ETSI Software Reconfiguration Overview

Slides:



Advertisements
Similar presentations
1 Introducing the Specifications of the Metro Ethernet Forum.
Advertisements

IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
A Unified Approach to Combat Counterfeiting: Use of the Digital Object Architecture and ITU-T Recommendation X.1255 Robert E. Kahn President & CEO CNRI,
End-to-End Efficiency (E 3 ) Integrated Project of the EC 7 th Framework Programme E 3 WP5 Objectives E 3 WP5 Structure and Research Challenges
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
NIST Standards Education Dynamic Spectrum Access Standards Martin BH Weiss School of Information Sciences University of Pittsburgh
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Wireless Networks Breakout Session Summary September 21, 2012.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
IEEE SCC41 PARs Dr. Rashid A. Saeed. 2 SCC41 Standards Project Acceptance Criteria 1. Broad market application  Each SCC41 (P1900 series) standard shall.
DOCUMENT #:GSC15-GRSC8-08 FOR:Presentation SOURCE:ETSI AGENDA ITEM:GRSC8 4.3 CONTACT(S):Markus Mueck, TC RRS Chair Reconfigurable Radio Systems (RRS) Presenter:
Doc.: IEEE /0590-r0 Submission May 2008 RR, ConnexisSlide 1 TC204 WG16 Status Update Date: Authors:
A new challenge – creating a regulatory environment for implementing geo-location databases for White Space Devices (WSD) Andy Gowans Date (26 th January.
Doc.: IEEE /063 Submission May 2000 Y. Kuchiki, M. Ikeda Seiko Epson Corp. Slide 1 Yutaku Kuchiki, Masayuki Ikeda Seiko Epson Corporation May.
Life cycle services for automation products
Doc.: IEEE /139r4 Submission November 2011 M. Azizur Rahman (NICT)Slide 1 Response to Comments on P802.22b PAR and 5C Date: Authors:
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
Doc.: IEEE /??r0 TG4a PresentationSlide 0 Ultra Wideband in Europe The final few regulatory processes May 2006.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Public procurement of innovation
ETIP SNET WG4 : Digital Energy
Suggestion for Summarizing Process of the Principles
Device Security in Cognitive Radio
Data and database administration
Reconfigurable Radio Systems (RRS)
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
OICA input on software updates to UN TF CS/OTA
Francisco da Silva, Senior Councillor, Huawei
CJIS Security Policy Version 5.4, 10/06/2015
Reconfigurable Radio Systems Activities in ETSI
A New Era in Critical Communications
Control system network security issues and recommendations
Wireless Local Area Network (WLAN)
World-Leading Research with Real-World Impact!
Update – Reconfigurable Radio Systems
TGai Guideline for Submissions to TGai Template Slides
Unit 27: Network Operating Systems
Mobile edge computing Report by Weiqing huang.
Overview of CV2X Requirements
Glenn Parsons, GTSC-9 Chair, ISACC
ETSI TC RRS (Reconfigurable Radio Systems)
Network management system
Use Cases for Light Communications
PLUG-N-HARVEST ID: H2020-EU
January, 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Early Stage Requirements Discussions ]
Uplink Broadcast Service
Chapter 27 Security Engineering
Cryptography and Network Security
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [PAR and CSD document discussion] Date Submitted:
How to Mitigate the Consequences What are the Countermeasures?
Privacy Recommendation PAR Proposal
Software Interoperability.... Same game, same rules?
Francisco da Silva, Senior Councillor, Huawei
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [PAR and CSD document discussion] Date Submitted:
ETSI Technical Committee TCCE
IEEE RR-TAG Teleconference Plan and Agenda
Fast Session Transfer Session Setup in TVWS
ETSI TC RRS (Reconfigurable Radio Systems)
Requirements Date: Authors: March 2010 Month Year
Security in SDR & cognitive radio
Fast Session Transfer Session Setup in TVWS
CLASSROOM PROJECTION SYSTEM
doc.: IEEE <doc#>
ETSI Contribution to 3rd Meeting of EC Expert Group on RRS
Security Ad-Hoc Report Draft
Glenn Parsons, GTSC-9 Chair, ISACC
Chapter 10. Mobile Device Security
Jarno Pinola VTT Technical Research Centre of Finland
Microsoft Virtual Academy
Presentation transcript:

ETSI Software Reconfiguration Overview Date: 2017-07-11 Authors: Name Affiliations Address Phone email Markus Mueck INTEL Am Campeon 10-12, 85579 Neubiberg, Germany +49-89-99885363149 Markus.Dominik.Mueck@intel.com Bahareh Sadeghi 2111 NE 25th Ave Hillsboro, OR 97124 USA +1-503-803-2471 Bahareh.Sadeghi@intel.com

Overview Motivation ETSI Software Reconfiguration Solution Conclusion Month Year doc.: IEEE 802.11-yy/xxxxr0 Overview Motivation ETSI Software Reconfiguration Solution Conclusion John Doe, Some Company

Month Year doc.: IEEE 802.11-yy/xxxxr0 Motivation Softwarization and Virtualization are currently a network topic Virtualization such as Network Function Virtualization Software Defined Networking Mobile Edge Computing Etc. Observation: A similar discussion is not (yet) ongoing for the client (terminal) side Questions: Are there client-centric use cases for which Software Reconfigurability may provide added value? Why did it not work out in the past? Which are critical design requirements and existing solutions? John Doe, Some Company

Use Cases ETSI is issuing a “Software Reconfiguration White Paper” focusing on three Use Cases: Automotive applications Challenge: Lifetime of communication components is substantially longer (> 10 yrs) compared to Smartphones (~ 2 yrs), etc. Requirement: How to resolve vulnerabilities which may come up over the lifetime of a vehicle (>10 years) IoT Challenge: A substantial number of different IoT applications exist, it is challenging to provide a dedicated chipset solution for each case. Requirement: How to enable a generic chipset platform to be tailored to a specific IoT application through SW Reconfiguration?

Use Cases Mass Market „Smartphones“ and similar Challenge: Smartphone Apps are not able to alter radio characteristics of a client device due to certification issues, etc. Requirement: To define an ecosystem (comprising technical, security and regulation solutions) to extend the existing „App“ eco-system to „Radio-Apps“ which are apple to (selectively) alter radio parameters.

Why did Software Reconfiguration fail in the past for commercial mass-market devices? Efficiency Past approaches were mainly building on a “middle-ware” approach In commercial mass market products, however, the main source for efficiency lies in the joint optimization of HW/SW. A middle-ware limiting designers with respect to power efficient solutions. Conclusion: The ETSI approach allows for code portability while maintaining joint HW/SW optimization through a „Radio Virtual Machine (RVM)“ approach. Gradual transition towards SW Reconfiguration Past approaches were requiring a „too big step“ from manufacturers, moving from ASIC solutions to full SW implementations Conclusion: The ETSI approach allows for a gradual approach, e.g. replacing ASIC component in case of vulnerabilities being identified.

Gradual Reconfiguration Approach EN 303 146-4: Radio Programming Interface

The ETSI SW Reconfiguration Eco-System EN 303 095: Software Reconfiguration Architecture

SW Reconfiguration – Efficiency through Radio Virtual Machine approach, EN 303 146-1/2/3/4

Interfaces defined by ETSI Interfaces are defined in EN 303 146-1/2/3/4 Radio Programming Interface (RPI) Multiradio Interface (MURI) Administrative Services Access Control Services Data Flow Services Unified Radio Application Interface (URAI) Radio Application Management Services User Data Flow Services Multiradio Control Services Reconfigurable RF Interface (RRFI) Spectrum Control Services Power Control Services Antenna Management Services Tx/Rx Chain Control Services RVM Protection Services

Certification Approach ETSI TR 102 967: Following discussions with regulation administrations, the approach is to have a single responsible entity (“Conformity Contact Entity”) for the combination of HW and SW

Security Solutions Security mechanisms defined in ETSI TR103 087, TS103 487 Proof of the integrity of the Radio Applications, RE Configuration Policy and Declaration of Conformity; Proof of the identity of the developer of Radio Applications, the issuer of the RE Configuration Policy, and the issuer of the Declaration of Conformity; Prevention of an asset installation when the asset is not provided by a legitimate actor; Use of the reconfiguration feature as a security update mechanism; Proof of conformance of the radio platform and radio application to the regulatory Declaration of Conformity, considering that the set of installed radio applications can change over time; Prevention of illegitimate use of the Declaration of Conformity (in particular against counterfeit);

Security Solutions Security mechanisms defined in ETSI TR103 087, TS103 487 Audit functionalities including a non-repudiation framework and remote attestation; Long-term management framework (e.g., transition of equipment responsibility from one manufacturer to another); Prevention of masquerade of stakeholders in the RRS value chain; Prevention of code theft; and, Supply chain integrity and assurance (which underpins all of the above measures).

Conclusion ETSI EN 303 095 and EN 303 146-1/2/3/4 provide a framework for Software Reconfiguration including technical, security and regulation solutions New Working Items have been agreed at last ETSI RRS meeting to extend the solution to Wireless Equipment in general In Europe, the European Commission is in the process of setting up an „Expert Group“ for implementing articles 3(3)(i) and 4 of the Radio Equipment Directive (RED) related to Software Reconfiguration The ETSI SW Reconfiguration Framework may be applied to any type of wireless technology client devices and client technology – it may thus support IEEE 802.11 equipment over its lifetime.

References [1] ETSI EN 302 969 V1.2.1 (2014-11), Reconfigurable Radio Systems (RRS); Radio Reconfiguration related Requirements for Mobile Devices [2] ETSI EN 303 095 V1.2.1 (2015-06), Reconfigurable Radio Systems (RRS); Radio Reconfiguration related Architecture for Mobile Devices [3] ETSI EN 303 146-1 V1.2.1 (2015-11), Reconfigurable Radio Systems (RRS); Mobile Device Information Models and Protocols; Part 1: Multiradio Interface (MURI) [4] ETSI EN 303 146-2 V1.2.1 (2016-06), Reconfigurable Radio Systems (RRS); Mobile Device (MD) information models and protocols; Part 2: Reconfigurable Radio Frequency Interface (RRFI) [5] ETSI EN 303 146-3 V1.2.1 (2016-08), Reconfigurable Radio Systems (RRS); Mobile Device (MD) information models and protocols; Part 3: Unified Radio Application Interface (URAI)

References [6] ETSI EN 303 146-4, to appear, Reconfigurable Radio Systems (RRS); Mobile Device (MD) information models and protocols; Part 4: Radio Programming Interface (RPI) [7] ETSI TR 103 087 V1.1.1 (2016-06); Reconfigurable Radio Systems (RRS); Security related use cases and threats in Reconfigurable Radio Systems [8] ETSI TS 103 436 V1.1.1 (2016-08); Reconfigurable Radio Systems (RRS); Security requirements for reconfigurable radios [9] ETSI TR 102 967: Reconfigurable Radio Systems (RRS); Use cases for dynamic equipment reconfiguration, V1.2.1, 2015