skip to main content
10.1145/3384940.3388960acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Verification of Group Key Management of IEEE 802.21 using ProVerif

Published: 07 October 2020 Publication History

Abstract

Home Energy Management Systems (HEMS) contain devices of multiple manufacturers. Also, a large number of groups of devices must be managed according to several clustering situations. Hence, since it is necessary to establish a common secret group key among group members, the group key management scheme of IEEE 802.21 is used. However, no security verification result by formal methods is known. In this paper, we give the first formal verification result of secrecy and authenticity of the group key management scheme of IEEE 802.21 against insider and outsider attacks using ProVerif, which is an automatic verification tool for cryptographic protocols. As a result, we clarify that a spoofing attack by an insider and a reply attack by an outsider are found for the basic scheme, but these attacks can be prevented by using the scheme with the digital signature option.

References

[1]
"IEEE 802.21--2017 - IEEE Standard for Local and metropolitan area networks--Part 21: Media Independent Services Framework," https://standards.ieee.org/standard/802_21--2017.html
[2]
Junji Shikata, Tadahiro Uchikoshi, Masahiro Ebina, Shingo Sato, Yoichi Masuda, Yuji Unagami, Tomoki Takazoe, "Security Proof of a Device Authentication Protocol for HEMS," SCIS 2018 (in Japanese)
[3]
B.Blanchet,B.Smyth,V.Cheval,M.Sylvestre, "ProVerif 2.00.", http://prosecco.gforge.inria.fr/personal/bblanche/proverif
[4]
"Open Specs | ECHONET," https://echonet.jp/spec_v113_lite_en/
[5]
"IEC 62394:2017 - Service diagnostic interface for consumer electronics products and networks - Implementation for ECHONET," https://webstore.iec.ch/publication/32738
[6]
"ISO/IEC 14543--4--3:2015 - Information technology -- Home Electronic Systems (HES) architecture -- Part 4--3: Application layer interface to lower communications layers for network enhanced control devices of HES Class 1," https://www.iso.org/standard/63216.html
[7]
Cas Cremers, Marko Horvat, "Improving the ISO/IEC 11770 standard for key management techniques." Int. J. Inf. Sec. 15(6): 659--673 (2016)
[8]
"ISO/IEC 11770--2:2018 - IT Security techniques -- Key management -- Part 2: Mechanisms using symmetric techniques," https://www.iso.org/standard/73207.html
[9]
"ISO/IEC 11770--3:2015 - Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniques," https://www.iso.org/standard/60237.html
[10]
Cas Cremers, "The Scyther Tool.", https://people.cispa.io/cas.cremers/scyther/
[11]
Benedikt Schmidt, Simon Meier, Cas Cremers, David Basin, "Tamarin Prover.", http://tamarin-prover.github.io/
[12]
Cas Cremers, "Key exchange in IPsec revisited: formal analysis of IKEv1 and IKEv2." ESORICS 2011: 315--334 (2011)
[13]
David Basin and Cas Cremers and Simon Meier, "Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication." Journal of Computer Security 21(6): 817--846 (2013)
[14]
Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe, "A Comprehensive Symbolic Analysis of TLS 1.3." CCS 2017: 1773--1788 (2017)
[15]
Cas Cremers, Martin Dehnel-Wild, "Component-Based Formal Analysis of 5G-AKA:Channel Assumptions and Session Confusion." NDSS 2019 (2019)
[16]
Cas Cremers, Martin Dehnel-Wild, Kevin Milner, "Secure Authentication in the Grid:A formal analysis of DNP3: SAv5." Journal of Computer Security (2018)
[17]
Bruno Blanchet., "CryptoVerif: Cryptographic protocol verifier in the computational model.", https://prosecco.gforge.inria.fr/personal/bblanche/cryptoverif/
[18]
Riccardo Bresciani, Andrew Butterfield, "ProVerif Analysis of the ZRTP Protocol." International Journal for Infonomics (IJI), 3(3), (2010)
[19]
Sepideh Asadi and Hadi Shahriar Shahhoseini, "Formal Security Analysis of Authentication in SNMPv3 Protocol by An Automated Tool." IST 2012, 1060--1064 (2012)
[20]
Kavitha Ammayappan, "Seamless interoperation of LTE-UMTS-GSM requires flawless UMTS and GSM." International Conference on Advanced Computing, Networking and Security 2013: 169--174 (2013)
[21]
Noomene Ben Henda, Karl Norrman, "Formal Analysis of Security Procedures in LTE - A Feasibility Study." Research in Attacks, Intrusions and Defenses 2014: 341--361 (2014)
[22]
Jintian Lu, Jinli Zhang, Jing Li, Zhongyu Wan, Bo Meng, "Automatic Verification of Security of OpenID Connect Protocol with ProVerif." 3PGCIC 2016: 209--220 (2016)
[23]
Danny Dolev and Andrew Chi-Chih Yao, "On the Security of Public Key Protocols." FOCS 1981: 350--357 (1981)
[24]
Dalit Naor, Moni Naor, Jeffery Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers." CRYPTO 2001: 41--62 (2001)
[25]
Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch, "Formally and practically verifying flow properties in industrial systems." Comput. Secur. 86: 453--470 (2019)
[26]
Yoshikazu Hanatani, Naoki Ogura, Yoshihiro Ohba, Lidong Chen, Subir Das, "Secure Multicast Group Management and Key Distribution in IEEE 802.21." SSR 2016: 227--243

Cited By

View all
  • (2021)Verification of Group Key Management of IEEE 802.21 Using ProVerifIEICE Transactions on Information and Systems10.1587/transinf.2020FOP0003E104.D:10(1533-1543)Online publication date: 1-Oct-2021
  • (2021)Formal Verification of 5G EAP-AKA protocol2021 31st International Telecommunication Networks and Applications Conference (ITNAC)10.1109/ITNAC53136.2021.9652163(140-146)Online publication date: 24-Nov-2021

Index Terms

  1. Verification of Group Key Management of IEEE 802.21 using ProVerif

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    APKC '20: Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography
    October 2020
    71 pages
    ISBN:9781450376075
    DOI:10.1145/3384940
    • Program Chairs:
    • Keita Emura,
    • Naoto Yanai
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 October 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. HEMS
    2. IEEE 802.21
    3. ProVerif
    4. group key management

    Qualifiers

    • Research-article

    Funding Sources

    • JSPS KAKENHI

    Conference

    ASIA CCS '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 36 of 103 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)12
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Verification of Group Key Management of IEEE 802.21 Using ProVerifIEICE Transactions on Information and Systems10.1587/transinf.2020FOP0003E104.D:10(1533-1543)Online publication date: 1-Oct-2021
    • (2021)Formal Verification of 5G EAP-AKA protocol2021 31st International Telecommunication Networks and Applications Conference (ITNAC)10.1109/ITNAC53136.2021.9652163(140-146)Online publication date: 24-Nov-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media