HTTP Enabled Location Delivery (HELD)

Slides:



Advertisements
Similar presentations
HTTP Dereference (draft-winterbottom-geopriv-deref-protocol-00) IETF-71 Philadelphia, March 2008 James Winterbottom Hannes Tschofenig Henning Schulzrinne.
Advertisements

Trust Router. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any.
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
Origins of ECRIT IETF has been working on location since 2000 –Spatial BoF, eventually GEOPRIV chartered in 2001 GEOPRIV provides location information.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIIS and Its Higher Layer Transport Requirements: Ad hoc Update and Discussion on.
HELD-02 James Winterbottom. What is HELD? HELD is an application layer location acquisition protocol Designed to provide location in the form of a PIDF-LO.
HELD Location Acquisition Solution James Winterbottom Andrew Corporation March 2007.
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
Meng Yan. Introduction In fact, your online actions may be monitored by unauthorized parties logged and preserved for future access years later.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
Scalability of Geopriv LS GLI Project Toshiharu Kurisu Yasuhito Watanabe
Doc.: IEEE /0xxxr0 Submission March, 2007 Gabor/SriniSlide 1 Joint TGu : Location Configuration for Emergency Services Notice: This document.
August 2, 2005 IETF 63 – Paris, France Media Independent Handover Services and Interoperability Ajay Rajkumar Chair, IEEE WG.
MODERN BoF Managing, Ordering, Distributing, Exposing, and Registering telephone Numbers IETF 92.
K. Salah1 Security Protocols in the Internet IPSec.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: MIH security issues Date Submitted: July, 02, 2007 Presented at.
PAWS Framework draft-lei-paws-framework-datamodel-00
IPSecurity.
End-to-middle Security in SIP
Authenticated Identity
Open issues with PANA Protocol
Phil Hunt, Hannes Tschofenig
Joint TGu : Location Configuration for Emergency Services
J.W. Atwood PIM WG 2010/03/23 The KARP Working Group J.W. Atwood PIM WG 2010/03/23
Trust Anchor Management Problem Statement
Telecommunications Industry Association TR L
Updated SBSP draft-birrane-dtn-sbsp-01.txt Edward Birrane
ECRIT Interim: SIP Location Conveyance
RPSEC WG Issues with Routing Protocols security mechanisms
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
Carrying Location Objects in RADIUS
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx
Location Configuration at Layer 7
ERP extension for EAP Early-authentication Protocol (EEP)
Integrating the Healthcare Enterprise
Session Initiation Protocol (SIP)
S/MIME T ANANDHAN.
draft-ietf-geopriv-lbyr-requirements-02 status update
The Tunneled Extensible Authentication Method (TEAM)
March 2012 doc.: IEEE March 2012 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Security in ebXML Messaging
draft-ipdvb-sec-01.txt ULE Security Requirements
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
January doc.: IEEE xx/xxxx January 2006
IEEE MEDIA INDEPENDENT HANDOVER
Geolocation Privacy Hannes Tschofenig International Working Group on
Chinese wall model in the internet Environment
IEEE MEDIA INDEPENDENT HANDOVER DCN:
PW security measures PWE3 – 65th IETF 21 March 2005 Yaakov (J) Stein.
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Tero Kivinen, AuthenTec
Authenticated Validity for M2M devices
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Electronic Payment Security Technologies
Tero Kivinen, AuthenTec
draft-ietf-dtn-bpsec-06
IETF80.
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

HTTP Enabled Location Delivery (HELD) draft-winterbottom-http-location-delivery-01 J. Winterbottom, M. Thomson, M. Dawson IETF-63 19/09/2018

Rationale Location information (LI) belongs to a specific IP device (Target) LI is an access network service A LS servicing an access network is able to determine LI for an IP device Serve location information: directly to the Target to location recipients using a location URI The point to note here is the clear delineation of responsibility – an access provider is responsible for providing location information. A device may assist in that, but the access provider is ultimately answerable. The access provider is in a unique position to be able to determine location information. Location URI IETF-63 19/09/2018

Application layer protocol Preserve PIDF-LO format Extensions do not affect the HELD payload Traverses routers and NAT Reliant only on the presence of IP Common location request protocol Type of access network has no effect Application layer security TLS with encryption and authentication TLS satisfies Req. 4 (transmission security), 5 (key establishment), 13 (authentication – in combination with OCSP) and 14 (auth, integrity, confidentiality, replay protection – although this statement applies to the LO directly). Location URI IETF-63 19/09/2018

Privacy LI is associated with a device, not a user Unlinked pseudonyms for the device LI can be granted without identity information Target provides a ruleset for LR requests to the LS Based on common policy – flexible The target may also specify what rules are included in served PIDF-LO documents We can’t determine where a person is based on the location of an antenna or device that they own. Also, think about the model used for location within current phone networks – the phone number is used as the identifier, not the name of the owner of the phone. The rules are associated with a device session and are not revealed to the LR. The identity of the rule creator isn’t necessarily revealed, even to the LS. Point 1.1 – unlinked pseudonyms satisfy Req. 12 Point 2 – Req. 7 Point 2.2 – the target specifies two sets of rules: the viewer rules (part of the PIDF-LO template – the subset of rules specified in Req. 9 of RFC 3693) and the LG/LS rules (the full ruleset). Location URI IETF-63 19/09/2018

Basic request HTTP GET to retrieve LI HTTP POST with parameters PIDF-LO – provide own location Ruleset – by-value or by-reference Specify the type of location or request location by-reference Set a limit on response time Location URI IETF-63 19/09/2018

Location update Target publishes location update URI A target may use GNSS in a similar fashion. Target publishes location update URI LS serves a request from LR LS contacts target through update URI, which initiates positioning in cellular network to determine LI Location URI IETF-63 19/09/2018

“On Behalf Of” An entity that requests as if it were the target device Acknowledgement that not all devices are able to determine or request LI Enables delivery of services based on location for all devices Emergency calls Trust arrangement is either mandated by regulations, or as part of a contract OBO will be for special cases only. Location URI IETF-63 19/09/2018

Discussion