Security Req. related to Authentication

Slides:



Advertisements
Similar presentations
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Advertisements

Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Doc.: IEEE /688r0 Submission September 2003 Stephen McCann, Siemens Roke ManorSlide 1 Interworking Update II Stephen McCann, Siemens Roke Manor.
Doc.: IEEE /xxxr0 Submission May 2004 Stephen McCann, Siemens Roke ManorSlide 1 IEEE Wireless Interworking with External Networks (WIEN)
Doc.: IEEE /229r0 Submission Tan Pek-Yew, Panasonic Slide 1 March 2003 Interworking – QoS and Authorization Tan Pek Yew & Cheng Hong Panasonic.
Submission doc.: IEEE wng May 2013 Max Riegel, NSNSlide 1 IEEE Accounting Extensions Date: Authors:
IEEE P802 Handoff ECSG Submission November 2003 Stephen McCann, Siemens Roke ManorSlide 1 WLAN – Cellular Interworking Stephen McCann, Siemens Roke Manor.
Doc.: IEEE /223r0 Submission March 2004 Eleanor Hepworth, Siemens Roke ManorSlide 1 Interworking Requirements Eleanor Hepworth Siemens Roke Manor.
Doc.: IEEE /557r0 Submission September 2002 Haslestad, Tan, Aramaki, McCannSlide 1 Wireless Interworking Group Overview and WLAN-3G Interworking.
Doc.: IEEE /209r0 Submission 1 March GPP SA2Slide 1 3GPP System – WLAN Interworking Principles and Status From 3GPP SA2 Presented.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
Doc.: IEEE /0690r0 Submission Andrew Myers, BT Slide 1 July GPP SA3 Interworking Security Issues II Andrew Myers British Telecommunications.
Doc.: IEEE /827r0 Submission November 2003 Eleanor Hepworth, Siemens Roke ManorSlide 1 Co-existence of Different Authentication Models Eleanor.
Doc.: IEEE /006r0 Submission January 2003 Stephen McCann, Siemens Roke ManorSlide 1 WNG – WIG update IEEE & WIG –What is this about ? –Intended.
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
September 2004 Extending MAC Management operation for external networks information advertisement to the AP using L 2.5
Month Year doc.: IEEE yy/xxxxr0 May 2012
Proposed SFD Text for ai Link Setup Procedure
Interworking Study Group Justification
Discussions on FILS Authentication
doc.: IEEE /xxxr0 Mike Moreton
Network Selection Issues
Issues of MAC Management Security
Wireless LAN Security 4.3 Wireless LAN Security.
FCC TVWS Terminology Date: Authors: Month Year Month Year
Stephen McCann, Siemens Roke Manor
Stephen McCann, Siemens Roke Manor
WLAN Mesh in CAPWAP Architecture
European 6th Framework Update
MAC Address Hijacking Problem
Extra MIC for use in Public Access WLAN
IETF Draft on Network Discovery and Selection Problem Overview
Technical Requirements for IEEE ESS Mesh Networks
Security issues in public access WLAN architectures
Mutual Authentication
An Example Protocol for FastAKM
Beacon Response Proposal
Stephen McCann, Siemens Roke Manor
Month 2002 doc.: IEEE /xxxr0 September 2004 Motion
3GPP2-WLAN Interworking update
Stefan Rommer, Mats Näslund, András Méhes (Ericsson)
Considerations about Network Selection
Requirements for Network Selection
Stephen McCann, Siemens Roke Manor
WIEN Study Group Proposed Roadmap
WLAN Mesh in CAPWAP Architecture
Stephen McCann, Siemens Roke Manor
IEEE Liaison to CableLabs
Stephen McCann, Siemens Roke Manor
Stephen McCann, Siemens Roke Manor
Mutual Authentication
Security for Measurement Requests and Information
Tentative Association May 12, 2004
RRM and WLAN-WWAN handovers
Wireless Access Points
DLP & Security March 2003 Month 2002 doc.: IEEE /xxxr0
Duncan Kitchin Intel Wireless LAN Operation
IETF Network Discovery and Selection Overview
WME+ / Fasttrack Differences
A Joint Proposal for Security
Interworking Agenda and Work Items
Interworking Update II
Tge Request to ANA Srinivas Kandala Sharp Labs of America, Inc.
Stephen McCann, Siemens Roke Manor
Stephen McCann, Siemens Roke Manor
Month Year doc.: IEEE yy/xxxxr0 May 2012
3GPP2-WLAN Interworking update
On ESS Mesh Device Discovery
Lecture 36.
Presentation transcript:

Security Req. related to Authentication September 2002 Security Req. related to Authentication It shall be possible to prevent intruders from obtaining unauthorised access to the network by masquerading as authorised users. It shall be possible for network providers to authenticate users at any time, such as when the user first enters the network and while the user is using the network It shall be possible for the network to authenticate the origin of user traffic, signalling data and control data It shall be possible to ensure the origin, integrity and freshness of authentication data, particularly of the cipher key. It shall be possible for the user to challenge the identity of the visited network to which they are attached. It shall be possible for the user to challenge the identity of the home network to which they are attached. It shall be possible for a user to continue to authenticate via the home network Siemens Roke Manor

H Authentication stacks January 2002 doc.: IEEE 802.11-02/xxxr0 September 2002 H Authentication stacks Siemens Roke Manor John Doe, His Company

HL2/HiSWANa WLAN AN Service providers net 802.11i September 2002 GST/EAPoH EAP EAP Method EAP EAP Method Diameter IETF Transport GST/EAPoH EAP Diameter IETF Transport HL2/HiSWANa DLC/RLC DLC/RLC Phy Phy WLAN AN Service providers net AP MT 802.11 Phy 802.11 MAC 802.1x/EAPoL EAP EAP Method EAP EAP Method Radius IETF Transport 802.11 Phy 802.11 MAC 802.1x/EAPoL EAP Radius IETF Transport 802.11i Siemens Roke Manor

MT AP AAA HSS/ HLR HL-3G 802.11i RBCH_Association MAC ID Assignment September 2002 MT AP AAA HSS/ HLR RBCH_Association MAC ID Assignment Link Capability Encryption Startup Identity Exchange - EAP LC & ES Validation EAP Method /Challenge Association Link Capability /ID Assignment EAP Method /Response EAP Method /Success/Failure Re-keying HL-3G 802.11i EAP Method /Response EAP Method /Success/Failure Siemens Roke Manor

H Link Capability Exchange January 2002 doc.: IEEE 802.11-02/xxxr0 September 2002 H Link Capability Exchange Siemens Roke Manor John Doe, His Company

H Encryption Start Up January 2002 doc.: IEEE 802.11-02/xxxr0 September 2002 H Encryption Start Up Siemens Roke Manor John Doe, His Company

H Link Capability Negotiation and Encryption Startup Validation January 2002 doc.: IEEE 802.11-02/xxxr0 September 2002 H Link Capability Negotiation and Encryption Startup Validation Siemens Roke Manor John Doe, His Company

H EAP Identity Request January 2002 doc.: IEEE 802.11-02/xxxr0 September 2002 H EAP Identity Request Siemens Roke Manor John Doe, His Company