IEEE Std 802.10-1998 Proposed Revision Purpose, Scope & 5 Criteria.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /661r1 Submission November 2002 Ziv Belsky, WavionSlide 1 Proposal for the 5 criteria for the HT SG.
Advertisements

Doc.: IEEE /661r0 Submission November 2002 Ziv Belsky, WavionSlide 1 Proposal for the 5 criteria for the HT SG.
Overview of the SDE Protocol Presented by Ken Alonge Chair,
ECMP for 802.1Qxx Proposal for PAR and 5 Criteria Version 2 16 people from ECMP ad-hoc committee.
Submission doc.: IEEE Comment #1 from WG Comment: In Section 5.2.b two examples of spectrum resource measurements are given: PER and.
CSD for P802.1AS-REV WG Wednesday, 05 November 2014.
CSCI 465 D ata Communications and Networks Lecture 20 Martin van Bommel CSCI 465 Data Communications & Networks 1.
IEEE 802.1ABrev Extension for Auto Attach Nigel Bragg Dan Romascanu Paul Unbehagen.
21-08-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: mrpm Title: Comments on PAR/5C of MRPM SG Date Submitted: September 7, 2008.
IEEE Qbv DRAFT 5C’s for Time Aware Shaper enhancement to 802.1Q
Submission doc.: IEEE /0229r1 March 2015 Jon Rosdahl, CSRSlide PAR Review March 2015 Date: Authors:
Doc.: IEEE /252 Submission November M. Hoeben - No Wires Needed Load Balancing PAR Criteria Maarten Hoeben.
LAN Overview (part 2) CSE 3213 Fall April 2017.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
Doc.: IEEE /0981r1 TGs Reference Architecture Considerations September 6, 2004 Tricci So & W. Steven Conner.Slide 1 TGs ESS Mesh System Reference.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
PAR and CSD for P802.1Qxx WG January PAR (1) 1.1 Project Number: P802.1Qxx 1.2 Type of Document: Standard 1.3 Life Cycle: Full Use 2.1 Title:
Standardization of Mobile Wireless Small Cell Backhaul (SCB) Document Number: IEEE r Date Submitted: Source: Junhyeong.
IEEE MSC April, 2009 AVB Device Discovery, Connection and Control SG Draft 1 A Device Discovery, Connection Management and Control Protocol for P1722 based.
Doc.: IEEE /0498r0 Submission April 2008 Eldad Perahia, Intel CorporationSlide 1 Modifications to the 60GHz PAR & 5 C’s Proposal Date:
Page 1 IEEE Ethernet Working Group - CSD Version 2.3 Items required by the IEEE 802 CSD are shown in Black text, supplementary items required by.
Consolidated comments on LASG 802c PAR and CSD Stephen Haddock March 11,
CSD for P802.1Qcj WG January Project process requirements Managed objects – Describe the plan for developing a definition of managed objects.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
1 Recommendations Now that 40 GbE has been adopted as part of the 802.3ba Task Force, there is a need to consider inter-switch links applications at 40.
1 6/3/2003 IEEE Link Security Study Group, June 2003, Ottawa, Canada Secure Frame Format PAR: 5 Criteria.
Doc.: IEEE /1220r0 Submission November 2009 Jon Rosdahl, CSRSlide 1 WG11 Comments on PARs submitted Nov 2009 Date: Authors:
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
1 IEEE interim, Orlando, Florida, March, 2008new-nfinn-fast-chains-rings-par5c-0308-v1 Fast Recovery for Chains and Rings Proposal for PAR and 5.
Doc.: IEEE sru Submission 11 November 2013 M Ariyoshi, S Kitazawa (ATR)Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /0860r0 Submission July 2010 Jon Rosdahl, CSRSlide 1 Comments for p New PAR – July 2010 Date: Authors:
Doc.: IEEE ulp Submission Slide 1 May 2012 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Virtual Local Area Networks In Security By Mark Reed.
Contents of this presentation ● PAR material (Title, Scope, Purpose) ● Material as developed at previous meetings ● Provision for new/revised material.
Contents of this presentation ● PAR material (Title, Scope, Purpose) ● Material as developed at previous meetings ● Provision for new/revised material.
Computer Networks with Internet Technology William Stallings Chapter 2 Protocols and the TCP/IP Protocol Suite.
Wireless Networks Dave Abbott.
Below 6GHz 11vht PAR&5C's proposal
IEEE P criteria responses
Comments on HT PAR & 5 Criteria
doc.: IEEE <doc#>
Computer Networks with Internet Technology William Stallings
P802.11aq Waiver request regarding IEEE RAC comments
P802.11aq Waiver request regarding IEEE RAC comments
VHT SG PAR Feedback from Individuals
CSE565: Computer Security Lecture 23 IP Security
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
Submission Title: [Proposal on PAR and 5C draft for BAN]
Final Conference in Paris WP6 – Protection Profiles Specification
<month year> Denver, March 2006
March 2005 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Conformance PAR Background Date Submitted:
Privacy Recommendation PAR Proposal
Submission Title: [Proposal on PAR and 5C draft for BAN]
Below 6GHz 11vht PAR&5C's proposal
900 MHz ISM Band Date: Authors: January 2010 Month Year
<month year> Denver, March 2006
comments on Pending 802 PARs – July 2011
Comments for p New PAR – July 2010
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
IEEE Comments on aq PAR and 5C
IEEE Comments on aq PAR and 5C
P802.11aq Waiver request regarding IEEE RAC comments
P802.11aq Waiver request regarding IEEE RAC comments
Submission Title: BAN closing report for San Diego, CA
September, 2016 IEEE/HL7 Baltimore, USA
Interest for HDR extension to a
Response to PAR/CSD Comments Bob Heile Chair, IEEE
Presentation transcript:

IEEE Std Proposed Revision Purpose, Scope & 5 Criteria

Purpose The purpose of this PAR is to update the Secure Data Exchange (SDE) Protocol specified in IEEE Std , to accommodate newly identified security requirements for all current 802 MACs and delete unneeded header fields.

Scope The scope of this PAR is to make changes to the format and processing of SDE PDUs to: – Accommodate replay protection – Integrity protect the Destination MAC address – Integrity protect additional header fields, particularly the VLAN tag, as needed The current PDU format and processing will have to be modified to incorporate a sequence number; the DA will have to be included in the computation of the ICV, and; the VLAN tag (and any other required header fields) will be included in the computation of the ICV, if protection is required by VLAN tagging rules (which are to be specified). In addition, an informative annex will be developed that discusses various scenarios for securing Layer 2 bridged networks and a normative annex will be developed that defines an SDE profile specifying a single interoperable SDE configuration that must be supported by all vendors claiming conformance to the revised SDE specification.

SDE Header Format Modifications DASA CLEAR HEADER PROTECTED HEADER ICV Current Format Revised Format INTEGRITY PROTECTED ENCRYPTED CLEAR HEADER PROTECTED HEADER DATAICV INTEGRITY PROTECTED ENCRYPTED DASA VLAN TAG PAD DATAPAD STA ID FLAGS FRAG ID SEC LABEL Pload EType FLAGS FRAG ID SEC LABEL SDE Des SAID MDF SAID SEQ NO. MDF

5 Criteria

Broad Market Potential 1. Broad sets of applicability 2. Multiple vendors & numerous users 3. Balanced costs (LAN vs attached stations) 1.Security is applicable to most personal and business environments that utilize 802 Layer 2 products. Increased security awareness in the general user population has dramatically increased the demand for security in networks composed of 802 Layer 2 products. 2.Several hundred people representing more than a hundred companies attend various 802 working groups that require security support in their products. These currently include (P2P & P2MP), (WLAN), (WPAN), (WMAN), (RPR), & (MBWA). 3.Layer 2 security can be implemented in either LAN devices or attached stations. Implementation of security in bridges is the most cost effective method, since many attached stations can be supported by a single bridge.

Compatibility The proposed revisions to IEEE Std are compatible with all current 802 MAC and bridging standards There are no implementations of , therefore backwards compatibility is not an issue Revisions to will conform with 802 Overview & Architecture and 802 layer management, as appropriate

Distinct Identity 1. Substantially different from other IEEE standards 2. One unique solution per problem 3. Easy for the document reader to select the relevant specification 1.There are no other 802-wide security standards i security work is specific to products, and is not intended to be a generic solution for all 802 MACs. PARs produced by the LinkSec ECSG will either support this effort, or be entirely distinct from it, but will not duplicate any of ’s work. 2.The goal of the revisions to is to provide a unique security solution that is applicable to all 802 MAC and bridging Standards. 3.The proposed effort is a revision to , which will have a distinct document revision number (probably IEEE Std )

Technical Feasibility 1. Demonstrated system feasibility 2. Proven technology, reasonable testing 3. Confidence in reliability 1.Technological revisions to are simple and straight-forward. Similar constructs are being used in a variety of products and other standards efforts today. 2.Products supporting Internet standards that incorporate similar technology have been sold world-wide and have been thoroughly tested in the field. 3.As with many security Standards, reference implementations will have to be constructed to which compliance must be proven in order to achieve the necessary confidence.

Economic Feasibility 1. Known cost factors, reliable data 2. Reasonable cost for performance 3. Consideration of installation costs 1.The goal of this project is to create a Layer 2 security mechanism that balances the cost of implementing data security with the cost and performance of the access technology. 2. Security mechanisms have been incorporated in Layers 2, 3, 4, and 7 at a reasonable cost increment, in terms of both dollars and throughput. 3. Any Layer 2 security mechanism may require additional infrastructure, depending on the type of key management mechanism selected. This translates into additional installation cost for equipment, software, and/or administration.