<?xml version="1.0" encoding="US-ASCII"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd">
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc ipr="trust200902" docName="draft-hao-physical-layer-fingerprint-interface-00" category="std">
 <front>
  <title abbrev="RFF ACCESS">Interface specification for physical layer fingerprint access authentication framework of IoT devices
</title>
  <author fullname="Hao Fang" initials="H" surname="Fang">
   <organization>Upsec Inc.</organization>
   <address>
    <postal>
     <street>No.9 Mozhou Donglu, Jiangning</street>
     <city>Nanjing

</city>
     <region>JiangSu</region>
     <code>211111</code>
     <country>China</country>
    </postal>
    <email>fanghao@upsec.cn</email>
   </address>
  </author>
  <author fullname="Hua Fu" initials="H" surname="Fu">
   <organization>Southeast University
</organization>
   <address>
    <postal>
     <street>No.2 SiPaiLou
</street>
     <city>Nanjing

</city>
     <region>JiangSu</region>
     <code>210096</code>
     <country>China</country>
    </postal>
    <email>hfu@seu.edu.cn</email>
   </address>
  </author>
  <author fullname="Ling Jin" initials="L" surname="Jin">
   <organization>Upsec Inc.</organization>
   <address>
    <postal>
     <street>No.9 Mozhou Donglu, Jiangning</street>
     <city>Nanjing

</city>
     <region>JiangSu</region>
     <code>211111</code>
     <country>China</country>
    </postal>
    <email>jinling@upsec.cn</email>
   </address>
  </author>
  <author fullname="Yu Jiang" initials="Y" surname="Jiang">
   <organization>Southeast University
</organization>
   <address>
    <postal>
     <street>No.2 SiPaiLou
</street>
     <city>Nanjing

</city>
     <region>JiangSu</region>
     <code>210096</code>
     <country>China</country>
    </postal>
    <email>jiangyu@seu.edu.cn</email>
   </address>
  </author>
  <author fullname="Aiqun Hu" initials="A" surname="Hu">
   <organization>Southeast University
</organization>
   <address>
    <postal>
     <street>No.2 SiPaiLou
</street>
     <city>Nanjing

</city>
     <region>JiangSu</region>
     <code>210096</code>
     <country>China</country>
    </postal>
    <email>aqhu@seu.edu.cn</email>
   </address>
  </author>
  <date day="12" month="April" year="2022"/>
  <workgroup>Southeast University, Upsec Inc.</workgroup>
  <abstract>
   <t>This document is for access authentication framework of Internet of Things (IoT) devices using physical layer fingerprint. This document specifies the interface functions of the authentication framework. This document applies to the construction and management of secure access at the edge of the IoT. This document assumes that the reader is familiar with the concepts of physical layer fingerprint technique.</t>
  </abstract>
  <note title="Terminology">
   <t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;,
      &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;MAY&quot;, and &quot;OPTIONAL&quot; in this
      document are to be interpreted as described in <xref target="RFC2119">RFC 2119</xref>.</t>
  </note>
 </front>
 <middle>
  <section title="Introduction" anchor="intro">
   <t>Device authentication is important to ensure the security of Internet of Things (IoT). The classical device authentication techniques are based on MAC address, preshared key or digital certificate <xref target="I-D.linning-authentication-physical-layer"/>. However, MAC address can be imitated. As the IoT becomes more diverse and pervasive, the implementation of the pre-shared key and digital certificate becomes increasingly complex.</t>
   <t>Physical layer fingerprint is a promising technique for IoT device authentication<xref target="Ref_1"/>. It corresponds to extract the inherent physical layer features of the device from the received signal. These physical layer features have shown uniqueness and persistence, hence can be used for device authentication. </t>
   <t>Because that the physical layer fingerprint access authentication requires only the signal received from the IoT device, a suitable access authentication framework needs to be defined. An authentication framework has been proposed in <xref target="I-D.dawei-access-authentication-physical-layer"/>, with the basic functions of the framework, specification of fingerprint expression and control message. In this document, based on the same access authentication model, the objectives of the access authentication framework and interface specifications have been proposed, to ensure the effectiveness and facilitate the integration of the access authentication framework with the existing IoT network.</t>
  </section>
  <section title="Glossary">
   <t>IoT Device Access Gateway<list style="empty">
     <t>A device works for network connection, control and management, deployed at the boundary between the perception layer and the network layer of the IoT. It realizes the communication between the IoT devices and the network layer.</t>
    </list>
   </t>
   <t>Physical layer fingerprint authentication device<list style="empty">
     <t>A device works for training, identifying and authenticating IoT devices.</t>
    </list>
   </t>
  </section>
  <section title="Objectives of physical layer fingerprint access authentication framework" anchor="Objectives">
   <section title="Functional objectives">
    <t>The physical layer fingerprint access authentication framework should achieve the following functional objectives:<t>a) The physical layer fingerprint access authentication framework shall be independent of the application system, to help establish a trust relationship between the application system and IoT devices and provide prerequisites for further determining whether the IoT devices can access the main network of the application system. </t>
     <t>b) The physical layer fingerprint access authentication framework should be independent of the specific physical layer communication protocols of IoT devices, and can support all possible physical layer communication protocols.</t>
     <t>c) The physical layer fingerprint access authentication framework should maintain the accuracy of the used physical layer fingerprint extraction and identification mechanism.</t>
     <t>d) The interface defined by the physical layer fingerprint access authentication framework should not require the IoT device access gateway of the original application system to give additional physical layer configuration parameters.</t>
    </t>
   </section>
   <section title="Non-functional objectives">
    <t>The physical layer fingerprint access authentication framework should achieve the following non-functional objectives:<t>a) The physical layer fingerprint access authentication framework does not specify a specific physical layer fingerprint extraction and identification mechanism.</t>
     <t>b) The interface defined by the physical layer fingerprint access authentication framework does not specify a specific interface access authentication mechanism, but to avoid abuse of the defined interface, the necessary security authentication shall exist between the physical layer fingerprint access authentication device and the IoT device access gateway of the application system.</t>
     <t>c) The physical layer fingerprint access authentication framework is independent of the specific operating system or platform, but the implementation of the physical layer fingerprint access authentication device may be relevant to a specific operating system or platform.</t>
     <t>d) The interfaces defined by the physical layer fingerprint access authentication framework should enable integration with legacy systems. </t>
    </t>
   </section>
  </section>
  <section anchor="Framework" title="Physical layer fingerprint access authentication framework">
   <section title="Structure of the Physical layer fingerprint access authentication framework">
    <t>The structure of the physical layer fingerprint access authentication framework is shown in Fig. 1. The physical layer fingerprint access authentication is composed of two parts: the physical layer fingerprint authentication device and the IoT device access gateway. The physical layer fingerprint authentication device adopts a distributed architecture and can simultaneously serve multiple IoT devices to access the gateway.</t>
    <t>
     <figure anchor="fig2" title="Structure of the physical layer fingerprint access authentication framework">
      <artwork>+----------------+        +----------------+        +------------+             
|                |        |   IoT device   |        |            |
|   IoT device   | &lt;----&gt; | access gateway | &lt;----&gt; |  Intranet  |
|(Claiming party)|        | (Relying party)|        |            |
|                |        |                |        |            |
+----------------+        +----------------+        +------------+  
           ^                       ^
           |                       | -Full whitelist request
           |                       | -Incremental whitelist request
           |                       | -Blacklisting
           |                       | -Unblacklisting
           |                       v
           |       +------------------------------+ 
           +-----&gt; |                              |
                   |  Physical layer fingerprint  |
                   |     authentication device    |
                   |          (Verifier)          |
                   |                              |
                   +------------------------------+ 




</artwork>
     </figure>
    </t>
    <t>The main function of the physical layer fingerprint authentication device is to complete the extraction and authentication of the fingerprint of the IoT device through a certain identity authentication mechanism, and to submit the authentication result in the form of assertion to the IoT device access gateway. The physical layer fingerprint authentication device does not limit the specific identity authentication mechanism, but only provides a unified interface, and the specific authentication interaction process with the IoT device is completed by the implementation of each authentication mechanism itself. The physical layer fingerprint authentication device corresponds to the verifier in the authentication model of <xref target="I-D.dawei-access-authentication-physical-layer"/>.</t>
    <t>The IoT device access gateway interacts with the physical layer fingerprint authentication device to assist in the authentication process of the IoT device accessing the main network of the application system. The IoT device access gateway and the application system together correspond to the relying party in the authentication model of <xref target="I-D.dawei-access-authentication-physical-layer"/>.</t>
    <t>The communication between the IoT device access gateway and the physical layer fingerprint authentication device is by default protected by a trusted channel. If the application system and the physical layer fingerprint authentication device are integrated together, i.e., the verifier and the relying party are unified entities, this trusted channel becomes the internal data transmission in the system. If the application system and the physical layer fingerprint authentication device are located in different systems and need to communicate with each other remotely, this trusted channel is an encrypted channel between them.</t>
   </section>
   <section title="Interface functions for physical layer fingerprint access authentication">
    <section title="Full whitelist request">
     <t>The physical layer fingerprint authentication device requests the full whitelist of IoT devices from the IoT device access gateway through this interface. Based on the full whitelist, the physical layer fingerprint authentication device performs fingerprint extraction and authentication for all whitelisted devices.</t>
    </section>
    <section title="Incremental whitelist request">
     <t>The physical layer fingerprint authentication device requests the IoT device whitelist incremental list from the IoT device access gateway through this interface, and based on the whitelist incremental list, the physical layer fingerprint authentication device performs fingerprint extraction and authentication for the added whitelist devices.

</t>
    </section>
    <section title="Blacklisting">
     <t>When the physical layer fingerprint authentication device identifies that the status of one device in the whitelist has been changed from legal to illegal, this authentication result should be submitted to the IoT device access gateway, and at the same time, the IoT device access gateway adds this device to the blacklist and intercepts it.</t>
    </section>
    <section title="Unblacklisting">
     <t>When the physical layer fingerprint authentication device identifies that the status of one device in the whitelist has changed from illegal to legal, this authentication result should be submitted to the IoT device access gateway, and at the same time, the IoT device access gateway withdraws this device from the interception blacklist.</t>
    </section>
   </section>
  </section>
  <section anchor="Interface" title="Interface Specification">
   <section title="Full whitelist request interface">
    <t>This interface needs to provide the following requests and responses:

<t>Requests:<t>a) Protocol version<t>The version of the protocol between the physical layer fingerprint authentication device and the IoT device access gateway.</t>
      </t>
      <t>b) Gateway identifier<t>The unique identifier of the IoT device access gateway for use when the physical layer fingerprint authentication device interacts with the IoT device access gateway for information.</t>
      </t>
     </t>
     <t>Responses:<t>a) Full whitelist<t>The full amount of data of the whitelisted IoT devices set in the IoT device access gateway, generally including the following parts: device MAC address, IP address, etc.</t>
      </t>
      <t>b) Policy expiration time<t>The policy expiration time specifies the valid time of the whitelist, and the physical layer fingerprint authentication device identifies and authenticates the current whitelisted device within this valid time.

</t>
      </t>
     </t>
    </t>
   </section>
   <section title="Incremental whitelist request interface">
    <t>This interface needs to provide the following requests and responses:<t>Requests:<t>a) Protocol version<t>The version of the protocol between the physical layer fingerprint authentication device and the IoT device access gateway.</t>
      </t>
      <t>b) Gateway identifier<t>The unique identifier of the IoT device access gateway for use when the physical layer fingerprint authentication device interacts with the IoT device access gateway for information.</t>
      </t>
     </t>
     <t>Responses:<t>a) Incremental whitelist<t>The incremental whitelist data of IoT devices set in the IoT device access gateway, generally including the following parts: device MAC address, IP address, etc.

</t>
      </t>
      <t>b) Policy expiration time<t>The policy expiration time specifies the valid time of the whitelist, and the physical layer fingerprint authentication device identifies and authenticates the current whitelisted device within this valid time.</t>
      </t>
     </t>
    </t>
   </section>
   <section title="Blacklisting interface">
    <t>This interface needs to provide the following requests and responses:<t>Requests:<t>a) Protocol version<t>The version of the protocol between the physical layer fingerprint authentication device and the IoT device access gateway.</t>
      </t>
      <t>b) Gateway identifier<t>The unique identifier of the IoT device access gateway for use when the physical layer fingerprint authentication device interacts with the IoT device access gateway for information.

</t>
      </t>
      <t>c) Device information<t>Information of device to be blacklisted, generally including the following parts: device MAC address, IP address, etc.</t>
      </t>
      <t>d) Authentication result<t>The current authenticatin result.</t>
      </t>
     </t>
     <t>Responses:<t>a) Gateway identifier<t>The unique identifier of the IoT device access gateway for use when the physical layer fingerprint authentication device interacts with the IoT device access gateway for information.

</t>
      </t>
      <t>b) Policy expiration time<t>The policy expiration time specifies the valid time of the whitelist, and the physical layer fingerprint authentication device identifies and authenticates the current whitelisted device within this valid time.

</t>
      </t>
      <t>c) Device information<t>Information of device just blacklisted, generally including the following parts: device MAC address, IP address, etc.</t>
      </t>
     </t>
    </t>
   </section>
   <section title="Unblacklisting interface">
    <t>This interface needs to provide the following requests and responses:<t>Requests:<t>a) Protocol version<t>The version of the protocol between the physical layer fingerprint authentication device and the IoT device access gateway.</t>
      </t>
      <t>b) Gateway identifier<t>The unique identifier of the IoT device access gateway for use when the physical layer fingerprint authentication device interacts with the IoT device access gateway for information.


</t>
      </t>
      <t>c) Device information<t>Information of device to be unblacklisted, generally including the following parts: device MAC address, IP address, etc.</t>
      </t>
      <t>d) Authentication result<t>The current authentication result.</t>
      </t>
     </t>
     <t>Responses:<t>a) Gateway identifier<t>The unique identifier of the IoT device access gateway for use when the physical layer fingerprint authentication device interacts with the IoT device access gateway for information.

</t>
      </t>
      <t>b) Policy expiration time<t>The policy expiration time specifies the valid time of the whitelist, and the physical layer fingerprint authentication device identifies and authenticates the current whitelisted device within this valid time.
</t>
      </t>
      <t>c) Device information<t>Information of device just un-blacklisted, generally including the following parts: device MAC address, IP address, etc.</t>
      </t>
     </t>
    </t>
   </section>
  </section>
  <section anchor="IANA" title="IANA Considerations">
   <t>This document includes no request to IANA.</t>
  </section>
  <section anchor="Security" title="Security Considerations">
   <t>This section will address only security considerations associated with the use of physical layer fingerprint access authentication framework. It is necessary to ensure that the IoT device access gateway and the physical layer fingerprint authentication device are in a secure and trusted environment.</t>
  </section>
 </middle>
 <back>
  <references title="Normative References">
   <?rfc include="http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"?></references>
  <references title="Informative References">
   <?rfc include="http://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.draft-linning-authentication-physical-layer-00.xml"?>
   <reference anchor="Ref_1">
    <!-- the following is the minimum to make xml2rfc happy -->
    <front>
     <title>https://dl.acm.org/doi/10.1145/2379776.2379782</title>
     <author initials="Boris" surname="Danev">
      <organization/>
     </author>
     <date year="2012"/>
    </front>
   </reference>
   <?rfc include="http://xml2rfc.tools.ietf.org/public/rfc/bibxml3/reference.I-D.draft-dawei-access-authentication-physical-layer-00.xml"?>
  </references>
 </back>
</rfc>
