  |         MIKEY({TGK, KI})    .............
   | +->|MIKEY     |<==============================>: Cluster 1 :
   | |  |instance 1|  |                             :...........:
   | |  +----------+  |
   | |                |
   | |  +----------+  |         MIKEY({TGK, KI})    .............
   | |->|MIKEY     |<==============================>: Cluster 2 :
   | |  |instance 2|  |                             :...........:
   | |  +----------+  |
   | |                |
   | |->...           |                             ...
   | |                |
   | |  +----------+  |
   | +->|KEY mgmt. |  |
   |    |entity    |  |
   |    +----------+  |
   |        GCKS      |
   +------------------+
   Figure 1 The clustering-based approach

2.2.1. Demonstrative example

   Demonstrative example: We consider a group composed of two clusters
   C1 and C2 of identical size. The nodes in both clusters share a
   group key TGK1 and TGK2. Additionally, nodes in the cluster C1
   (respectively C2) share an additional group key TGK3 (respectively
   TGK4) with the GCKS.

   At first, we assume TGK1 needs to be updated (e.g., because it has
   been compromised). In this case, nodes will be simply notified of
   the new group key, TGK2 that is shared by all nodes in the group,
   using the corresponding KI in the underlying security protocol.

   Later, we assume that a node from C2 leaves the group. This event
   triggers TGK key update. For the remaining members of C2, TGK3 is


Oualha                Expires December 24, 2013               [Page 6]

Internet-Draft     Extending MIKEY for use in LLNs           June 2013

   distributed based on the base MIKEY unicast mode. On the other hand,
   members of C1 will be notified of TGK update by simply using KI to
   identify the new group key TGK3 through the underlying security
   protocol. With this proposed approach, the communication overhead
   due to group key update is divided by 2, compared to the basic MIKEY
   protocol, thanks to the use of multiple instances of MIKEY.

3. Extension elements to MIKEY

   The proposed approach was thought in a way where changes to the base
   MIKEY protocol are limited. Since management of MIKEY instances is
   handled by the GCKS, the main transformation is carried out at this
   entity. No extra signaling is needed in the network. At the receiver
   node side, no transformation occurs, apart from the consideration of
   a KI to notify nodes of the update of the TGK key.

   The GCKS is in charge of launching MIKEY protocol instances for each
   of the different clusters. The GCKS must guarantee that these
   instances are synchronized and that they share the same group key
   TGK at all times. Each receiver node within the same cluster will
   share other TGK keys shared with nodes from some other clusters.

   The base MIKEY protocol does not provide TGK rekeying in the GKMARCH
   sense [RFC4046]. The MIKEY protocol is re-executed again and keys
   are updated using unicast messages. With the approach proposed in
   this I-D, TGK update uses the same procedure as the base MIKEY
   protocol for nodes in the cluster where membership changes occur.
   Otherwise, a notification of the change of the group key is
   performed at the underlying security protocol using the key index
   associated with the new group key.

   The decision of TGK update procedure is carried out by the GCKS that
   ensures synchronization between the different instances of MIKEY for
   the same group communication.

4. Security Considerations

   Since the proposed approach relies on multiple instances of the base
   MIKEY protocol, it does not perform significant changes to the base
   protocol, and rather focuses on the group architecture without
   impacting the security of the protocol.

5. IANA Considerations

   IANA is requested to record the pre-defined values defined in
   [RFC3830]. The name spaces for the new field Key index identified in
   [I-D.ietf-roll-mikey-lln-key-mgmt] are requested to be managed by
   IANA.



Oualha                Expires December 24, 2013               [Page 7]

Internet-Draft     Extending MIKEY for use in LLNs           June 2013

6. References

     6.1. Normative References

   [RFC3830] Arkko, J., Carrara, E., Lindholm, F., Naslund, M., and
             Norrman, K. "MIKEY: Multimedia Internet KEYing", RFC 3830,
             August 2004.

   [RFC6407] Weis, B., Rowles, S., and Hardjono, T., "The Group Domain
             of Interpretation", RFC 6407, October 2011.

   [RFC4442] Fries, S. and Tschofenig, H., "Bootstrapping Timed
             Efficient Stream Loss-Tolerant Authentication (TESLA)",
             RFC 4442, March 2006.

   [RFC4563]  Carrara, E., Lehtovirta, V., and Norrman, K., "The Key ID
             Information Type for the General Extension Payload in
             Multimedia Internet KEYing (MIKEY)", RFC 4563, June 2006.

   [RFC4650]  Euchner, M., "HMAC-Authenticated Diffie-Hellman for
             Multimedia Internet KEYing (MIKEY)", RFC 4650, September
             2006.

   [RFC4738]  Ignjatic, D., Dondeti, L., Audet, F., and Lin, P.,
             "MIKEY-RSA-R: An Additional Mode of Key Distribution in
             Multimedia Internet KEYing (MIKEY)", RFC 4738, November
             2006.

   [RFC5197]  Fries, S. and Ignjatic, D., "On the Applicability of
             Various Multimedia Internet KEYing (MIKEY) Modes and
             Extensions", RFC 5197, June 2008.

   [RFC5410]  Jerichow, A. and Piron, L., "Multimedia Internet KEYing
             (MIKEY) General Extension Payload for Open Mobile Alliance
             BCAST 1.0", RFC 5410, January 2009.

   [RFC6043]  Mattsson, J. and Tian, T., "MIKEY-TICKET: Ticket-Based
             Modes of Key Distribution in Multimedia Internet KEYing
             (MIKEY)", RFC 6043, March 2011.

   [RFC6267]  Cakulev, V. and Sundaram, G., "MIKEY-IBAKE: Identity-
             Based Authenticated Key Exchange (IBAKE) Mode of Key
             Distribution in Multimedia Internet KEYing (MIKEY)", RFC
             6267, June 2011.

   [RFC3740] Hardjono, T. and Weis, B., "The Multicast Group Security
             Architecture", RFC 3740, March 2004.




Oualha                Expires December 24, 2013               [Page 8]

Internet-Draft     Extending MIKEY for use in LLNs           June 2013

   [RFC4046] Baugher, M., Canetti, R., Dondeti, L., and Lindholm, F.,
             "Multicast Security (MSEC) Group Key Management
             Architecture", RFC 4046, April 2005.

   [RFC4563] Carrara, E., Lehtovirta, V., and Norrman, K. "The Key ID
             Information Type for the General Extension Payload in
             Multimedia Internet KEYing (MIKEY)", IETF RFC 4563, June
             2006.

     6.2. Informative References

   [I-D.ietf-roll-mikey-lln-key-mgmt] Alexander, R. and Tsao, T.,
             "Adapted Multimedia Internet KEYing (AMIKEY): An extension
             of Multimedia Internet KEYing (MIKEY) Methods for Generic
             LLN Environments", draft-alexander-roll-mikey-lln-key-
             mgmt-03, March 12, 2012.


































Oualha                Expires December 24, 2013               [Page 9]

Internet-Draft     Extending MIKEY for use in LLNs           June 2013

Authors' Addresses

   Nouha Oualha
   CEA, LIST
   CEA Saclay Nano-Innov
   Bat 862 - PC 173 - F91191 Gif sur Yvette Cedex
   France

   Email: nouha.oualha@cea.fr


   Mounir Kellil
   CEA, LIST
   CEA Saclay Nano-Innov
   Bat 862 - PC 173 - F91191 Gif sur Yvette Cedex
   France

   Email: mounir.kellil@cea.fr


   Christophe Janneteau
   CEA, LIST
   CEA Saclay Nano-Innov
   Bat 862 - PC 173 - F91191 Gif sur Yvette Cedex
   France

  Email: christophe.janneteau@cea.fr























Oualha                Expires December 24, 2013              [Page 10]