Internet DRAFT - draft-pporamba-core-dtls-certkey
draft-pporamba-core-dtls-certkey
Internet Engineering Task Force P. Porambage
Internet-Draft P. Kumar
Intended status: Experimental A. Gurtov
Expires: June 13, 2014 M. Ylianttila
E. Harjula
CWC, University of Oulu
December 10, 2013
Certificate based keying scheme for DTLS secured IoT
draft-pporamba-core-dtls-certkey-00
Abstract
The IP-based Internet of Things (IoT) stands for the universal
interconnection of smart objects and back end users with the help of
IP protocols. Secure key management among the smart objects is an
important aspect of IoT security. Due to the high levels of resource
constraints of the devices in terms of memory, battery capacity and
CPU power, and other network characteristics such as mobility,
scalability, heterogeneity and limited bandwidth, the conventional
security protocols cannot be directly deployed in IoT networks in
their raw formats. We propose a lightweight DTLS-based keying
mechanism for CoAP IoT smart objects which supports the scalability
of the network and node mobility. In addition to the key
establishment part the protocol also provides node authentication.
The protocol consumes less device resources and minimum network
bandwidth by incurring low message overhead. The smart objects can
securely access the network and obtain certificates after an initial
configuration irrespective of the manufacturer standards.
Requirements Language
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Porambage, et al. Expires June 13, 2014 [Page 1]
Internet-Draft DTLS CERTREQ December 2013
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on June 13, 2014.
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
This document may not be modified, and derivative works of it may not
be created, and it may not be published except as an Internet-Draft.
1. Introduction
The IP-based Internet of Things (IoT) will enable smart objects to
communicate among each other and with backend users of the Internet
during different activities such as sensing, controlling, smart
metering and etc. When the IoT networks are formed with massive
number of resource constrained nodes, they are inherently vulnerable
to security attacks. Therefore, in order to acheive trustworthy data
communication, it is important to maintain a secure object
authorization mechanism and a common session key between two parties
in every application scenarios.
IoT networks and the network devices have several specific
characteristics. Mostly the devices are tightly resource constrained
in terms of memory, battery capacity, CPU power and bandwidth.
Therefore, the standard expensive IP-based protocols cannot be
deployed in such networks and inexpensive communication protocols are
required. Currently IETF is contributing to the development of
lightweight protocols for Low-power Lossy IoT networks. E.g. IPV6
over Wireless Personal Area Networks (6LoWPAN) and Constrained
Application Protocol (CoAP). Likewise security protocols have been
introduced such as DTLS, HIP-DEX and light versions of EAP. However
they are still being undergoing profiling and standardization to
Porambage, et al. Expires June 13, 2014 [Page 2]
Internet-Draft DTLS CERTREQ December 2013
incorrperate with IoT enabled smart devices. The network can be
comprised of heterogeneous devices which are manufactured by
different vendors with different specifications. Therefore, it is
quite challenging to define a common security protocol that is
compatible with all the device specifications. The devices can also
be mobile and application specific. The size of the network might be
varying from hundreds to billions of nodes.
In this draft we propose a secure network access and a key management
scheme for resource restricted IoT networks. Furthermore, we analyze
how the new protocol supports mobility of the devices and scalability
of the network. Secure network access enables the nodes to obtain
authorized identity from a trusted root. The two-phase solution is
formulated with Datagram Transport Layer Security (DTLS) handshaking
protocol. The certificate generation and key establishment are based
on Elliptic Curve Cryptography (ECC) arithmetic. The rest of the
document is organized as follows. Section 2 gives some related work
and background about DTLS secured IoT networks. Section 3 describes
the use cases and the problem statement. Section 4 presents the
proposed security scheme. Finally, Section 5 concludes the proposed
IoT security solution with future improvements.
2. Related Work and Background
DTLS protocol is an adaptation of Transport Layer Security (TLS)
protocol which runs on unreliable User Datagram Protocol (UDP)
connections [RFC6347]. Though DTLS uses similar messages as TLS
handshaking it has some internal mechanisms to withstand against DoS
attacks, replay attacks, packet losses and packet reordering.
Therefore, DTLS is proposed as the main security binding for
Constrained Application Protocol (CoAP) [I-D.ietf-core-coap].
Basically the DTLS secured CoAP has three modes of security.
PreSharedKey: A list of pre-shared keys is deployed in the network
nodes. When a connection is formed with a new node, the system
selects the appropriate key based on the new node and establishes a
DTLS session using DTLS PSK mode. This implementation is mandatory
to consider cipher suite TLS_PSK_WITH_AES_128_CCM_8 as specified in
[RFC6655] and security considerations of [RFC4279].
RawPublicKey: The DTLS enabled devices have asymmetric key pair
without an X.509 certificate. The raw public keys are pre-configured
in the devices in accordance to the cipher suite
TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 as specified in
[I-D.mcgrew-tls-aes-ccm-ecc], [RFC5246], [RFC4492]. Each smart
object calculates an identifier based on its public key. The
identifiers are used to associate the endpoints with further device
information and to perform access control.
Porambage, et al. Expires June 13, 2014 [Page 3]
Internet-Draft DTLS CERTREQ December 2013
Certificate: The DTLS enabled devices have asymmetric key pair with
an X.509 certificate. The certificates are issued and signed by a
common trust root. Sometimes a device might have one or several
certificates issued by more than one certificate authority. When a
device is forming a new connection with a remote device, the
certificates should be verified.
The last two phases of DTLS based security modes are more dynamic and
scalable. Since the nodes might be manufactured by different vendors
with different specifications, it is yet an open issue to bring the
security solution to a common platform. However the use of X.509
certificates is still quite expensive for resource constrained
network devices such as tiny sensors, actuators and smart home
appliances. Instead of using a costly explicit certificate scheme,
it will be highly appropriate to replace with an implicit certificate
scheme which consumes fewer resources and induces low network
overhead. The same certificates are to be utilized in pairwise key
establishment between CoAP nodes. Though, DTLS is considered a
lighter and robust security solution, the number of message transfers
to establish the secure connection (i.e. 12 messages) still
introduces a large communication overhead. In
[I-D.garcia-core-security-05], the authors have presented the most
significant security considerations in the IP-based Internet of
Things. The internet-draft [I-D.keoh-lwig-dtls-iot] proposes
pervasive security architecture for the IoT in order to provide
network access control to smart devices, the management of keys and
securing unicast/multicast communication.
3. Use Cases and Problem Statement
Our work aims an IoT network running on 6LoWPAN/CoAP enabled smart
network devices. The network devices can be stationary or mobile,
battery powered and highly resource constrained in terms of memory
and CPU power. The communication links might have bandwidth
limitations too. In applications such as smart power metering,
health monitoring and smart home, the IoT network is connected to the
public internet through a number of 6LoWPAN border routers (6LBR).
In defining this key establishment protocol, we consider the 6LBR is
performing as the coordinator entity of the IoT network. For
instance take into account a particular scenario of a smart building
where the lighting devices, window panes and air condition machines
are controlled, monitored and billed by a central authority. The
functionality of each device is controlled by the central node, based
on the sensed data related to the network.
3.1. Problem Statement and Requirements
Porambage, et al. Expires June 13, 2014 [Page 4]
Internet-Draft DTLS CERTREQ December 2013
As explained in the previous section, DTLS plays a prominent role in
CoAP-based IoT security, even thought, it produces a reasonable
message overhead to low-power lossy networks. The demand for a
secure lightweight keying mechanism is significant for both DTLS and
non-DTLS secured IoT networks. The utilization of implicit
certificates as a replacement for X.509 certificates will also be a
low-cost solution. Therefore we identify two main problems with
security in CoAP-based IoT networks.
o A new joining device must have secure and authorized identity to
perform as legitimate nodes in the network. The nodes can claim
their legitimacy by having implicit certificates granted by a
common trust root (e.g. 6LBR).
o Lightweight pairwise key establishment is mandatory for mutual
communication between nodes or nodes and back end internet users.
The two entities should be able to use the certificates as an
implicit assurance for being legitimate users of the particular
network.
Additionally the solution requires being scalable and supporting
mobility and heterogeneity of the network devices. Since the network
might contain thousand to billions of nodes, the solution should be
easily extensible. Furthermore, since the devices have to be
accessed and controlled via standard IP protocols, the authorized
identification should be IP supportive.
3.2. Security Requirements
We consider the Internet Threat Model in [RFC3552] where a malicious
attacker can read and modify the network traffic while transmitting
between devices. However, it is assumed that the devices themselves
are protected and not exposed to node capture or compromising
attacks.
The security scheme should be lightweight as well as strongly
secured. PKC based schemes are inherently secured comparing to
symmetric key algorithms. Elliptic Curve Cryptography (ECC) which is
an inexpensive alternative for PKC is to be used for protocol design.
Random numbers are supposed to be generated as given in
[NIST-800-108].
4. Design
This section provides a brief overview of the design of the protocol
which consists of two phases as (i) secure network access and
certificate receipt (ii) secure pairwise key establishment between
communicating nodes.
Porambage, et al. Expires June 13, 2014 [Page 5]
Internet-Draft DTLS CERTREQ December 2013
4.1. Overview
The first phase associates with a new node accesses to a secure
network and obtains its authorized certificate and private key
construction data for deriving its own private-public key pair. When
a new node is added to the network with an initial configuration of
cryptographic primitives it has to generate a certificate request to
the certificate authority (CA) (i.e. 6LBR). Since the smart devices
have limited transmission they might not be able to access the trust
root or 6LBR in single hop. Therefore the certificate requests can
be sent as multiple hops by means of relaying devices. Since 6LBR is
a resource rich device, we assume that the 6LBR can directly transmit
the certificates to all the smart devices within the network as a
broadcast message. By including the identity of the recepient of the
broadcasting certificate message we can allow the nodes to keep or
discard the certificate.
The second phase of the protocol supports to establish secure traffic
encryption keys between any two legitimate nodes which can prove
their authenticity using the certificates and other cryptographic
primitives. Even a back end user of the traditional internet can
establish pairwise keys with smart devices in the IoT network after
communicating with the corresponding 6LBR. However, the users should
obviously possess the security parameters (i.e. certificate issued by
the same trust root) similar to the other nodes it the particular IoT
network. In such scenarios, the back end users also have to access
the corresponding border router initially. Afterwards the secure
communication can be established according to DTLS Certificate mode
as explained in section 4.3.
4.2. Hash Function Selection
During both phases, a cryptographic hash function has to be used. As
specified in [SEC4], hash function selection should be carefully done
for low-power devices and their security algorithms. The use of
SHA-1 is not recommended anymore due its security collapse shown by
Wang, [Collisions-SHA1]. SHA-2 and SHA-3 functions induce a high
processing overhead and memory footprint on devices which are not
affordable by resource constrained network devices. In
[I-D.ietf-suiteee], the author has proposed a suitable block cipher
based hash function for resource constrained devices. The motivation
is to use a hash function with reduced codes size, suitable for
hardware implementation, reduced computational cost and less energy
consumption, however with strong security. As explained in
[I-D.ietf-suiteee], AES-MMO (Matyas-Meyer-Oseas) hash function
provides a reasonable level of security with less resource
consumption. Specifically it supports the hardware specifications of
IEEE 802.15.4 standard including AES encryption. AES-MMO provides
Porambage, et al. Expires June 13, 2014 [Page 6]
Internet-Draft DTLS CERTREQ December 2013
128-bit security level and MD-strengthening padding scheme is used
for existing deployments in ZigBee Smart Energy applications which
reduces padding on small messages. However, the use of AES-MMO hash
function for real-time implementation requires careful
considerations.
4.3. Certificate Generation
DTLS message exchange for secure network access has to be performed
when a new node is joining to an existing IoT network. The
certificate generation is inspired by the ECQV implicit certificate
scheme presented in [SEC4]. First the node should be pre-installed
with several security parameters namely, Elliptic Curve (EC) domain
parameters (q, a, b, G - base point generator with n order, q - a
prime), authentication key K, CAs public key (Q_CA) and a valid IPV6
address. K is common to all the smart objects and trust root of the
network. Then the node can be located in the network and start
exchanging messages with the corresponding trust root (i.e. CA). The
simple timeout and retransmission scheme with the standard DTLS state
machine is also applicable to this handshaking too.
Initially the client (i.e. smart device) sends the Client Hello
message and upon receiving the message, the server (i.e. CA) verifies
the message and responds with a HelloVerifyRequest. After the client
verifies the server Hello message successfully, it generates a random
integer r_U and true nonce N_U, creates a certificate request (EC
point) R_U and sends to the server the certificate request along with
its IPV6 address and MAC value.
Upon receiving the certificate request, the server checks the
legitimacy of IPV6 address and verifies the MAC value. If both are
successful, the server computes public key reconstruction data P_U
for the client, using the request point R_U. Then the certificate is
generated as an encoded version of P_U, client IPV6 address and time
stamp T. The server computes an integer (r_U) value for calculating
client private key construction value s. Hash value of the
certificate is computed during this stage. The selection of hash
function is described in section 4.1.1. CA private key (d_CA) is
utilized while calculating s.
On receiving the certificate and private key construction integer,
the client first verifies the integrity of the message using the MAC
and analyses the certificate for further verifications.
The client calculates private key (d_U) and public key (Q_U) as
depicted in Figure 1. During this stage, the client computes its
public key by two mechanisms for authenticating whether the
certificate is granted by the given trusted root. If the
Porambage, et al. Expires June 13, 2014 [Page 7]
Internet-Draft DTLS CERTREQ December 2013
verification is successful, the client sends Finish message to the
server. Finally, the server concludes the handshaking with the
Server Finished message.
Client Server
(Node U) (CA)
-------- --------
Client Hello ---------->
<---------- HelloVerifyRequest
Certificate Request
Generation
generate r_U
R_U = r_U * G
Generate N_U
Calculate
MAC[R_U, U, N_U]
Certificate Request
R_U, N_U, U, MAC ---------->
Check validity of U
Verify MAC
Generate r_CA
P_U = R_U + r_CA * G
Cert_U = {U, P_U, T}
e = H(Cert_U)
s = e*r_CA + d_CA (mod n)
Generate N_CA
Calculate
MAC [Cert_U, s, N_CA]
Message
<---------- U,Cert_U, s, N_CA, MAC
Verify MAC
Analyze Cert_U
e = H(Cert_U)
d_U = e*r_U + s (mod n)
Method 1: Q_U = d_U*G
Method 2: Q1_U = eP_U + Q_CA
Verify Q_U == Q1_U
ClientFinished ---------->
<---------- ServerFinished
Figure 1
Porambage, et al. Expires June 13, 2014 [Page 8]
Internet-Draft DTLS CERTREQ December 2013
4.4. Secure Pairwise Key Establishment
When the IoT network nodes possess valid certificates and public-
private key pairs, they are in a position to communicate equivalently
in the Certificate mode of DTLS secured CoAP. Two smart devices can
setup a secure communication channel along with a pairwise key
establishment for traffic encryption as illustrated in Figure 2.
Here we consider the initiator node as the client and the responder
node as the server.
Client Server
(Node U) (Node V)
-------- --------
Client Hello ---------->
<---------- HelloVerifyRequest
Generate N_U
Calculate MAC [Cert_U, U, N_U]
Key Establishment Request
Cert_U, N_U, U, MAC ---------->
Check validity of U
Verify MAC
e = H(Cert_U)
Q_U = eCert_U + Q_CA
Generate N_V
Calculate MAC[Cert_V, V, N_V]
Response
<---------- Cert_V, N_V, V, MAC
Verify MAC K_UV = d_V*Q_U = d_V*d_U*G
e = H(Cert_V)
Q_V = eCert_V + Q_CA
K_UV = d_U*Q_V = d_U*d_V*G
ClientFinished ---------->
<---------- ServerFinished
Figure 2
The initial handshake is performed between the client and the server
by exchanging Hello messages according to the standard DTLS protocol.
The client node (U) chooses a true random nonce NU and broadcasts it
along with Cert_U, IPV6 address U and MAC[Cert_U, N_U, U]. Similarly
in Phase I, MAC is appended for the initial authentication. Once the
server node (V) receives the message, it verifies the MAC. If the
verification succeeds, it can ensure that U is an authenticated user.
Porambage, et al. Expires June 13, 2014 [Page 9]
Internet-Draft DTLS CERTREQ December 2013
Furthermore, V can have an implicit assurance that U is a legitimate
user of the given cluster by computing sender public key QU using
Q_CA; e = H(Cert_U) and Q_U = eCert_U + Q_CA. According to the
following derivation in Figure 3, the calculation also gives exactly
the same Q_U as computed by node U.
Q_U = d_U * G
= (er_U + s (mod n)) * G
= (er_U + er_CA + d_CA (mod n)) *G
= e (r_U + r_CA (mod n)) * G + d_CA * G
= e(r_U * G + r_CA * G) + Q_CA
= e(R_U + r_CA * G) + Q_CA
= eCert_U + Q_CA
Figure 3
Then the node V generates a random nonce NV and sends it along with
Cert_V , identity V and MAC[Cert_V , N_V , V]. In the meantime V
computes the pairwise key K_UV from its private key d_V and Q_U, K_UV
= d_V Q_U. Similar to V, upon receiving the message, node U verifies
the MAC and if the verification is successful it computes QV and K_UV
= d_UQ_V . Therefore, at the end of two way message transferring,
both parties can derive a common pairwise key for actual secure
communication.
Comparing to the standard ECDH key exchange, our scheme is more
secure since it validates the legitimacy of both parties before
deriving the final key. Instead of transmitting the public keys in
the air, the nodes send their Cert values to derive the public keys
(at the other node). This will also implicitly assure the
authenticity and legitimacy of smart objects.
Finally the handshaking is concluded by exchanging Finished messages.
We assume that DTLS handshaking messages are delivered reliably as
explained in [RFC6347].
Likewise, the same handshaking can be performed between a smart
device in the IoT network and a backend user in the Internet.
However the Internet users should also possess valid certificates
from the same trust root.
5. Conclusion
In this Internet draft we have proposed a DTLS-based certificate
scheme and a secure key establishment for IoT networks. The protocol
is lightweight and strongly secured due to the exploitation of ECC
arithmetic throughout the entire design.
Porambage, et al. Expires June 13, 2014 [Page 10]
Internet-Draft DTLS CERTREQ December 2013
Our protocol supports the scalability of the network and the topology
changes (i.e, location changes or mobility) of the smart objects with
in the same IoT network. When a new node is added to the network, a
valid node identity, keying information (i.e, K and QCA) and EC
domain parameters should be stored. Then, at the bootstrapping
phase, the node can send the certificate request and obtain a
certificate from the CA for computing its own keys. Therefore, the
size of the network is not necessary to be pre-defined during the
initial deployment phase. The CA only needs to verify the validity
of the sensor node IPV6 identities to issue the certificate.
Similarly, the nodes do not need a prior knowledge about their
neighbors. Whenever a new node is added to the network or it changes
the neighboring set, it can establish the pairwise link keys, with
the corresponding neighbors using the certificate.
The certificates always provide an implicit assurance for the nodes,
that they are authenticated nodes in the given domain. Irrespective
of the location of the devices (within the given IoT network) they
can derive the pairwise keys securely without previous awareness of
the new communicating nodes. If the pairwise keys between
communicating nodes (i.e. node to node or node to Internet user) are
pre-installed, there should be a large number of stored keys per
node, which may not be desirable for large scale networks. However,
in our protocol such a large scale key pre-installation is not
needed. Bandwidth utilization is also preserved by restricting two
message transactions for both certificate generation and key
establishment scenarios.
6. IANA Considerations
7. Security Considerations
This document discusses different design aspects of DTLS based secure
key establishment scenarios. This document is entirely focused on
security.
8. Acknowledgements
The authors would like to thank Zach Shelby for his valuable comments
and suggestions.
9. References
Porambage, et al. Expires June 13, 2014 [Page 11]
Internet-Draft DTLS CERTREQ December 2013
9.1. Normative References
[Collisions-SHA1]
Wang, X., Yin, Y., and H. Yu, "Finding Collisions in the
Full SHA-1", in Proceedings of Crypto, 2005.
[I-D.garcia-core-security-05]
Garcia-Morchon, O., Keoh, S., Kumar, S., Hummen, R., and
R. Struik, "Security Considerations in the IP-based
Internet of Things", draft-gracia-core-security-05 (work
in progress), March 2013.
[I-D.keoh-lwig-dtls-iot]
Keoh, S., Kumar, S., and O. Garcia-Morchon, "Securing the
IP-based Internet of Things with DTLS", dtraft-keoh-lwig-
dtls-iot-01 (work in progress), February 2013.
[I-D.mcgrew-tls-aes-ccm-ecc]
McGrew, D., Bailey, D., Campagna, M., and R. Dugal,
"AESCCM ECC Cipher Suites for TLS", draft-mcgrew-tls-aes-
ccm-ecc-06 (work in progress) (work in progress), February
2013.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC
Text on Security Considerations", BCP 72, RFC 3552, July
2003.
[RFC4279] Eronen, P. and H. Tschofenig, "Pre-Shared Key Ciphersuites
for Transport Layer Security (TLS)", RFC 4279, December
2005.
[RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security
(TLS) Protocol Version 1.2", RFC 5246, August 2008.
9.2. Informative References
[I-D.ietf-core-coap]
Shelby, Z., Hartke, K., Bormann, C., and B. Frank,
"Constrained Application Protocol (CoAP)", draft-ietfcore-
coap-12(work in progress) (work in progress), October
2012.
[I-D.ietf-suiteee]
Porambage, et al. Expires June 13, 2014 [Page 12]
Internet-Draft DTLS CERTREQ December 2013
Campagna, M., "A Cryptographic Suite for Embedded Systems
(SuiteE)", draft-campagna-suitee-04 (work in progress),
October 2012.
[NIST-800-108]
National Institute of Standards and Technology, "NIST SP
800-108, Recommendation for Key Derivation Using
Pseudorandom Functions", NIST Special Publication 800-108,
<http://csrc.nist.gov/publications/nistpubs/ 800-108/
sp800-108.pdf>.
[RFC4492] Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., and B.
Moeller, "Elliptic Curve Cryptography (ECC) Cipher Suites
for Transport Layer Security (TLS)", RFC 4492, May 2006.
[RFC6347] Rescorla, E. and N. Modadugu, "Datagram Transport Layer
Security Version 1.2", RFC 6347, Janurary 2012.
[RFC6655] McGrew, D. and D. Bailey, "AES-CCM Cipher Suites for
Transport Layer Security (TLS)", RFC 6655, July 2012.
[SEC4] Standards for Efficient Cryptography Group, "Elliptic
Curve Qu-Vanstone Implicit Certificate Scheme (ECQV),
v0.97", SEC 4, March 2011,
<http://www.secg.org/download/aid-785/sec4-0.97.pdf>.
Authors' Addresses
Pawani Porambage
CWC, University of Oulu
P.O. Box 4500, FI-90014
Oulu
Finland
Phone: +358 8 553 2965
Email: pporamba@ee.oulu.fi
URI: http://www.cwc.oulu.fi
Pradeep Kumar
CWC, University of Oulu
P.O. Box 4500, FI-90014
Oulu
Finland
Phone: +358 8 553 2965
Email: pkumar@ee.oulu.fi
URI: http://www.cwc.oulu.fi
Porambage, et al. Expires June 13, 2014 [Page 13]
Internet-Draft DTLS CERTREQ December 2013
Andrei Gurtov
CWC, University of Oulu
P.O. Box 4500, FI-90014
Oulu
Finland
Phone: +358 40 596 3729
Email: gurtov@ee.oulu.fi
URI: http://www.cwc.oulu.fi
Mika Ylianttila
CWC, University of Oulu
P.O. Box 4500, FI-90014
Oulu
Finland
Phone: +358 40 535 0505
Email: mika.ylianttila@ee.oulu.fi
URI: http://www.cwc.oulu.fi
Erkki Harjula
CWC, University of Oulu
P.O. Box 4500, FI-90014
Oulu
Finland
Phone: +358 40 535 0505
Email: erkkih@ee.oulu.fi
URI: http://www.cwc.oulu.fi
Porambage, et al. Expires June 13, 2014 [Page 14]