Internet DRAFT - draft-hao-physical-layer-fingerprint-interface
draft-hao-physical-layer-fingerprint-interface
Southeast University, Upsec Inc. H. Fang
Internet-Draft Upsec Inc.
Intended status: Standards Track H. Fu
Expires: 14 October 2022 Southeast University
L. Jin
Upsec Inc.
Y. Jiang
A. Hu
Southeast University
12 April 2022
Interface specification for physical layer fingerprint access
authentication framework of IoT devices
draft-hao-physical-layer-fingerprint-interface-00
Abstract
This document is for access authentication framework of Internet of
Things (IoT) devices using physical layer fingerprint. This document
specifies the interface functions of the authentication framework.
This document applies to the construction and management of secure
access at the edge of the IoT. This document assumes that the reader
is familiar with the concepts of physical layer fingerprint
technique.
Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on 14 October 2022.
Fang, et al. Expires 14 October 2022 [Page 1]
Internet-Draft RFF ACCESS April 2022
Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Objectives of physical layer fingerprint access authentication
framework . . . . . . . . . . . . . . . . . . . . . . . . 3
3.1. Functional objectives . . . . . . . . . . . . . . . . . . 4
3.2. Non-functional objectives . . . . . . . . . . . . . . . . 4
4. Physical layer fingerprint access authentication framework . 5
4.1. Structure of the Physical layer fingerprint access
authentication framework . . . . . . . . . . . . . . . . 5
4.2. Interface functions for physical layer fingerprint access
authentication . . . . . . . . . . . . . . . . . . . . . 6
4.2.1. Full whitelist request . . . . . . . . . . . . . . . 6
4.2.2. Incremental whitelist request . . . . . . . . . . . . 6
4.2.3. Blacklisting . . . . . . . . . . . . . . . . . . . . 7
4.2.4. Unblacklisting . . . . . . . . . . . . . . . . . . . 7
5. Interface Specification . . . . . . . . . . . . . . . . . . . 7
5.1. Full whitelist request interface . . . . . . . . . . . . 7
5.2. Incremental whitelist request interface . . . . . . . . . 8
5.3. Blacklisting interface . . . . . . . . . . . . . . . . . 8
5.4. Unblacklisting interface . . . . . . . . . . . . . . . . 9
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
7. Security Considerations . . . . . . . . . . . . . . . . . . . 10
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 10
8.1. Normative References . . . . . . . . . . . . . . . . . . 10
8.2. Informative References . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 11
Fang, et al. Expires 14 October 2022 [Page 2]
Internet-Draft RFF ACCESS April 2022
1. Introduction
Device authentication is important to ensure the security of Internet
of Things (IoT). The classical device authentication techniques are
based on MAC address, preshared key or digital certificate
[I-D.linning-authentication-physical-layer]. However, MAC address
can be imitated. As the IoT becomes more diverse and pervasive, the
implementation of the pre-shared key and digital certificate becomes
increasingly complex.
Physical layer fingerprint is a promising technique for IoT device
authentication[Ref_1]. It corresponds to extract the inherent
physical layer features of the device from the received signal.
These physical layer features have shown uniqueness and persistence,
hence can be used for device authentication.
Because that the physical layer fingerprint access authentication
requires only the signal received from the IoT device, a suitable
access authentication framework needs to be defined. An
authentication framework has been proposed in
[I-D.dawei-access-authentication-physical-layer], with the basic
functions of the framework, specification of fingerprint expression
and control message. In this document, based on the same access
authentication model, the objectives of the access authentication
framework and interface specifications have been proposed, to ensure
the effectiveness and facilitate the integration of the access
authentication framework with the existing IoT network.
2. Glossary
IoT Device Access Gateway
A device works for network connection, control and management,
deployed at the boundary between the perception layer and the
network layer of the IoT. It realizes the communication between
the IoT devices and the network layer.
Physical layer fingerprint authentication device
A device works for training, identifying and authenticating IoT
devices.
3. Objectives of physical layer fingerprint access authentication
framework
Fang, et al. Expires 14 October 2022 [Page 3]
Internet-Draft RFF ACCESS April 2022
3.1. Functional objectives
The physical layer fingerprint access authentication framework should
achieve the following functional objectives:
a) The physical layer fingerprint access authentication framework
shall be independent of the application system, to help establish a
trust relationship between the application system and IoT devices and
provide prerequisites for further determining whether the IoT devices
can access the main network of the application system.
b) The physical layer fingerprint access authentication framework
should be independent of the specific physical layer communication
protocols of IoT devices, and can support all possible physical layer
communication protocols.
c) The physical layer fingerprint access authentication framework
should maintain the accuracy of the used physical layer fingerprint
extraction and identification mechanism.
d) The interface defined by the physical layer fingerprint access
authentication framework should not require the IoT device access
gateway of the original application system to give additional
physical layer configuration parameters.
3.2. Non-functional objectives
The physical layer fingerprint access authentication framework should
achieve the following non-functional objectives:
a) The physical layer fingerprint access authentication framework
does not specify a specific physical layer fingerprint extraction and
identification mechanism.
b) The interface defined by the physical layer fingerprint access
authentication framework does not specify a specific interface access
authentication mechanism, but to avoid abuse of the defined
interface, the necessary security authentication shall exist between
the physical layer fingerprint access authentication device and the
IoT device access gateway of the application system.
c) The physical layer fingerprint access authentication framework is
independent of the specific operating system or platform, but the
implementation of the physical layer fingerprint access
authentication device may be relevant to a specific operating system
or platform.
Fang, et al. Expires 14 October 2022 [Page 4]
Internet-Draft RFF ACCESS April 2022
d) The interfaces defined by the physical layer fingerprint access
authentication framework should enable integration with legacy
systems.
4. Physical layer fingerprint access authentication framework
4.1. Structure of the Physical layer fingerprint access authentication
framework
The structure of the physical layer fingerprint access authentication
framework is shown in Fig. 1. The physical layer fingerprint access
authentication is composed of two parts: the physical layer
fingerprint authentication device and the IoT device access gateway.
The physical layer fingerprint authentication device adopts a
distributed architecture and can simultaneously serve multiple IoT
devices to access the gateway.
+----------------+ +----------------+ +------------+
| | | IoT device | | |
| IoT device | <----> | access gateway | <----> | Intranet |
|(Claiming party)| | (Relying party)| | |
| | | | | |
+----------------+ +----------------+ +------------+
^ ^
| | -Full whitelist request
| | -Incremental whitelist request
| | -Blacklisting
| | -Unblacklisting
| v
| +------------------------------+
+-----> | |
| Physical layer fingerprint |
| authentication device |
| (Verifier) |
| |
+------------------------------+
Figure 1: Structure of the physical layer fingerprint access
authentication framework
The main function of the physical layer fingerprint authentication
device is to complete the extraction and authentication of the
fingerprint of the IoT device through a certain identity
authentication mechanism, and to submit the authentication result in
the form of assertion to the IoT device access gateway. The physical
layer fingerprint authentication device does not limit the specific
identity authentication mechanism, but only provides a unified
interface, and the specific authentication interaction process with
Fang, et al. Expires 14 October 2022 [Page 5]
Internet-Draft RFF ACCESS April 2022
the IoT device is completed by the implementation of each
authentication mechanism itself. The physical layer fingerprint
authentication device corresponds to the verifier in the
authentication model of
[I-D.dawei-access-authentication-physical-layer].
The IoT device access gateway interacts with the physical layer
fingerprint authentication device to assist in the authentication
process of the IoT device accessing the main network of the
application system. The IoT device access gateway and the
application system together correspond to the relying party in the
authentication model of
[I-D.dawei-access-authentication-physical-layer].
The communication between the IoT device access gateway and the
physical layer fingerprint authentication device is by default
protected by a trusted channel. If the application system and the
physical layer fingerprint authentication device are integrated
together, i.e., the verifier and the relying party are unified
entities, this trusted channel becomes the internal data transmission
in the system. If the application system and the physical layer
fingerprint authentication device are located in different systems
and need to communicate with each other remotely, this trusted
channel is an encrypted channel between them.
4.2. Interface functions for physical layer fingerprint access
authentication
4.2.1. Full whitelist request
The physical layer fingerprint authentication device requests the
full whitelist of IoT devices from the IoT device access gateway
through this interface. Based on the full whitelist, the physical
layer fingerprint authentication device performs fingerprint
extraction and authentication for all whitelisted devices.
4.2.2. Incremental whitelist request
The physical layer fingerprint authentication device requests the IoT
device whitelist incremental list from the IoT device access gateway
through this interface, and based on the whitelist incremental list,
the physical layer fingerprint authentication device performs
fingerprint extraction and authentication for the added whitelist
devices.
Fang, et al. Expires 14 October 2022 [Page 6]
Internet-Draft RFF ACCESS April 2022
4.2.3. Blacklisting
When the physical layer fingerprint authentication device identifies
that the status of one device in the whitelist has been changed from
legal to illegal, this authentication result should be submitted to
the IoT device access gateway, and at the same time, the IoT device
access gateway adds this device to the blacklist and intercepts it.
4.2.4. Unblacklisting
When the physical layer fingerprint authentication device identifies
that the status of one device in the whitelist has changed from
illegal to legal, this authentication result should be submitted to
the IoT device access gateway, and at the same time, the IoT device
access gateway withdraws this device from the interception blacklist.
5. Interface Specification
5.1. Full whitelist request interface
This interface needs to provide the following requests and responses:
Requests:
a) Protocol version
The version of the protocol between the physical layer fingerprint
authentication device and the IoT device access gateway.
b) Gateway identifier
The unique identifier of the IoT device access gateway for use when
the physical layer fingerprint authentication device interacts with
the IoT device access gateway for information.
Responses:
a) Full whitelist
The full amount of data of the whitelisted IoT devices set in the IoT
device access gateway, generally including the following parts:
device MAC address, IP address, etc.
b) Policy expiration time
Fang, et al. Expires 14 October 2022 [Page 7]
Internet-Draft RFF ACCESS April 2022
The policy expiration time specifies the valid time of the whitelist,
and the physical layer fingerprint authentication device identifies
and authenticates the current whitelisted device within this valid
time.
5.2. Incremental whitelist request interface
This interface needs to provide the following requests and responses:
Requests:
a) Protocol version
The version of the protocol between the physical layer fingerprint
authentication device and the IoT device access gateway.
b) Gateway identifier
The unique identifier of the IoT device access gateway for use when
the physical layer fingerprint authentication device interacts with
the IoT device access gateway for information.
Responses:
a) Incremental whitelist
The incremental whitelist data of IoT devices set in the IoT device
access gateway, generally including the following parts: device MAC
address, IP address, etc.
b) Policy expiration time
The policy expiration time specifies the valid time of the whitelist,
and the physical layer fingerprint authentication device identifies
and authenticates the current whitelisted device within this valid
time.
5.3. Blacklisting interface
This interface needs to provide the following requests and responses:
Requests:
a) Protocol version
The version of the protocol between the physical layer fingerprint
authentication device and the IoT device access gateway.
Fang, et al. Expires 14 October 2022 [Page 8]
Internet-Draft RFF ACCESS April 2022
b) Gateway identifier
The unique identifier of the IoT device access gateway for use when
the physical layer fingerprint authentication device interacts with
the IoT device access gateway for information.
c) Device information
Information of device to be blacklisted, generally including the
following parts: device MAC address, IP address, etc.
d) Authentication result
The current authenticatin result.
Responses:
a) Gateway identifier
The unique identifier of the IoT device access gateway for use when
the physical layer fingerprint authentication device interacts with
the IoT device access gateway for information.
b) Policy expiration time
The policy expiration time specifies the valid time of the whitelist,
and the physical layer fingerprint authentication device identifies
and authenticates the current whitelisted device within this valid
time.
c) Device information
Information of device just blacklisted, generally including the
following parts: device MAC address, IP address, etc.
5.4. Unblacklisting interface
This interface needs to provide the following requests and responses:
Requests:
a) Protocol version
The version of the protocol between the physical layer fingerprint
authentication device and the IoT device access gateway.
b) Gateway identifier
Fang, et al. Expires 14 October 2022 [Page 9]
Internet-Draft RFF ACCESS April 2022
The unique identifier of the IoT device access gateway for use when
the physical layer fingerprint authentication device interacts with
the IoT device access gateway for information.
c) Device information
Information of device to be unblacklisted, generally including the
following parts: device MAC address, IP address, etc.
d) Authentication result
The current authentication result.
Responses:
a) Gateway identifier
The unique identifier of the IoT device access gateway for use when
the physical layer fingerprint authentication device interacts with
the IoT device access gateway for information.
b) Policy expiration time
The policy expiration time specifies the valid time of the whitelist,
and the physical layer fingerprint authentication device identifies
and authenticates the current whitelisted device within this valid
time.
c) Device information
Information of device just un-blacklisted, generally including the
following parts: device MAC address, IP address, etc.
6. IANA Considerations
This document includes no request to IANA.
7. Security Considerations
This section will address only security considerations associated
with the use of physical layer fingerprint access authentication
framework. It is necessary to ensure that the IoT device access
gateway and the physical layer fingerprint authentication device are
in a secure and trusted environment.
8. References
8.1. Normative References
Fang, et al. Expires 14 October 2022 [Page 10]
Internet-Draft RFF ACCESS April 2022
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
8.2. Informative References
[I-D.dawei-access-authentication-physical-layer]
Fang, D., Hu, A., FU, H., and Y. Jiang, "IoT Access
Authentication Framework based on Radio Frequency
Fingerprint and Fingerprint Expression Specification",
Work in Progress, Internet-Draft, draft-dawei-access-
authentication-physical-layer-00, 16 February 2022,
<https://www.ietf.org/archive/id/draft-dawei-access-
authentication-physical-layer-00.txt>.
[I-D.linning-authentication-physical-layer]
Peng, L. and A. Hu, "Authentication by Physical Layer
Features", Work in Progress, Internet-Draft, draft-
linning-authentication-physical-layer-00, 8 October 2018,
<http://www.ietf.org/internet-drafts/draft-linning-
authentication-physical-layer-00.txt>.
[Ref_1] Danev, Boris.,
"https://dl.acm.org/doi/10.1145/2379776.2379782", 2012.
Authors' Addresses
Hao Fang
Upsec Inc.
No.9 Mozhou Donglu, Jiangning
Nanjing
JiangSu, 211111
China
Email: fanghao@upsec.cn
Hua Fu
Southeast University
No.2 SiPaiLou
Nanjing
JiangSu, 210096
China
Email: hfu@seu.edu.cn
Fang, et al. Expires 14 October 2022 [Page 11]
Internet-Draft RFF ACCESS April 2022
Ling Jin
Upsec Inc.
No.9 Mozhou Donglu, Jiangning
Nanjing
JiangSu, 211111
China
Email: jinling@upsec.cn
Yu Jiang
Southeast University
No.2 SiPaiLou
Nanjing
JiangSu, 210096
China
Email: jiangyu@seu.edu.cn
Aiqun Hu
Southeast University
No.2 SiPaiLou
Nanjing
JiangSu, 210096
China
Email: aqhu@seu.edu.cn
Fang, et al. Expires 14 October 2022 [Page 12]