ITU-T SG17 Q.6 Security aspects of ubiquitous telecommunication services An overview for newcomers Jonghyun Baek Q6/17 Rapporteur 21 March 2016.

Slides:



Advertisements
Similar presentations
ITU-T activity in ICT security
Advertisements

Cloud computing security related works in ITU-T SG17
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All The Internet of Things (IoT) aka Machine 2 Machine (M2M) Bilel Jamoussi Chief, Study Groups Department.
Ch. 7. Architecture Standardization for WoT
Security Controls – What Works
The 6th CJK IT Standards Meeting April 10 ~ 12, 2006, Hangzhou, China CJK IT Standards Meeting (Collaboration of Security Activity between CJK On NGN and.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ITU-T Identity Management Update Bilel Jamoussi, Chief, SGD/TSB ITU Abbie Barbir, Q10/17 Rapporteur.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
DOCUMENT #:GSC15-PLEN-37 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:Plenary 6.6 Networked Vehicle Chaesub Lee and Yushi.
Applied Cryptography for Network Security
3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
Jaehoon (Paul) Jeong, Hyoungshick Kim, and Jung-Soo Park
1 3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
TTA Views on Technical Scope of M2M Consolidation 17 August 2011 TTA M2MCons02_16 (Agenda 4.3)
NETWORK SECURITY.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Consolidated M2M standards boost the industry Li Li (Thomas) CCSA(Huawei) Document No: GSC16-PLEN-73.
A Survey on Interfaces to Network Security
ETSI Home Networking activities Rainer Münch ETSI TISPAN Chairman Presenter: Ian Spiers DOCUMENT #:GSC13-GTSC6-20r1 FOR:Presentation SOURCE:Rainer Münch,
DOCUMENT #:GSC15-GTSC-05 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:4.1 NGN, Testing specification and Beyond Chaesub.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
The need for further standards and technical developments Brian Moore ITU-T Study Group 13 Chairman Lucent Technologies.
DOCUMENT #:GSC15-CL-04 FOR:Presentation SOURCE:CCSA AGENDA ITEM:Closing Plenary, 2.3 GTSC-8 Summary Report Duo Liu GTSC-8.
1 IoT Standardization Activities in CCSA China Communications Standards Association Duo Liu 21th meeting CJK UNIOT-WG Jun ,
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
Sungkyunkwan University (SKKU) Security Lab. A Framework for Security Services based on Software-Defined Networking Jaehoon (Paul) Jeong 1, Jihyeok Seo.
DOCUMENT #:GSC15-PLEN-06 FOR:Presentation SOURCE:CCSA AGENDA ITEM:4.3 Recent Progress of CCSA ’s Standardization Activities.
International Telecommunication Union Eighth Global Standards Collaboration (GSC) Meeting - Ottawa, Canada, 27 April-1 May 2003 Security Standardization.
Virtual Private Ad Hoc Networking Jeroen Hoebeke, Gerry Holderbeke, Ingrid Moerman, Bard Dhoedt and Piet Demeester 2006 July 15, 2009.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
DOCUMENT #:GSC15-PLEN-58 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.1 CONTACT(S): Marylin Arndt, TC M2M chair M2M and Internet of Services "When the.
IEC TC57 WG15 - Security Status & Roadmap, TC57 Plenary, May 2007
Jeju, 13 – 16 May 2013Standards for Shared ICT TIA TR-50 M2M-Smart Device Communications Dr. Jeffery Smith Chief Innovation and Technology Officer/EVP.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
ITU-T SG16 and JCA-IoT activities
The 6th CJK IT Standards Meeting April 10 ~ 12, 2006, Hangzhou, China CJK IT Standards Meeting (Collaboration of Security Activity between CJK On NGN and.
Jeju Island, Korea, 13 – 16 May 2013Identity Management and Identification Systems GSC17-PLEN-43 ITU-T IDENTITY MANAGEMENT UPDATE Bilel Jamoussi, Chief,
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
Fostering worldwide interoperabilityGeneva, July 2009 Support convergences over NGN Chaesub LEE, ITU-T SG13 Chairman, followed by Global Standards.
The 16th CJK NGN-WG Meeting July 22 ~ 24, 2009, Beijing, China 16 th CJK NGN-WG (Standardization on DSN and Future Direction ) Shin-Gak Kang
T.Russell Shields, Co-Chair, Collaboration on ITS Communication Standards Martin Adolph, Programme Coordinator, ITU ITU activities on secure vehicle software.
ITU Regional Standardization Forum for Africa Livingstone, Zambia March 2016 ITU-T SG5 Activities A special focus on L.1440: Methodology for environmental.
Security of the Internet of Things: perspectives and challenges
Jeju, 13 – 16 May 2013Standards for Shared ICT TTA activities since GSC-16 Keun Hyeob Lee, President of TTA Document No: GSC17-PLEN-39 Source: TTA Contact:
ITU-T SG17 Q.3 Telecommunication information security management An overview Miho Naganuma Q.3/17 Rapporteur 17 March 2016.
ITU-T SG17 Q.2 Security Architecture and Framework An overview for newcomers Patrick Mwesigwa Q.2/17 Rapporteur 15 March 2016.
Inter-American Telecommunication Commission
Inter-American Telecommunication Commission
The ITU-T X.500 series and X.509 in a changing world
Tutorials of Q.8: cloud security related works in SG17
Consolidated M2M standards boost the industry
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
20th CJK UNIOT-WG (Standardization of Mobile IPTV in ITU-T)
Ramy Ahmed Fathy ITU-T SG20 Vice Chairman
HIS Smart Grid – Summary (1)
Glenn Parsons, GTSC-9 Chair, ISACC
PLUG-N-HARVEST ID: H2020-EU
Group Meeting Ming Hong Tsai Date :
ITU-T SG17 Q.3 Telecommunication information security management
ITU-T Study Group 17 Security
Martin Euchner, Advisor, ITU-T Study Group 17
ETSI Standardization Activities on Smart Grids
TIA TR-50 M2M-Smart Device Communications
Reinhard Scholl, GTSC-7 Chairman
ITU-T activity in ICT security
Glenn Parsons, GTSC-9 Chair, ISACC
Presentation transcript:

ITU-T SG17 Q.6 Security aspects of ubiquitous telecommunication services An overview for newcomers Jonghyun Baek Q6/17 Rapporteur 21 March 2016

Contents  Question text for Q6/17 Motivation, Question, Tasks, and Relationships  Recommendations and Supplements related to Q6/17  Draft Recommendations on developing under Q6/17  Future Plan for Next Study Period ( ) 2

Question text for 6/17 – Motivation  The ubiquitous telecommunication service refers to the service that allows anyone to access to any desired information in a user-friendly way, anytime and anywhere using any devices.  The telecommunications industry has been experiencing an exponential growth in area of mobile technology based ubiquitous telecommunication services.  Specifically, security of domain-specific ubiquitous telecommunications among heterogeneous devices for the application-level technologies such as ubiquitous sensor network (including Internet of Things (IoT), Machine to Machine (M2M) and Intelligent Transportation Systems), home network, smart grid, mobile network (including Near Field Communication (NFC) and smartphone), multicast network, IPTV network, etc., are crucial for the further development of the industry, network operators and service providers. 3

Question text for 6/17 – Motivation (cont’)  Standardization of the best comprehensive security solutions is vital for the network operators and service providers that operate in a multi-vendor international ubiquitous environment. Due to some specific characteristics of the mobile telecommunications (e.g., over the air transmission, limited computing power and memory size of the small mobile devices), providing security is an especially challenging task that deserves special attentions and study. Recommendations under responsibility of this Question – X.1101(Multicast), X.1111, X.1112, X.1113, X.1114(Home network), X.1121, X.1122, X.1123, X.1124, X.1125(Mobile), X.1171, X.1191, X.1192, X.1193, X.1194, X.1195, X.1196, X.1197, X.1198(IPTV), X.1311, X.1312, X.1313, X.1314(USN), Texts under development – X.msec-9, X.sgsec-1, X.sgsec-2, X.itssec-1, X.itesec-2, X.iotsec-1, X.iotsec-2, and X.sdnsec-1 4

Question text for 6/17 – Question  Study items to be considered include, but are not limited to: – How should security aspects of ubiquitous telecommunication services be identified and defined in mobile telecommunication? – How should threats behind ubiquitous telecommunication services be identified and handled? – What are the security technologies for supporting ubiquitous telecommunication services? – How should secure interconnectivity between ubiquitous telecommunication services be kept and maintained? 5

Question text for 6/17 – Question (cont’)  Study items to be considered include, but are not limited to: – What security techniques, mechanisms and protocols are needed for emerging ubiquitous telecommunication services, especially for emerging digital content protection services? – What are the global security solutions for ubiquitous telecommunication services and their applications? – What are the best practices or guidelines for secure ubiquitous telecommunication services and their applications? – What enhancements to existing Recommendations under review or new Recommendations under development should be adopted to reduce impact on climate changes (e.g., energy savings, reduction of greenhouse gas emissions, implementation of monitoring systems) either directly or indirectly in telecommunication/ICT or in other industries? 6

Question text for 6/17 – Tasks  Tasks include, but are not limited to: – In collaboration with other ITU T study groups and standards development organizations, especially with IETF, ISO/IEC JTC 1/SCs 6, 25, 27 and 31, produce a set of Recommendations for providing comprehensive security solutions for secure ubiquitous telecommunication services. – Review existing Recommendations/Standards of ITU T, ISO/IEC and other standardization bodies in the area of home network, smart grid, mobile network (including smartphone security), mobile IoT service and ubiquitous sensor network to identify secure ubiquitous telecommunication services. – Study further to define security aspects of ubiquitous telecommunication services for a multi-vendor international ubiquitous environment, and for emerging new services. – Study and identify security issues and threats in secure ubiquitous telecommunication services. – Study and develop security mechanisms for secure ubiquitous telecommunication services. – Study and develop interconnectivity mechanisms for secure ubiquitous telecommunication services in a single or multi-vendor ubiquitous environment 7

Question text for 6/17 – Relationships  Recommendations – X-series and others related to security  Questions – ITU ‑ T Questions 1/17, 2/17, 3/17, 4/17, 5/17, 7/17, 8/17, 9/17, 10/17, 11/17, 8/13, 7/13, 13/16 and 21/16  Study Groups – ITU T SGs 9, 11, 13 and 16, JCA-SG&HN, JCA-IPTV and JCA-IoT; ITU-R  Standardization bodies – ISO/IEC JTC 1/SCs 6, 25, 27 and 31; IEC SMB WG3 and TC57; IETF; 3GPP; 3GPP2; OMA; GSMA  Other bodies – ETSI; ATIS; TTC; TTA; CCSA; OIPF; DVB; NFC Forum; NIST 8

Contents  Question text for Q6/17 Motivation, Question, Tasks, and Relationships  Recommendations and Supplements related to Q6/17  Draft Recommendations on developing under Q6/17  Future Plan for Next Study Period ( ) 9

Recommendations related to Q6/17 10  X.1101, Security requirements and framework for multicast communication  X.1111, Framework of security technologies for home network  X.1112, Device Certificate profile for the home network  X.1113, Guideline on user authentication mechanisms for home network service  X.1114, Authorization framework for home network  X.1121, Security framework for mobile end-to-end data communication  X.1122, Guideline for implementing secure mobile systems based on PKI  X.1123, Differentiated security service for secure mobile end-to-end data communication  X.1124, Authentication architecture for mobile end-to-end data communication  X.1125, Correlative reacting system in mobile network  X.1171, Threats and requirements for protection of personally identifiable information in applications using tag-based identification  X.1191, Functional requirements and architecture for IPTV security aspects

Recommendations related to Q6/17 (cont’) 11  X.1192, Functional requirements and mechanisms for the secure transcodable scheme of IPTV  X.1193, Key management framework for secure internet protocol television (IPTV) services  X.1194, Algorithm selection scheme for service and content protection (SCP) descrambling  X.1195, Service and content protection (SCP) interoperability scheme  X.1196, Framework for the downloadable service and content protection system in the mobile IPTV environment  X.1197, Guidelines on criteria for selecting cryptographic algorithms for IPTV service and content protection  X.1198, Virtual machine-based security platform for renewable IPTV service and content protection  X.1311, Security framework for ubiquitous sensor network  X.1312, Ubiquitous sensor network (USN) middleware security guideline  X.1313, Security requirements for wireless sensor network routing  X.1314, Security requirements and framework of ubiquitous networking

Supplements (including Corrigendum) related to Q6/17 12  X.Suppl.19, Supplement to ITU-T X.1120 series – Supplement on security aspects of smartphones  X.1311 Cor.1, Security framework for ubiquitous sensor networks Technical Corrigendum 1  X.Suppl.24, ITU-T X.1120-X.1139 series - Supplement on a secure application distribution framework for communication devices

Contents  Question text for Q6/17 Motivation, Question, Tasks, and Relationships  Recommendations and Supplements related to Q6/17  Draft Recommendations on developing under Q6/17  Future Plan for Next Study Period ( ) 13

Draft Recommendation ITU-T X.msec-9  Functional Security Requirements and Architecture for Mobile Phone Anti- theft Measures (Timing: / Determination) – Address the functional security requirements and architecture for the smartphone anti-theft measure (aka, a kill switch), which allows customers to delete remotely the user's personal data or disable remotely stolen or lost smartphone devices – Focus on the functional requirements, functional architecture, and mechanisms – Use the reference model consisting of the device owner, the authorized server, the back-up server, and lost/stolen devices – Describe Ant-theft specific threats (in the Appendix) – Not modify the general requirements for Smartphone anti-theft developed by GSMA 14 Reference model for anti-theft measures, in Draft Rec. ITU-T X.msec-9

Draft Recommendation ITU-T X.sgsec-1  Security functional architecture for smart grid services using telecommunication networks (Timing: / Consent) – Describes a security functional architecture for smart grid (SG) services using telecommunication networks – Identifies security risks and security requirements – Defines a security functional architecture for smart grid services using telecommunication networks based on a general functional model – Main contents Reference architecture and smart grid services Security risks categorization of smart grid services Security requirements of smart grid services Security functional architecture of smart grid services 15

Draft Recommendation ITU-T X.sgsec-2  Security guidelines for home area network (HAN) devices in smart grid systems (Timing: / Determination) – Provides security guidelines for Home Area Network (HAN) devices in Smart Grid systems – Main contents Security risks of devices and communication Security requirements for devices and communications in HAN Security guidelines of HAN devices in Smart Grid systems 16 Target fields of X.sgsec-2, in Draft Rec. ITU-T X.sgsec-2

Draft Recommendation ITU-T X.itssec-1  Secure software update capability for intelligent transportation system communications devices (Timing: / Determination) – Provide a procedure of secure software updating for ITS communication devices for the application layer in order to prevent threats such as tampering of and malicious intrusion to communication devices on vehicles – Includes a basic model of software update, its threat and risk analysis, security requirements and controls for software update and a specification of abstract data format of update software module 17 Principal modules around a vehicle for a remote software update, in Draft Rec. ITU-T X.itssec-1

Draft Recommendation ITU-T X.itssec-2  Security guidelines for V2X communication systems (Timing: / Determination) – Provides security guidelines for V2X communication systems. V2X means Vehicle- to-Vehicle (V2V), V2I (Vehicle-to-Infrastructure) and/or V2N (Vehicle-to-Nomadic Devices) – Includes analysis of threat and vulnerability for V2X communication systems – Provides the security requirements for V2X communication systems 18 Overview of the vehicular communication, in Draft Rec. ITU-T X.itssec-2

Draft Recommendation ITU-T X.iotsec-1  Simple encryption procedure for Internet of Things (IoT) environments (Timing: / Determination) – Provides specification of encryption with associated mask data (EAMD) for the Internet of things (IoT) devices – Includes what EAMD does and how to provide a set of security services for traffic using it – Main contents Introduction of encryption with associated mask data (EAMD) How encryption with associated mask data does How EAMD does with authenticated encryption Guidance on the proper usage of initialization vectors, nonces, and SAMs 19 Overview of communication using EAMD, in Draft Rec. ITU-T X.iotsec-1

Draft Recommendation ITU-T X.iotsec-2  Security framework for Internet of Things (Timing: / Determination) – Analyses security threats and challenges in the Internet of Things environment, and describes security capabilities that could mitigate these threats and address security challenges – Framework methodology is provided for determining which of these security capabilities are required for mitigating security threats and addressing security challenges for Internet of Things. – Basically focuses on IoT security capabilities based on the Gateway Model Consider the reference model described in Recommendation ITU-T Y.2068 Focus on technical aspects, not management aspects 20 Practical functional architecture, in Draft Rec. ITU-T X.iotsec-2

Draft Recommendation ITU-T X.sdnsec-1  Security services using the Software-defined networking (Timing: / Determination) – Support the protection of network resources using security services based on software-defined networking (SDN) Classify the network resources for SDN-based security services Define security services based on SDN Specify how to implement SDN-based security services – Protection of network resources (e.g., router, switch, firewall and IDS) in security services based on SDN means Prompt reaction to new network attacks (e.g., worms and DDoS attacks) Construction of private networks to mitigate sophisticated network attacks Automatic defense from network attacks without the intervention of network administrators Dynamic network-load-aware resource allocation 21

Contents  Question text for Q6/17 Motivation, Question, Tasks, and Relationships  Recommendations and Supplements related to Q6/17  Draft Recommendations on developing under Q6/17  Future Plan for Next Study Period ( ) 22

Future Plan for Next Study Period ( )  Q6/17 will address various security aspects of ubiquitous telecommunication services; – IoT security – ITS security – Smart Grid security – Mobile security – SDN security  Q6/17 will also have strong relationships with other stud groups and standardization bodies dealing with security aspects of ubiquitous telecommunication services; – Study Groups ITU-T SGs 9, 11, 13, 15, 16 and 20, JCA-IoT, JCA-IPTV; ITU-R, CITS – Standardization bodies ISO/IEC JTC 1/SCs 6, 25, 27 and 31; ISO TC 204, IEC SEG 6 (Micro Grid), IEC SMB WG3, IEC TCs 57 and 65; IETF; 3GPP; 3GPP2; OMA; GSMA 23

Thank you! Q6/17 Rapporteur: Jonghyun Baek Q6/17 Associate Rapporteur: Yutaka Miyake