Internet DRAFT - draft-qi-ipwave-vehicle-security
draft-qi-ipwave-vehicle-security
IPwave Working Group Minpeng Qi
Internet-Draft China Mobile
Intended Status: Informational
Expires: September 10, 2017 March 10, 2017
Security Problem statement for IP Wireless Access in Vehicular Environments
draft-qi-ipwave-vehicle-security-00
Abstract
This document specifies security problem about IP wireless access in
vehicular environment.It also raise requirements for IPwave as
guideline for further security solutions design. At last, using typical
IPsec/TLS solution in IPwave are evaluated.
Status of this Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/1id-abstracts.html
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html
Copyright and License Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
Minpeng Qi Expires September 10, 2017 [Page 1]
Internet-Draft Security Problem Statement for IPwave March 10, 2017
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 3
3 Message Protection Consideration . . . . . . . . . . . . . . . 3
4 Identity Protection Consideration . . . . . . . . . . . . . . . 4
5 Current solution analysis . . . . . . . . . . . . . . . . . . . 4
5.1 IPsec/TLS with Pre-shared key . . . . . . . . . . . . . . . . 4
5.2 IPsec/TLS with certificate . . . . . . . . . . . . . . . . . 5
6 Security Consideration . . . . . . . . . . . . . . . . . . . . 6
7 Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 6
8 References . . . . . . . . . . . . . . . . . . . . . . . . . . 6
8.1 Normative References . . . . . . . . . . . . . . . . . . . . 6
8.2 Informative References . . . . . . . . . . . . . . . . . . . 6
Author's Addresses . . . . . . . . . . . . . . . . . . . . . . . . 7
Minpeng Qi Expires September 10, 2017 [Page 2]
Internet-Draft Security Problem Statement for IPwave March 10, 2017
1 Introduction
Under IPwave scenario, a vehicle node usually connects other nodes by
using an IP address. The other node could be another vehicle, or a
server/infrastructure node with IP address. In this case, communication
data could be eavesdropped, modified or forged by the attacker as same
as attacks happened in other IP connection. Therefore, IPwave
communication must be protected. The protection must consider
confidentiality and integrity for unicast and multicast.
The protection also need to provide authenticity and privacy for
IPwave communication.
2 Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
3 Message Protection Consideration
When a vehicle communicates with another vehicle or RSU. An attacker
can sniff the communication nearby. If there is no confidential
protection. The attacker could get all information. Although vihecles
are usually moving, attacker who want to collect information from
specific vehicle can drive a car and follow the target. If attacker
want to get general information rather than from specific vehicle, he
can sniff nearby an RSU. As a result, information from all vehicles
passing by are leaked. So confidentiality should be considered if
vehicle wants to send information to a specific target through unicast,
or to a specific range targets through multicast.
In another hand, an attacker could send out fake message or modified
message received from other vehicles/RSUs. So integrity should also be
considered.
Minpeng Qi Expires September 10, 2017 [Page 3]
Internet-Draft Security Problem Statement for IPwave March 10, 2017
4 Identity Protection Consideration
Privacy is critical for IPwave. Since vehicles are outside, an attacker
can get vehicle's ID and its physical location. By binding ID and location
together, attacker can get more privacy information about the vehicle. For
example, track of vehicle could be leaked with its movements. What is more,
driver's behavior could be determined. It is a severe violation to the
vehicle privacy.
Binding on ID and location could be made through two ways. One way is
catching vehicle identity based on specific location(s). Here is an
example. Attacker set monitor somewhere, he can bind one vehicle's ID
and location together when there is only such vehicle there. Another way
is catching vehicle location information based on its identity. For
example, an attacker could collect one vehicle's GPS information based
on its IP address to get the track.
As the location is very important to be used for vehicle related service.
It is harder to hide location in communication, esp. for nearfield
sniffing. So the best way to keep privacy is disconnecting the relation
between identity and location. That request identity hidden or updating
frequently.
However, vehicle's id could not be hidden completely. If vehicle could not
be identified by anyone. It can only receive messages but not sending
anything out. Vehicles can't use the anonymous way to communicate with the
peer. Otherwise, the attacker can also use anonymous way to initiate
active attacks, such as sending false messages, etc.
So there is only one way left: changing vehicle's identity frequently.
However, there are several kinds of attributes which could be used to
identify vehicle, such as hardware MAC address, vehicle's IP address,
common name in vehicle's certificates, etc. All these attributes should
be changed, and should be changed syncronized. If not, a new IP address
could be connected to a common name which the certificate is not updated.
Then attacker is able to trace the vehicle through its new IP address.
5 Current solution analysis
There are solutions which could provide data confidentiality and integrity
protection with authentication. They are IPsec[RFC 4301] in IP layer and
TLS[I-D.ietf-tls-tls13] in transport layer. pre-shared key based and
certificate based solutions will be discussed separately.
5.1 IPsec/TLS with Pre-shared key
When a pre-shared key is used in IPsec/TLS tunnel establishment, it
implies that there are agreements between nodes in order to configure
same key before connection. However, in the case of V2I/V2V, at least
one node is vehicular node, which means that it probably has no
agreement with the other peer, and result in no pre-shared key could
be applied.
Minpeng Qi Expires September 10, 2017 [Page 4]
Internet-Draft Security Problem Statement for IPwave March 10, 2017
5.2 IPsec/TLS with certificate
When using certificate in IPsec/TLS establishment, each node who need
to be authenticated should own a certificate. In IPwave, if the node
with certificate is vehicle type, it means that certificate ID could be
used to identify such vehicle.
In order to avoid such privacy leakage, vehicle node should not use one
certificate in a long time.
So if certificates are used in IPsec/TLS establishment, the certificates
should be updated frequently. The update timer should be carefully
designed.
If the time is too long, not only certificate ID but also the private key
would be leaked. The compromised certificate should be revoked. As a
result, revocation solution like OCSP[RFC6960] should be used. If the
vehicle node uses OCSP to verify peer's certificate, it needs to
communicate with CA. This brings additional communication round-trip
and disadvantage for high-speed vehicle connection.
If the time is too short, for example 5 minutes, it also brings problem.
CA should update certificate frequently under such assumption. It is
almost equivalent to keep connection between vehicle node and CA, which
will raise burdens to the node and CA. It can't be implemented.
Furthermore, when vehicle node travels in some areas with no Internet
connection, the vehicle node cannot update its certificate in time,
which leads to the certificate expiration. A possible solution is
letting CA issue certificates with different expiration time to
vehicle node. However, CA needs to issue a large number of certificates
one-time, as well as vehicle node needs to store a large number of
certificates also. For example, if CA needs to issue certificates for
one year and let them expired in every 5 minutes, the number will be
increased more than 100,000. And vehicle node need to store more than
100,000 certificate also. It is not acceptable for real system. Another
problem is, such certificates should be used one-by-one strictly, or it
would lead unavailable usage for a part of certificates. What is more,
although the expiration time between certificates is short, expiration
time of some certificates could be long, like the certificate with
longest validity time is 1 year rather than 5 minutes. It also faces
leakage problem.
In a word, using traditional certificate for IPsec/TLS in IPwave has
some problems. Some mechanism about certificate similar with IEEE
1609.2 should be involved.
Minpeng Qi Expires September 10, 2017 [Page 5]
Internet-Draft Security Problem Statement for IPwave March 10, 2017
6 Security Consideration
This documents are specifies security issues.
7 Acknowledgements
8 References
8.1 Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<http://www.rfc-editor.org/info/rfc2119>.
[RFC4301] Kent, S. and K. Seo, "Security Architecture for the
Internet Protocol", RFC 4301,
DOI 10.17487/RFC4301, December 2005,
<http://www.rfc-editor.org/info/rfc4301>.
[I-D.ietf-tls-tls13] Rescorla, E., "The Transport Layer Security
(TLS) Protocol Version 1.3",
draft-ietf-tls-tls13-19(work in progress),
March, 2017
[RFC6960] Santesson, S., Myers, M., Ankney, R., Malpani, A.,
Galperin, S., and C. Adams, "X.509 Internet Public Key
Infrastructure Online Certificate Status Protocol - OCSP",
RFC 6960, DOI 10.17487/RFC6960, June 2013,
<http://www.rfc-editor.org/info/rfc6960>.
8.2 Informative References
[IEEE1609.2] "1609.2-2016 - IEEE Standard for Wireless Access in
Vehicular Environments--Security Services for
Applications and Management Messages". <https://
standards.ieee.org/findstds/standard/1609.2-2016.html>
Minpeng Qi Expires September 10, 2017 [Page 6]
Internet-Draft Security Problem Statement for IPwave March 10, 2017
Author's Addresses
Minpeng Qi
China Mobile
32 Xuanwumenxi Ave,Xicheng District
Beijing 100053
China
Email: loopypuzzle@hotmail.com
Minpeng Qi Expires September 10, 2017 [Page 7]