50 likes | 151 Vues
Explore layers of assumptions in current implementation to address authentication issues in wireless technology, including agent, manufacturer, manager, patient, and remote command/control authentication use cases. Learn about digital signature of commands for secure communication.
E N D
11073 Authentication issues Malcolm Clarke September 10, 2012
Assumptions for current implementation • The wireless technology is local • Data has no identification • The local wireless implements security • The protocol changes beyond the gateway so we cannot have end to end security.
Authentication use cases Agent authentication - to ensure correct device (EUI-64 authentication) Agent manufacturer authentication - to prevent device copying (manufacturer authentication) Manager authentication - to ensure connecting to correct manager (EUI-64 authentication) Patient authentication - to ensure identification of a specific patient (this may differ from simple identification) Remote command/control authentication - to prevent invalid commands Digital signature of commands - to determine sender of the command