Home
AN509 Overview of EnOcean Security Features
Contents
1. In a wireless network some messages can get lost or the receiver is not able to receive it e g is powered off In this case the receiver has to try several RLCs until the CMAC is matched The amount of this tries is also called the rolling code window For more details please refer to the chapter 2 2 2 or the specification 1 In the EnOcean Security specification the following RLC is defined as increment by 1 So RLCs are just a continuous row of number e g 50 51 52 53 54 The receiver has to try all RLCs within the rolling code window e g window size can be 100 RLCs be fore he declares that this message cannot be authenticated So if the receivers actual state was 50 then he tries to do the CMAC validation with 51 if not validated then 52 and so on till he reaches 150 with RLC window is 100 If the message was not validated till then than the transmitter and receiver lost its synchronisation or a potential attacker is intruding the system In Figure 11 you can see the above described algorithm The transmitter uses the RLC X and gets the CMAC X as result then it transmits the telegram The receiver did not receive messages L M W and so he first computes the CMAC with his actual count By using RLC L he gets CMAC L but comparing CMAC X to CMAC L will result as not valid So he tries RLC M N until he gets a match with X
2. cccscccsccescceseceseeeseceneesscesecesecesecsaeecessceeseeeseceseceseceneeeeeaeeeaeeeaeenaees 12 4 SECURITY TASKS i ssisssssccssssesssssscsssssdesscssasdsassessccsssscescssusssscoesoscssosesseisvsucseacsedessbaescessdsesssssacepssseassesessecssnseosses 14 4 1 TASKS IN TRANSMITTER nna tines E a E N es E bende eees 14 4 2 TASKS IN RECEIVER me A E Savane E E N EE N N es 14 4 3 USRORAES 128 iseccictsescivcouts a E E E E E E S 14 4 3 1 Content authentication CMAC with AES 128 cccccccccccccccccccccccccecccecccesecesseesseeeseessseessesseesseeeeenesenseaaes 15 4 3 2 Content protection with AES 128 cccsssccssssessssessceessessscessonecsocsenonecsocessonessonsesasessaceneasessonseronestonesenes 18 5 SECURITY AS LAYER IN ENOCEAN PROTOCOL STACK ccsscccsscsessccessccesscsessccessccessccesscsensceess 20 5 1 USAGE OF EEP PROFILES AND GP ccccccccesscccessseeccessceccessseecccssseeccsauececssaeesecsseeceesseeceeesssecessseseessnesecsaas 21 Dede PECGCH 1 PIOCCSS EE A A cnc 5s E A aaa E E EO EES AE 21 SLD Data COMMUNICATION eroen eee EE EEE E A E A A e E E a E 21 5 2 USAGE OF SMART ACKNOWLEDGE AND REMOTE MANAGEMENT cc scccccecessssssceecceceesssssseececcesessnseeeeeees 22 5 3 BIDIRECTIONAL COMMUNICATION WITH SECURITY FEATURES cssssssseccceeesssssceececcessssssseeceeceesestseeeeeees 22 Gi WHAT NEXT nannies NENESE EPO EES E EAEC ESENES SESEO ESEESE NENESE 23 APPLICATION NOTE 509 Green Sm
3. Encrypt the information Security systems Figure 1 Eavesdropping scenario APPLICATION NOTE 509 Green Smart Wireless enocean Examples for sensitive data here include status information from occupancy sensors ac tions of access control devices or devices showing the state of a building vacation mode It is important to protect both information about the content of a message and the type of the message itself Taking the example of a data telegram originating from a occupancy sensor it is not suffi cient to merely protect the information about the command itself occupied unoccupied but also the information that this command originated from a occupancy sensor Otherwise an attacker could determine if a home is occupied or not based on the presence or absence of commands originating from occupancy sensors Content protection is achieved by means of encrypting the original plain text data with a key thus transforming it into encrypted unreadable data Only when the correct key is known it is possible to transform decrypt the encrypted data into readable data again Figure 2 below shows the concept of secure data transmission from a high level perspec tive W unencrypted Data Encryption Encrypted Data Encrypted Data Decryption unencrypted Data Plain Text JR op yp Plain Text Figure 2 Secure data transmission 2 2 Content authentication and dynamic key modific
4. e g SLF KEY and RLC and then perform decoding operation m Update and maintain the RLC of every known security device After a reception and successful decoding the RLC must be updated and then stored in non volatile mem ory m Look out for possible ongoing attacks The receiver can gather indices that a possi ble intruder is trying to gain control Important to note here is that a receiver should not process unprotected messages from a transmitter once it transmitted its security teach in In this case it is to be assumed that an attacker has tried to gain control of the system 43 Use of AES 128 The AES 128 algorithm is used in EnOcean network by these security features Content authentication CMAC Content protection encryption VAES Content protection encryption AES CBC The AES 128 algorithm 1 is a symmetrical algorithm It uses the same key for encryption and decryption By one encryption or decryption cycle it can process a 16 byte chunk not more or less If you concerned about the strentgh of the algorithm please see reference 2 See simple graphical interpretation of AES function in Figure 8 APPLICATION NOTE 509 Green Smart Wireless enocean Figure 8 AES functions For the understanding of the EnOcean Security we do not need to get deeper understanding of the algorithm it self It will enough to refer to it as algorithm with encryption and de scription functions 4 3 1 Content au
5. ture This type of attack is often called Replay Attack since it works by reusing replaying previously used data telegrams An example scenario is listed in figure below APPLICATION NOTE 509 Green Smart Wireless enocean ae Switch sends Telegram is intercepted Building is controlled telegram and replayed by attacker Figure 4 Replay Attack scenario In order to prevent this type of attack either the data or the key must continuously change to ensure that identical input data does not create identical encrypted radio telegrams The mechanism used by the transmitter to change data or key must be known to the re ceiver in order to correctly decrypt and authenticate received data telegrams One common approach is to use the secret key together with an incrementing counter e g rolling code to generate a dynamic key For this scheme it is important that the counter on the transmitter and on the receiver side remain synchronized i e will always have the same values Both counters will therefore have to start based on the same value and both have to be incremented whenever a data telegram is exchanged In order to guard against the case of telegrams being lost not correctly received the re ceiver needs to check if the received telegram has been decrypted correctly based on the counter value being used This check can be done for instance via the message signature MAC or by other message integrity checks e g based
6. 15 Byte Advanced Smart Metering Y Y Y Data length 16 Byte Legend CMAC Cipher Message Authentification R ORG EnOcean Telegram DEJEASJ Transmitter Identifier Code incl Rolling Code ORES R ORG Security Telegram Statusbyte Checksum Ened Field is encrypted AES 128 ORGCH R ORG Chained Telegram Telegram Payload Table 1 Typical security use cases Please note that Sender Identification as shown in Table 1 is still present also when no ad vanced security measures are added Sender Identification trough unique Sender ID is pre sent in EnOcean Radio networks from the very beginning This protection ensures that an EnOcean based device can transmit telegrams only with its in production given chip ID The receiver can rely on it since EnOcean enforced it within its products With standardizing the EnOcean Radio protocol as ISO IEC 14543 3 10 protocol this features is not longer suffi cient as security measure since other radio manufactures than EnOcean can produce mod ules devices APPLICATION NOTE 509 Green Smart Wireless enocean 3 IMPLEMENTATION OF SECURITY FEATURES IN ENOCEAN NETWORKS In chapter 2 we summarized the security features which were introduced to EnOcean Radio networks Please see EnOcean Security Specification for Radio networks 1 for detailed explanation on how the security features are realized within the telegram structure In this chapter we will focus on the features realisa
7. Frequency Shift Keying Gateway Module with a bidirectional serial communication connected to a HOST GP Generic Profiles ID Unique module identification number KEY Specific parameter used to encrypt decrypt transform DATA MAC Message Authentication Code MSB Most Significant Byte PSK Pre shared Key PTM Pushbutton Transmitter Module RLC Rolling Code R ORG Message parameter identifying the message type SLF Security Level Format specifying which security parameters are used TXID ID of a transmitter VAES Variable AES 1 2 References 1 Security of EnOcean radio networks System Specification http www enocean com en security specification 2 http www kotfu net 2011 08 what does it take to hack aes 3 EEP Specification http www enocean alliance or 4 GP Specification http www enocean alliance org 5 EnOcean Radio Protocol 1 http www enocean com fileadmin redaktion pdf tec_docs EnOceanRadioProtocol pdf 6 Smart Acknowledge http www enocean com fileadmin redaktion pdf tec_docs SmartAcknowledgement pdf 7 Remote Management http www enocean com fileadmin redaktion pdf tec_docs RemoteManagement pdf 1 3 Revision History No MEIRE NEES 1 0 First version EnOcean www enocean com Marian H nsch September 2013 Page 4 23 APPLICATION NOTE 509 Green Smart Wireless enocean 2 FUNDAMENTALS OF WIRELESS NETWORK SECURITY OVERVI
8. Then he updates his actual RLC state to X APPLICATION NOTE 509 Green Smart Wireless enocean RLC X RLC L M X CMAC X p CMAC L M X Figure 11 CMAC Task with use of rolling code window 4 3 2 Content protection with AES 128 To enable encryption of variable length of data or to optimize the encryption for an ongoing data stream many use cases of the AES 128 algorithm were developed For the needs of self powered radio devices the Security specification for EnOcean radio networks 1 uses these m AES CBC AES Cipher block chaining Allows the chaining of byte streams Minimum plaintext length is 16 bytes This al gorithm is used for application with huge data rates which is not common in EnO cean networks m VEAS Variable AES Allows encryption of variable length of data 1 b This is mostly used by energy autarkic applications In the next text we will focus more at this process The VAES tasks for encoding transmitter and decoding receiver are shown in figure They look very similar For detailed explanation please refer to specification 1 There you can find also explanation on how to transmit larger amount more than 16 bytes of data with VAES e g 18 bytes The essential difference between encoding and decoding is the last XOR operation The XOR operation is used to add DATA t
9. on Cyclic Redundancy Codes or CRC in short or more simply via Parity Bits If a message is detected as non valid based on the current counter value the receiver can retry using the next counter value and so on This results in following defi nition m We define that dynamic key modification must be used also with message authenti cation Practically it means that whenever the rolling code is used the MAC muss be used too Typically a maximum number of future counter values to be tried will be defined This pa rameter is often referred to as the Rolling Code Window Size If message decryption based on a future counter value is successful then the counter will be set to this value thereby re synchronizing the transmitter and receiver counters Figure 5 below shows this mechanism APPLICATION NOTE 509 Green Smart Wireless enocean Secret Key e sere Key CDR Data Valid Dynamic Key Dynamic Key Oa Unenerypted Data Encryption Encrypted Data Encrypted Data Decryption gpencvptegipata Plain Text YP rye ryp Plain Text Figure 5 Secure transmission based on dynamic keys 2 3 Typical use cases In the previous chapters we have outlined the fundamental techniques of message encryp tion message authentication with dynamic key modification Message authentication can be used without dynamic key change but as pointed out earli er this bears risk of
10. APPLICATION NOTE 509 Green Smart Wireless enocealy APPLICATION NOTE 509 Green Smart Wireless enocean Table of contents 1s INTRODUCTION sissscsccscssetsabasesciscsncccisvaxcsttvcascvcalustercicnscercenueveadeuncveussdesvevcescssceseeusssacsvcsusvesbestevcveeaneceseuavesdeveays 3 1 1 IRIE SIDAD HLEIER TE EE E EES 3 1 2 VAEA INEI DINEI o a EESE EA E E EAE E TE EE ERE TE esses cates EET 4 1 3 REVISION HISTORY css000 cssessseauevesseespudsouaiee0edeeeb090305004vecsiesoosvee Erien E Erea Ianire ASEE EErEE Ern RENE EE EENS 4 2 FUNDAMENTALS OF WIRELESS NETWORK SECURITY OVERVIEW cssscccssssscessssccesssceceses 5 2 1 CONTENT PROTECTION ADDRESSING EAVESDROPPING csssscceessseecessseecesssceccessseecessseecesssseecestseeeessseeeenss 5 2 2 CONTENT AUTHENTICATION AND DYNAMIC KEY MODIFICATION ADDRESSING REPLAY ATTACKS 000005 6 22d Conen a he O cen cee tein sos oss s ae See oa goa sa eee an coast eee bathe ns 6 2 2 2 Dynamic key Modification s eicsisweisvies wich ii anive ete E Ae eRe A Wa aA ie Bites 7 2 3 MEY PIGAT SUSE CASES oeiee ea e dopaanedduetedduduswaneweluiogdgeyl oa auadesdiweabeeastad E 9 3 REALISATION OF SECURITY FEATURES IN ENOCEAN NETWORKS 0 ccsscccsssscccsssseccesssecees 11 3 1 USED ALGORITHMG ccsccccscssssssccsseccssssssscssccsssosssssscesecessesssnscssecccsssesnscenscecsvessnscaeseecessessscaneceesceesssceessecsrss 11 3 1 1 Dependencies between algorithms
11. Dependencies between algorithms The RLC can be carried within the encrypted message or not This means it can be explic itly part of the radio telegram and directly used in the validation algorithm or be implicit and thus not part of the radio telegram Exact meaning of these two approaches will be explained in chapter The security features implementations complement to each other and some prerequisite the usage of another This is valid for RLC and CMAC usage Please see a Summary of the used algorithms and their dependencies in Figure 7 uses uses Explicit Implicit bs 4 uses uses Explicit Implicit b l uses e e e a Fe oun USES uses L NO DATA cretion a a Figure 7 Security Algorithm overview APPLICATION NOTE 509 Green Smart Wireless enocean Resulting from the implementation following dependencies are defined m When using VAES then RLC explicit implicit must be used m When using CMAC then RLC explicit implicit must be used Resulting from Chapter 2 2 2 definition also this dependency is defined m When using RLC implicit then CMAC must be used Content authentication CMAC usage can be used also without data encryption But since CMAC uses AES 128 there is only a very little step to exploit the AES 128 also for data en cryption too Therefore we recommend using data encryption also when there is n
12. EW As soon as wireless components control and monitor important aspects of our lives securi ty often becomes a major concern Unlike with traditional wired networks information now flows freely over the air and is not anymore restricted to the confines of the home This raises two significant concerns Unauthorized interception reception and correct interpretation of transmitted data Eavesdropping m Unauthorized transmission of correct control commands including Replay At tacks Somewhat loosely speaking the goal of security has to prevent an unauthorized person often referred to as an Attacker both from learning about the current state of a system and from actively changing it These two attacking scenarios and the countermeasures E content protection E content authentication dynamic content modification are addressed by the existing Security specification 1 In the next chapters we will de scribe the character of these attacking scenarios in detail and the correct countermeasure 2 1 Content protection addressing Eavesdropping The goal of content protection is to prevent unauthorized receivers from correctly interpret ing the content of a message In the context of home automation this is for instance im portant for data allowing an unauthorized person to determine if somebody is at home or not Simple scenario is shown in Figure 1 Home amp building automation Countermeasure
13. LC is obtained If the CMAC was not validated in the defined rolling code window then the VEAS cannot decrypt data This process is visualized in Figure 13 RLC hy MX ang BSCR J EE CMAC L M X Figure 13 CMAC and VEAS tasks together DATA APPLICATION NOTE 509 Green Smart Wireless enocean 5 SECURITY AS A LAYER IN ENOCEAN PROTOCOL STACK Security perfectly fits as a layer into the EnOcean Protocol stack Please see the protocol stack visualisation in Figure 14 Security only affects the payload of a telegram Therefore it does not affect any of the other layers The security features defined do not take the con text of the payload into consideration e g it does not matter what the payload repre sents Therefore security can be universally used with any other protocol D enocean lt alliance No Wires No Batterie ies No Limits EnOcean Equipment Profiles EEP Network 5 Data Link EnOcean Serial Protocol 3 Physical 5 ISO IEC 14543 3 10 RS232 D UART Figure 14 EnOcean protocol stack If designing a new application or redesigning an existing application adding security fea tures will not affect the application layer architecture or logic The EnOcean protocols above Security are m EEP GP E Remote Management Smart Acknowledge Their output is a radio message The message consists of more parts
14. art Wireless enocean EXPLANATION OF ENOCEAN SECURITY IN APPLICATIONS 1 INTRODUCTION Modern technology has transformed all areas of our daily life our way of working travelling and communicating Technology increasingly also enters the area of home automation bringing greater convenience whilst saving costs Examples of such technologies include E Lighting control Heating control Automatic door openers garage doors etc Temperature sensors Illumination sensors Door window contacts Occupancy sensors In combining these diverse technologies we can for instance control room lighting depend ing on occupancy and ambient light or regulate the entire heating system depending on the outside temperature time of the day and weather forecast It is this intelligent combination of different inputs sensors and outputs actuators by means of a smart central unit gateway that transforms our homes into smart homes Us ing wireless communication between the different devices allows an easy upgrade of exist ing homes without requiring intrusive wiring work This approach however raises valid security concerns since unlike with wired control sys tems information and control commands now flow freely over the air and are subject to external monitoring and potentially even malicious external commands Strong security mechanisms are therefore required to mitigate these threats in sensitive applications The EnOcean product portf
15. aspect will stay unchanged This enables a flexible design or redesign of application EnOcean www enocean com Marian H nsch September 2013 Page 21 23 APPLICATION NOTE 509 Green Smart Wireless enocean 5 2 Usage of Smart Acknowledge and Remote Management To use security features with Smart Acknowledge 6 and Remote Management 7 first a bidirectional secure link must be established Essentially this means that a bidirectional security teach in must be performed Please see details on bidirectional security communi cation in the specification 1 Then all transmitted data communication must be protected by the defined security features Reclaim messages and Signal messages in Smart Acknowledge have a special meaning and can be used also non encrypted There are also some other constrains in Smart Acknowledge due to security features which are out of the focus of this application note If you are interested in a Smart Acknowledge application with security please contact us for details support enocean com Remote Management communication is also protected by an remote management security key Considering this fact the remote management communication can be also used with out security features in a secure application This decision is up to the application develop er 5 3 Bidirectional communication with security features Prior to a bidirectional communication a bidirectional security teach in must be perf
16. ation addressing Replay at tacks 2 2 1 Content authentication The goal of content authentication is to prevent unauthorized transmitters to transmit ap parently valid commands causing the receiver to perform unauthorized actions Content authentication works by creating a message signature often referred to as Mes sage Authentication Code or MAC in short based on the content of the telegram and the secret key Essentially the telegram data is transformed via a defined algorithm using the secret key into a unique fixed size signature The signature is unique for every message and therefore can be used for content authentication Conceptually the correspondence between message and signature is similar to the one be tween a person and a finger print m Each person has a unique fingerprint m Based on a given person one can easily determine his or her fingerprint m Based on a given fingerprint one can easily check if it originated from a given person E Based on the fingerprint one cannot determine any other properties of the person height gender hair colour eye colour etc So both message signature and fingerprint uniquely identify their owners without revealing any additional properties For an ideal signature algorithm the likelihood of two different messages creating the same message signature would be inversely proportional to the signature size so for instance for 24 Bit signatures the likelihood would be one in 16 milli
17. before because security features are not aware of the pro cessed content The only exceptions are profiles which use the telegram status field of EnOcean Radio Protocol 1 5 RPS F6 Profiles The status field is not part of the tele gram payload and is not protected by the security features Therefore these profiles are redefined in the VLD Family D2 03 XX 3 5 1 1 Teach in process with profiles The teach in telegram content of the teach in telegram is not changed But it is important to note that in applications using security first the security teach in must be performed and then the profile teach in This means E first the security link is established by security teach in and m then the profile teach in information is already transmitted protected by the security features e g the EEP profile number and manufacturer ID is encrypted The applications using RPS Profiles EEP F6 xx xx are again here an exception These profiles did not have a profile teach in due to the operative characteristics Now with secu rity they require to develop a security teach in capability Therefore also the security teach in header was adjusted Please see the specification for details 1 5 1 2 Data Communication As stated before data communication of devices is not affected by security features The payload gets protected by the security features at the transmitter and then processed at the receiver The payload from application layer
18. but for security only the header RORG and payload are important The security layer adds the security feature to the message and forwards it to the lower layers for transmission per radio or wire The security features can however extend the length of the bytes needed to transmit e g adding CMAC which is 3 or 4 bytes additional content to transmit If the message length extends the capacities of one telegram then the message is divided into several telegrams The telegrams are then merged together to a message again at the receiver For details on changing please refer to the security specification 1 To underline the universal use of security with any above layer please refer to Figure 15 There you can see simple visualisation of the above description The output message of the above layers is being process with security and transmitted to the air APPLICATION NOTE 509 Green Smart Wireless enocean EXPLANATION OF ENOCEAN SECURITY IN APPLICATIONS Security ees Telegram 1 pii Telegram N Messaging EnOcean Radio Protocol 1 or 2 Radio Signal Air Figure 15 Security with underlying layers This chapter describes how to use security with the above layers in detail 5 1 Usage of EEP Profiles and GP With the existing Generic Profiles GP 4 and EnOcean Equipment Profiles EEP 3 specification there is no change in the application because of using security features The defined profiles can be used as
19. e included payload in the figure green data in the telegrams m the RLC in the figure red The CMAC is part of the transmitted telegram It consumes additional payload in the tele gram 3 or 4 bytes but offers strong protection against replay attacks The mechanism is simple 1 The transmitter creates the CMAC based on the PAYLOAD and RLC 2 Transmitter sends the telegram with CMAC to the receiver 3 Receiver counts based on the PAYLOAD and actual RLC the CMAC too 4 If the transmitted CMAC and counted CMAC are matching then the message is vali dated As stated before a dynamic key RLC is an essential part of the CMAC process It ensures that even if the payload is same the CMAC of any two telegrams in the telegram stream will be different If no RLC would be present then the CMAC would be same and thus the re play attack protection would be non effective By using the RLC the CMAC and payload combination is always changing The CMAC is 24 or 32 bit long In the telegram stream the actual CMAC value can repeat itself but the pay load and CMAC combination is always unique and so ensures effective replay attack protec tion during the whole application live This CMAC task with changing RLC on a transmitter is shown in Figure 10 APPLICATION NOTE 509 Green Smart Wireless enocean RLC 1 Transmitter RLC 2 O O E a PAYLOAD A evant l l cmac emac CMAC X CMAC Z Figure 10 CMAC Task with RLC
20. ld not be misunderstood as specified operating characteristics No liability is assumed for errors and or omissions We reserve the right to make changes without prior notice For the latest documentation visit the EnOcean website at www enocean com
21. o imme diate use case for it The defined security features as shown in Figure 6 are visualised and explained on exam ples of receiver and transmitter tasks in the following chapters APPLICATION NOTE 509 Green Smart Wireless enocean 4 SECURITY TASKS 4 1 Tasks in Transmitter The tasks of a transmitter are as follows Define how and what security features are used e g what kind of encryption This practically means to define the Security Level Format SLF 1 Inform the receiver about the SLF used security KEY and initial RLC This practically means transmitting a security teach in message 1 m Send the data communication with the defined security features m Store and update the RLC It is important to note that once a transmitter uses security features in communications it cannot fallback to unprotected communication By doing this the transmitter would open the back door for an intruder because the receiver cannot authenticate the origin of the unprotected communication 4 2 Tasks in Receiver The security tasks of a receiver are as follows m Teach in security device and store their information Practically it means to receive the teach in message and parse the included information This information must be stored in non volatile memory because the teach in is not being repeated m On reception of encrypted data telegrams decode them Practically it means to recall the device security information
22. o the ENC and then to retrieve the information back This is valid DATA XOR ENC DATA_ENC and ENC XOR DATA_ENC DATA With this process it is then possible to encode variable length of data The length of the ciphertext is equal the length of the plaintext The ENC is the result of an AES 128 operation The Transmitter and Receiver have to use the same ENC to encode and decode the data If we use same ENC in every following oper ation an intruder can easy guess the ENC if he is also aware of the context of the transmit ted data So we have to apply same principle of dynamic key modification The change of RLC ensures that ENC is different for every following operation APPLICATION NOTE 509 Green Smart Wireless enocean PUBLIC KEY PUBLIC KEY PRIVATE KEY PRIVATE KEY DATA Figure 12 VAES tasks By using the RLC we must consider that the receiver and transmitter can have different RLC status for example due to telegram loss This is a similar situation as with CMAC comput ing see chapter 4 3 1 The receiver must use for ENC calculation the same RLC as the transmitter did otherwise the decrypted data would not correspond to the original data The right RLC is obtained through CMAC validation because CMAC and VEAS use the same RLC for one telegram encoding First the CMAC is validated Within this operation the right R
23. olio uniquely meets the challenges of modern smart homes by providing an extensive portfolio of wireless products offering strong security and 100 maintenance free operation The following chapters will outline general security tasks in applications It will provide an overlook on how security is applied in a bidirectional application and help the viewer to bet ter understand how security is realized in EnOcean Radio networks This document provides additional information to the existing Security Specification of EnOcean radio networks For detailed specification please refer to the Specification docu ment 1 1 1 Definitions Term Abbr uC Microcontroller external AES Advanced Encryption Standard API Application Programming Interface APP Application ASK Amplitude Shift Keying CBC Cipher Block Chaining CMAC Cipher Based Message Authentication Code CRC Cyclic Redundancy Codes DATA Payload of a radio telegram EnOcean www enocean com Marian H nsch September 2013 Page 3 23 APPLICATION NOTE 509 Green Smart Wireless enocean EXPLANATION OF ENOCEAN SECURITY IN APPLICATIONS Device Customer end device with an integrated EnOcean radio module EEP EnOcean Equipment Profile EHW Energy Harvested Wireless protocol ERP EnOcean Radio Protocol ERP1 Version 1 ERP2 Version 2 ESP3 EnOcean Serial Protocol V3 FSK
24. on APPLICATION NOTE 509 Green Smart Wireless enocean For message authentication purposes the message signature MAC is typically appended to the message itself and transmitted together with it When the receiver receives such a message it will itself calculate the MAC with the defined algorithm based on the secret key and the content of the received message The receiver then compares the MAC it calculated with the MAC it received as part of the message If both MAC are the same then the receiver can establish two important facts m The message originates from an owner of the secret key m The content of the message has not been modified Figure 3 below illustrates the content authorization via a MAC signature Secret Key Secret Key Signature Signature loput Data Calculation Calculation Compare ORO CG e e Figure 3 MAC signature based message authentication 2 2 2 Dynamic key modification One fundamental problem with both content protection and content authentication is that using the same input data plain text with the same key always yields the same encrypted data and same signature This enables attacks based on monitoring previous system behaviour If an attacker has observed that a certain data telegram results in a certain light being turned on then he could use this information to identify or even actively send similar telegrams in the fu
25. ormed Details can be found in the security specification 1 But in a bidirectional communication between devices A and B the way from A to B shall be protected by different KEY and RLC counter than the way from B to A This means m Device A sends in security teach in its KEY A and RLC A to device B Device B stores this information and sends to device A in a security teach in KEY B and RLC B The data communication will follow these rules m Device A uses for security features KEY A and RLC A m When device B receives a message from device A it updates the RLC A to its actual state m Device B uses for security features KEY B and RLC B m When device A receives a message from device B it updates the RLC B to its actual state APPLICATION NOTE 509 Green Smart Wireless enocean 6 WHAT NEXT If you like the security features of the EnOcean radio networks and are interested in devel oping an secure application there several steps how to continue m See Application Note for receivers See Application Note for transmitters See specification of Security in EnOcean radio networks See EnOcean Link User Manual for security implementation See Dolphin API User Manual for security implementation See Dolphin V4 API User Manual for security implementation m See ready Security Products Modules Disclaimer The information provided in this document describes typical features of the EnOcean radio system and shou
26. replay attacks Different use cases will require different combinations of these or other techniques to be employed For instance In many systems there is information that is not security critical For instance the transmission of the outside temperature as measured by a temperature sensor will usually not need to be secured authenticated or prevented from being reused E Information allowing determining critical parameters e g the thermostat state could be encrypted to prevent it from being correctly interpreted by unauthorized persons but does not necessarily need to be authenticated or protected from being sent again E Commands causing actions such as a door being opened need to be both authenti cated to ensure that they originate from an authorized source and prevented against reuse replay E Finally very sensitive information such as metering information used for billing purposes needs to be both encrypted authenticated and being prevented against reuse Many other use cases are possible as well Table 2 below summarizes these examples and their security requirements APPLICATION NOTE 509 Green Smart Wireless enocean Typical Use Cases Sender Eaves Replay Telegram Structure Identification Dropping Attack Unique Data CMAC incl Sender ID Encryption Rolling Code Standard Wall Switch al R or Sensor Y Automated See Locker Control Wall Switch Simple Car Fob Y v Y Data length 1
27. thentication CMAC with AES 128 In this chapter we will focus on the content authentication and use of RLC for this purpose As stated in chapter 2 2 content authentication creates a unique signature CMAC for eve ry message which allows the receiver to authenticate the incoming message at its trans mitter A possible attacker does not have the capabilities to create this signature CMAC and so the communication is protected against replay attacks Also as explained before in chapter 2 2 2 and defined in chapter 3 1 1 with content au thentication dynamic key modification must LAO be used Or in a more practical meaning when using CMAC then RLC explicit implicit must be used Applications which have a very large sensor value space e g 24 bit sensor values and have a low repeating ratio of measured values does not require this But this is not a typical use case for energy harvest ing sensors or the use case of residential building automatization Therefore we will focus only on the use of CMAC and RLC together The algorithm of CMAC counting is shown in Figure 9 For a more detailed explanation please refer to the specification 1 APPLICATION NOTE 509 Green Smart Wireless enocean RORG S Padding Bytes xoR Subkey derived from Private key PRIVATE key 3 4b 13 12b Figure 9 CMAC Algorithm CMAC is a unique signature for a message in the telegram stream it includes E th
28. tion from a more abstract standing point giving the reader a more detailed explanation In chapter 2 we defined three new advanced security features Please see this summary on the implementation in EnOcean Radio network 1 Feature content protection implemented with data encryption 2 Feature content authentication implemented with CMAC cipher based message authentication 3 Feature dynamic content modification implemented with RLC rolling code 3 1 Used algorithms Encryption of data can be realized in many different ways considering the benefits and giv en conditions In an EnOcean network consisting also from autarkic devices we use for encryption these algorithms m VAES encryption of variable length of plain text data e g 1 b 2 b 3 b 4b m AES CBC encryption of 16 bytes chunks of plain text data e g 16 b 32 b The CMAC algorithm and both data encryption algorithms VAES AES CBC exploit the standardized AES 128 algorithm 1 please see chapter 4 3 In total we are focusing on these security features implementations Data Encrypt 1 b Figure 6 Security features implementation APPLICATION NOTE 509 Green Smart Wireless enocean What combination of the security features is used is defined by the Security Level Format SLF 1 Not every combination is allowed Here is a more detailed explanation of every feature with focus on meaningful combinations 3 1 1
Download Pdf Manuals
Related Search
Related Contents
V7 Replacement Battery for selected Lenovo-IBM Notebooks VF64SDS 取扱説明書 R-NET (PG DT) Aores - Argane manual user Copyright © All rights reserved.
Failed to retrieve file