Hi,

I have read draft-daniel-6lowpan-security-analysis-02.txt carefully.
IMHO, the assumptions should be improved, and the goal of this document
should be described explicitly at least.  After that, we have to list
up the items to be analyzed.  And, then a few inaccurate descriptions
should be corrected.

I attached details below.

Regards,

Shoichi Sakane

====

o the goal of this draft.

        I haven't understood the goal of this document after I read this
        draft.  It is just analysis of 6lowpan, listing problems,
        or suggesting a base model to solve 6lowpan security problems,
        or proposing solutions for specific problem.
        I felt that any things were included when I read this draft.

        For example, the description of ND in section 7.2 is a solution.
        SEND is needed to the wired network similarly, not unique solution
        for 6lowpan.  Here should be described what problem is and what
        will happen in 6lowpan specific instead of solution.

        In my personal opinion, this document should just describe the
        analysis in perspective of 6lowpan.  It is better to keep it by
        describing problem statement even if it is described more.
        If you want to describe a basic security model or solutions,
        you need to define the security requirement for 6lowpan.
        Defining requirements will raise up issues and problems to be
        defined consequently, otherwise it is not meaning.

        Aside from volume of the analysis description and accuracy, this
        draft should cover whole part where a problem may happen as
        possible.  Currently, Gateway/BBR issue is not included.
        ND issue, there is a description actually, should be into a
        sole section and should be discussed separately.

o the assumptions of this document.

        The assumptions should be located to the former part of the
        document in order to clear the scope of this draft.

        The relationship with the section of the security considerations
        of the other documents should be described explicitly.

        I think that the analysis depends on the assumption.
        For example, the following is related to the result of analysis.
           - availability of the 802.15.4-2003, or the 802.15.4-2006.
           - unmanaged network or well-managed network,
           - the communication range is either within a LoWPAN or
             interconnection with other networks.
           - symmetric cryptography, or ECC, or RSA as the constraint of
             the 6lowpan device.
        The assumption should be described these condition clearly.
        Or, the document should analyze 6lowpan according to each condition.

o Security Threats

        I think that this threat description needs improvement.
        Generic threats of the wireless networks should be removed,
        leaving some examples, and be referred to some appropriate
        documents.  For example, the following paper describes well.

        "Secure Routing in Wireless Sensor Networks: Attacks and
        Countermeasures", C.Karlof and D.Wagner, Sep, 2003.

        There is a summary of this paper at

        http://www.tcs.hut.fi/Studies/T-79.194/papers/hietalahti_050427.pdf

        Here, it is important to describe 6lowpan specific threat.

o 6lowpan security analysis

        I feel that IPsec is inappropriate for 6lowpan after I read
        the section "IP Security analysis".  I never advocate using IPsec.
        But, the description should be accurate and fair.

        Asymmetric cryptography is not used in both ESP and AH themselves.
        So the impact to processing power is not so big.  The impact by SSL
        is similar to IPsec processing after the session key negotiation
        of SSL.

        The essence problem is within the key management protocol (KMP).
        Typical KMP for IPsec is IKE.  It is required to use asymmetric
        cryptography.  But, the impact to processing power is also similar
        to SSL.  When ECC is accepted, the impact is not so problem.
        Furthermore, the impact is mitigated when symmetric cryptography
        based KMPs like KINK or MIKEY-PSK is used. (Total message size of
        KINK is typically bigger than IKE's though.)

        In fact, my team had an experience to implement IPsec with KINK
        into a embedded device which is on H8/3029 though the device did
        not support 6lowpan.

        The most severe issue is to influence into the bandwidth of 6lowpan.
        Total message size of both IKE and SSL is not so different.  Note
        that the number of exchanging messages of SSL is more than IKE.

        This draft recommends to use "cluster based dynamic key management
        scheme".  I think that this topic should be separated into another
        document like key management protocol for 6lowpan.  However, the
        ability to exchange messages between a 6lowpan device and a device
        of the outside of LoWPAN is probably required in some scenario.
_______________________________________________
6lowpan mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6lowpan

Reply via email to