<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" []>
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<?rfc strict="yes" ?>
<?rfc toc="yes"?>
<?rfc tocdepth="4"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes" ?>
<?rfc compact="yes" ?>
<?rfc subcompact="no" ?>

<rfc category="info"
     docName="draft-haerri-ipv6-over-80211ocb-00.txt"
     ipr="trust200902">

  <!-- category values: std, bcp, info, exp, and historic ipr values:
       trust200902, noModificationTrust200902,
       noDerivativesTrust200902, or pre5378Trust200902 you can add the
       attributes updates="NNNN" and obsoletes="NNNN" they will
       automatically be output with "(if approved)" -->

  <front>

    <title abbrev="IPv6-over-80211OCB">
      Transmission of IPv6 Packets over IEEE 802.11-OCB Networks
    </title>

	<author initials="J." surname="Härri" fullname="Jérôme Härri">
      <organization>EURECOM</organization>
      <address>
	<postal>
	  <street>
	  </street>
	  <city> Sophia-Antipolis
	  </city>
	  <region>
	  </region>
	   <code> 06904
	  </code>
	  <country>
	    France
	  </country>
	</postal>
	<phone>
	+33493008134
	</phone>
	<email>
	  Jerome.Haerri@eurecom.fr
	</email>
      </address>
    </author>

   <author initials='A.' surname="Petrescu" fullname='Alexandre Petrescu'>
      <organization>CEA, LIST</organization>
      <address>
	<postal>
	  <street>
	    Communicating Systems Laboratory
	  </street>
	  <city>
	    Gif-sur-Yvette
	  </city>
	  <region>
	    Ile-de-France
	  </region>
	  <code>
	    91190
	  </code>
	  <country>
	    France
	  </country>
	</postal>
	<phone>
	  +33169089223
	</phone>
	<email>
	  Alexandre.Petrescu@cea.fr
	</email>
      </address>
    </author>
	
    <author fullname="Christian Huitema" initials="C." surname="Huitema">
      <organization>Microsoft</organization>
      <address>
        <postal>
          <street> </street>
          <city>Redmond</city>
          <code>98052</code>
          <region>WA</region>
          <country>U.S.A.</country>
        </postal>
        <email>huitema@microsoft.com</email>
      </address>
    </author>

    <date/>

    <!-- Meta-data Declarations -->

    <area>Internet</area>

    <workgroup>Network Working Group</workgroup>

    <!-- WG name at the upperleft corner of the doc, IETF is fine for
         individual submissions.  If this element is not present, the
         default is "Network Working Group", which is used by the RFC
         Editor as a nod to the history of the IETF. -->

    <keyword>
      IPv6 over 802.11 OCB
    </keyword>

    <!-- Keywords will be incorporated into HTML output files in a
         meta tag but they have no effect on text or nroff output. If
         you submit your draft to the RFC Editor, the keywords will be
         used for the search engine. -->

    <abstract>
      <t>
	 This document describes the mechanisms required by IPv6 to be transmitted on IEEE 802.11 OCB networks.
      </t>
    </abstract>
  </front>

  <middle>
    <section title="Introduction">
      <t>
	This document describes the transmission of IPv6 packets on
	IEEE 802.11 OCB networks.  
      </t>
    </section>
    
    <section title="Terminology">
      <t>
	The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
        document are to be interpreted as described in
	<xref target="RFC2119">RFC 2119</xref>.
      </t>
      <t>
	OCB - Outside the Context of a Basic-Service Set ID (BSSID).
      </t>
      <t>
	802.11-OCB - IEEE 802.11-2012 <xref target="ieee802.11-2012" /> text flagged by
	"dot11OCBActivated".  This means: IEEE 802.11e for quality of
	service; and 802.11p <xref target="ieee802.11p-2010" />
	for operation in the 5.9 GHz band and in mode OCB.
      </t>
    </section>

    <section title="Design Considerations" >
      <t>
	The networks defined by 802.11-OCB are in many ways similar to
	other networks of the 802.11 family. In theory, the
	encapsulation of IPv6 over 802.11-OCB could be very similar to
	the operation of IPv6 over other networks of the 802.11
	family.  However, the high mobility, strong link asymetry and very short connection makes the 802.11-OCB link significantly different from that of other 802.11 networks. Also, the automotive applications have specific
	requirements for reliability, security and privacy, which further add to the particularity of the 802.11-OCB link.
      </t>
	  <t>
	  This section does not address safety-related applications, which are done on non-IP communications. However, this section will consider the transmission of such non IP communication in the design specification of IPv6 over IEEE 802.11-OCB.
	  </t>

	  <section title="Vehicle ID" anchor="VID" >
	<t>
	  Automotive networks require the unique representation of  each of their node. Accordingly, a vehicle must be identified by at least one unique ID. The current specification at ETSI and at IEEE 1609 identifies a vehicle by its MAC address uniquely obtained from the 802.11-OCB NIC.
	</t>
	<t>
	  A MAC address uniquely obtained from a IEEE 802.11-OCB NIC implicitely generates multiple vehicle IDs in case of multiple 802.11-OCB NICs. A mechanims to uniquely identify a vehicle irrespectivey to the different NICs and/or technologies is required.
	</t>
      </section>
	  
	  <section title="Non IP Communications">
	<t>
	  In IEEE 1609 and ETSI ITS, safety-related communications CANNOT be used with IP datagrams.  For example, Basic Safety Message (BSM, an IEEE 1609 datagram) and Cooperative
	  Awareness Message (CAM, an ETSI ITS-G5 datagram), are each transmitted as payload of 802.11 messages, without an IP header.
	</t>
	<t>
	  Each vehicle taking part of traffic (i.e. having its engine turned on and being located on a road) MUST use Non IP communication to periodically broadcast its status information (ID, GPS position, speed,..) in its immediate neighborhood. 
	  According to this mechanisms, vehicles become 'aware' of the presence of other vehicles in their immediate vincinity. 
	  Accordingly, IP communication being transmitted by vehicles taking part of traffic MUST co-exist with Non IP communication and SHOULD NOT break any Non IP mechanism, including 'harmful' interference on the channel. 
	</t>
	<t>
	  The ID of the vehicle transmitting Non IP communication is transmitted in the src MAC address of the IEEE 1609 / ETSI Geonet datagrams. 
	  Accordingly, Non IP communications expose the ID of each vehicle, which may be considered as a privacy breach.
	</t>
	<t>
	  IEEE 802.11-OCB bypasses the authentication mechanisms of IEEE 802.11 networks, in order for non IP communications to be transmitted without any delay. 
	  This may be considered as a security breach. 
	</t>
	<t> IEEE 1609 and ETSI ITS provided strong security and privacy mechanisms for Non IP Communications. 
	Security (authentication, encryption) is done by asymetric cryptography, where each vehicle attaches its public key and its certificate to all of its non IP messages. 
	Privacy is enforced through the use of Pseudonymes. 
	Each vehicle will be pre-loaded with a large (>1000s) of pseudonymes generated by a PKI, which will uniquely assign a pseudonyme to a certificate (and thus to a public/private key pair).
	</t>
	<t> Non IP Communication being developped for safety-critical applications, complex mechanisms have been provided for their support. These mechanisms are OPTIONAL for IP Communication, but SHOULD be used whenever possible. 
    </t>	
      </section>
	  <section title="Reliability Requirements" anchor="link" >
	<t>
	  The dynamically changing topology, short connectivity, mobile transmitter and receivers, different antenna heights, and many-to-many communication types, make IEEE 802.11-OCB links significantly different to other IEEE 802.11 links. 
	  Any IPv6 mechanism operating on IEEE 802.11-OCB link MUST support strong link asymetry, spatio-temporal link quality, fast address resolution and transmission.   
	</t>
	<t>
	  IEEE 802.11-OCB strongly differs from other 802.11 systems to operate outside of the context of a Basic Service Set. 
	  This means in practice that IEEE 802.11-OCB does not rely on a Base Station for all Basic Service Set management. In particular, IEEE 802.11-OCB SHALL NOT use beacons. 
	  Any IPv6 mechanism requiring L2 services from IEEE 802.11 beacons MUST support an alternative service.
	</t>
	<t> Channel scanning being disabled, IPv6 over IEEE 802.11-OCB MUST implement a mechanism for transmitter and receiver to converge to a common channel.
	</t> 
	<t> Authentication being not possible, IPv6 over IEEE 802.11-OCB MUST implement an distributed mechanism to authenticate transmitters and receivers without the support of a DHCP server.
	</t>
	<t> Time synchronization being not available, IPv6 over IEEE 802.11-OCB MUST implement a higher layer mechanism for time synchroniation between transmitters and receivers without the support of a NTP server.
	</t>
	<t> The IEEE 802.11-OCB link being asymetic, IPv6 over IEEE 802.11-OCB MUST disable management mechanisms requesting acknowledgements or replies. 
	</t>
	<t> The IEEE 802.11-OCB link having a short duration time, IPv6 over IEEE 802.11-OCB MUST implement fast IPv6 mobility management mechanisms.
	</t>
	 </section>
      <section title="Privacy requirements" anchor="privreq" >
	<t>
	  Vehicles will move.  As they move, each vehicle needs to
	  regularly announce its network interface and reconfigure its
	  local and global view of its network.  L2 mechanisms of IEEE
	  802.11-OCB MAY be employed to assist IPv6 in discovering new
	  network interfaces.  L3 mechanisms over IEEE 802.11-OCB
	  SHOULD be used to assist IPv6 in discovering new network
	  interfaces.
	</t>
	<t>
	  The headers of the L2 mechanisms of IEEE 802.11-OCB and L3
	  management mechanisms of IPv6 are not encrypted, and as such
	  expose at least the src MAC address of the sender.  In the
	  absence of mitigations, adversaries could monitor the L2 or
	  L3 management headers, track the MAC Addresses, and through
	  that track the position of vehicles over time; in some
	  cases, it is possible to deduce the vehicle manufacturer
	  name from the OUI of the MAC address of the interface (with
	  help of additional databases).  It is important that
	  sniffers along roads not be able to easily identify private
	  information of automobiles passing by.
	</t>
	<t>
	  Similary to Non IP safety-critical communications, the
	  obvious mitigation is to use some form of MAC Address
	  Randomization.  We can assume that there will be
	  "renumbering events" causing the MAC Addresses to
	  change. Clearly, a change of MAC Address should induce a
	  simultaneous change of IPv6 Addresses, to prevent linkage of
	  the old and new MAC Addresses through continuous use of the
	  same IP Addresses.
	</t>
	<t> The change of an IPv6 address also implies the change of
	the network prefix. Prefix delegation mechanisms should be
	available to vehicles to obtain new prefices during
	"renumbering events".
	</t>
	<t>
	  Changing MAC and IPv6 addresses will disrupt communications,
	  which goes against the reliability requirements expressed in
	  <xref target="TS103097" />. We will assume that the
	  renumbering events happen only during "safe" periods, e.g.
	  when the vehicle has come to a full stop. The determination
	  of such safe periods is the responsibility of implementors.
	  In automobile settings it is common to decide that certain
	  operations (e.g. software update, or map update) must happen
	  only during safe periods.
	</t>

	<t>
	  MAC Address randomization will not prevent tracking if the
	  addresses stay constant for long intervals. Suppose for
	  example that a vehicle only renumbers the addresses of its
	  interface when leaving the vehicle owner's garage in the
	  morning. It would be trivial to observe the "number of the
	  day" at the known garage location, and to associate that with
	  the vehicle's identity.  There is clearly a tension there. If
	  renumbering events are too infrequent, they will not protect
	  privacy, but if their are too frequent they will affect
	  reliability. We expect that implementors will eventually find
	  the right balance.
	</t>
      </section>
   <section title="Authentication requirements" anchor="authreq" >
	<t>
	  IEEE 802.11-OCB does not have L2 authentication mechanisms. Accordingly, a vehicle receiving a IPv6 over IEEE 802.11-OCB packet cannot check or be sure the legitimacy of the src MAC (and associated ID). 
	  This is a significant breach of security. 
	</t>
	<t> Similarly to Non IP safety-critical communications, IPv6 over 802.11-OCB packets must contain a certificate, including at least the public key of the sender, that will allow the receiver to authenticate the packet, and guarantee its legitimacy. 
	</t>
	<t> To satisfy the privacy requiremrents of  <xref target="privreq" />, the certificate SHALL be changed at each 'renumbering event'. 
	</t>
	</section>
	
      <section title="Multiple interfaces" >
	<t>
	  There are considerations of 2 or more IEEE 802.11-OCB interface cards
	  per vehicle. For each vehicle taking part of road traffic, one IEEE 802.11-OCB interface card MUST be fully allocated for Non IP safety-critical communication.
      Any other IEEE 802.11-OCB may be used for other type of traffic.	  
	</t>
	<t>
	  The mode of operation of these other wireless interfaces
	  is not clearly defined yet. One possibility is consider each
	  card as an independent network interface, with a specific
	  MAC Address and a set of IPv6 addresses.  Another
	  possibility is to consider the set of these wireless interfaces as
	  a single network interface (not including the IEEE 802.11-OCB interface used by Non IP safety critical communications). This will require specific logic
	  to ensure, for example, that packets meant for a vehicle in
	  front are actually sent by the radio in the front, or that
	  multiple copies of the the same packet received by multiple
	  interfaces are treated as a single packet. Treating each
	  wireless interface as a separate network interface pushes
	  such issues to the application layer.
	</t>
	<t>
	  The privacy requirements of <xref target="privreq"/> imply
	  that if these multiple interfaces are represented by many network
	  interface, a single renumbering event SHALL cause
	  renumbering of all these interfaces. If one MAC changed and
	  another stayed constant, external observers would be able to
	  correlate old and new values, and the privacy benefits of
	  randomization would be lost.
	</t>
	<t> 
	  The privacy requirements of Non IP safety-critical communications imply that if a change of pseudonyme occurs, renumbering of all other interfaces SHALL also occur.
    </t>	
      </section>

      <section title="MAC Address Generation" >
	<t>
	  When designing the IPv6 over 802.11-OCB address mapping, we
	  will assume that the MAC Addresses will change during well
	  defined "renumbering events".  The 48 bits randomized MAC
	  addresses will have the following characteristics:
	</t>
	<t>
	  <list style="symbols" >
	    <t>
	      Bit "Local/Global" set to "locally admninistered".
	    </t>
	    <t>
	      Bit "Unicast/Multicast" set to "Unicast".
	    </t>
	    <t>
	      46 remaining bits set to a random value, using a random
	      number generator that meets the requirements of <xref
	      target="RFC4086" />.
	    </t>
	  </list>
	</t>
	<t>
	  One possible way to meet the randomization requirements is
	  to retain 46 bits from the output of a strong HASH function,
	  such as SHA256, taking as input a 256 bit local secret, the
	  "nominal" MAC Address of the interface, and a representation
	  of the date and time of the renumbering event.
	</t>
      </section>
	  
	  <section title="Security Certificate Generation" >
	<t>
	  When designing the IPv6 over 802.11-OCB address mapping, we will assume that the MAC Addresses will change during well defined "renumbering events". So MUST also the Security Certificates.
	  Unless unavailable, the Security Certificate Generation mechanisms SHOULD follow the specification in IEEE 1609.2 <xref target="ieee16094" /> or ETSI TS 103 097 <xref target="TS103097" />. These security mechanisms have the following characteristics:
	</t>
	<t>
	  <list style="symbols" >
	    <t>
	      Authentication - Elliptic Curve Digital Signature Algorithm (ECDSA) - A Secured Hash Function (SHA-256) will sign the message with the public key of the sender. 
	    </t>
	    <t>
	      Encryption - Elliptic Curve Integrated Encryption Scheme (ECIES) - A Key Derivation Function (KDF) between the sender's public key and the receiver's private key will generate a symetric key used to encrypt a packet.
	    </t>
	  </list>
	</t>
	<t> If the mechanisms described in IEEE 1609.2 <xref target="ieee16094" /> or ETSI TS 103 097 <xref target="TS103097" /> are either not supported or not capable of running on the hardware, an alternative approach based on Pretty-Good-Privacy (PGP) MAY be used as an alternative.
	</t>
      </section>

    </section>

<section title="Mapping IPv6 over 802.11-OCB" >

    <section title="Maximum Transmission Unit">
      <t>
	MTU is determined by the IEEE 802.11-2012 specification <xref
	target="ieee802.11-2012" />.
      </t>
    </section>

    <section title="Frame Format">
      <t>

      </t>
    </section>

    <section title="Stateless Autoconfiguration">
      <t>
      </t>
    </section>

    <section title="Link-Local Addresses">
      <t>
      </t>
    </section>

    <section title="Address Mapping -- Unicast">
      <t>
      </t>
    </section>

    <section title="Address Mapping -- Multicast">
      <t>
      </t>
    </section>

</section>
    <section anchor="Security" title="Security Considerations">

      <t>
	The source MAC address can be generated by the following
	random-number generation algorithm:
      </t>

      <t> 
	<figure align="center">
	  <artwork align="center">
	    <![CDATA[
		     f = ... 48bits.
		     The output must not collide with existing allocations.
	    ]]>
	  </artwork>
	</figure>
      </t>

      <t>
	For one 802.11-OCB interface multiple random MAC addresses MAY
	be generated.
      </t>
      
      <t>
	For each MAC address there is an associated certificate.
      </t>

    </section>    

    <section anchor="IANA" title="IANA Considerations">
      <t>
      </t>
    </section>

    <section anchor="Acknowledgements"
	     title="Acknowledgements">
      <t>
	The authors would like to acknowledge...
      </t>
    </section>
      

    </middle>

    <!--  *****BACK MATTER ***** -->

    <back>

      <references title="Normative References">
	<?rfc
	  include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119"
	?>
	<?rfc
	  include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2460"
	?>       
	<?rfc
	  include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.2464"
	?> 
       
	<?rfc
	  include="http://xml.resource.org/public/rfc/bibxml/reference.RFC.4086"
	?>             
      </references>

      <references title="Informative References">
	<reference anchor="ieee802.11p-2010" >
	  <front>
	    <title>
	      IEEE Std 802.11p(TM)-2010, IEEE Standard for Information
	      Technology - Telecommunications and information exchange
	      between systems - Local and metropolitan area networks -
	      Specific requirements, Part 11: Wireless LAN Medium
	      Access Control (MAC) and Physical Layer (PHY)
	      Specifications, Amendment 6: Wireless Access in
	      Vehicular Environments; document freely available at URL
	      http://standards.ieee.org/getieee802/download/802.11p-2010.pdf
	      retrieved on September 20th, 2013.
	    </title>
	    <author/>
	    <date/>
	  </front>
	</reference>
	<reference anchor="ieee802.11-2012" >
	  <front>
	    <title>
	      IEEE Std 802.11-2012 - IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications; document freely available at URL
	      http://standards.ieee.org/getieee802/download/802.11-2012.pdf
	      retrieved on July 08th, 2016.
	    </title>
	    <author/>
	    <date/>
	  </front>
	</reference>
	<reference anchor="TS103097" >
	  <front>
	    <title>
	      Intelligent Transport Systems (ITS); Security; Security header and certificate formats; document freely available at URL
	      http://www.etsi.org/deliver/etsi_ts/103000_103099/103097/01.01.01_60/ts_103097v010101p.pdf
	      retrieved on July 08th, 2016.
	    </title>
	    <author/>
	    <date/>
	  </front>
	</reference>
	<reference anchor="ieee16094" >
	  <front>
	    <title>
	      1609.2-2016 - IEEE Standard for Wireless Access in Vehicular Environments--Security Services for Applications and Management Messages; document freely available at URL
	      https://standards.ieee.org/findstds/standard/1609.2-2016.html
	      retrieved on July 08th, 2016.
	    </title>
	    <author/>
	    <date/>
	  </front>
	</reference>

	<?rfc include="http://xml.resource.org/public/rfc/bibxml3/reference.I-D.petrescu-its-scenarios-reqs" ?>      	
      </references>


      <section anchor='changelog'
	       title='ChangeLog'>
	<t>
	  The changes are listed in reverse chronological order, most
	  recent changes appearing at the top of the list.
	</t>

	<t>
	  From -00.txt to -00.txt:
	  <list style='symbols'>
	    <t>
	      first version.
	    </t>
	  </list>	
	</t>      
      </section>
  </back>
</rfc>
