January 2006 doc.: IEEE xx/xxxx January 2006

Slides:



Advertisements
Similar presentations
LB84 General AdHoc Group Sept. Closing TGn Motions
Advertisements

LB84 General AdHoc Group Sept. Closing TGn Motions
[ Interim Meetings 2006] Date: Authors: July 2005
Motions Date: Authors: January 2006
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
TGu Closing Report Date: Authors: November 2005
March 2014 Election Results
TGp Closing Report Date: Authors: July 2007 Month Year
Attendance and Documentation for the March 2007 Plenary
3GPP Extended Date: Authors: July 2005 July 2005
[ Policies and Procedure Summary]
[ Policies and Procedure Summary]
3GPP liaison report May 2006 May 2006 Date: Authors:
Motion to accept Draft p 2.0
Protected SSIDs Date: Authors: March 2005 March 2005
3GPP liaison report July 2006
[place presentation subject title text here]
Motions Date: Authors: January 2006
TGp Motions Date: Authors: November 2005 Month Year
TGp Closing Report Date: Authors: March 2006 Month Year
Emergency Call Motion Date: Authors: January 2006
TGu-changes-from-d0-02-to-d0-03
TGp Closing Report Date: Authors: May 2007 Month Year
Contribution on Location Privacy
TGu Motions Date: Authors: September 2006 September 2006
TGu Closing Report Date: Authors: July 2006 July 2006
R8E4 and XML Date: January 12th 2006 Authors: January 2006
TGp Closing Report Date: Authors: March 2006 Month Year
Reflector Tutorial Date: Authors: July 2006 Month Year
TGv Redline D0.07 Insert and Deletion
TGv Redline D0.06 Insert and Deletion
TGu Closing Report Date: Authors: September 2005
Current TISPAN and 3GPP work on Emergency Calls
ADS Study Group Mid-week Report
TGu-changes-from-d0-01-to-d0-02
LB73 Noise and Location Categories
IEEE “ Requirements” Date: Authors:
TGy draft 2.0 with changebars from draft 1.0
TGv Redline D0.10 Insert and Deletion
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Redline of draft P802.11w D2.2 Date: Authors:
TGr Proposed Draft Revision Notice
TGu-changes-from-d0-02-to-d0-03
[ Policies and Procedure Summary]
3GPP2 Liaison Report Date: Authors: May 2006 May 2006
May 2005 CAPWAP AHC Closing Report
Liaison Report From Date: Authors: Month Year
Beamforming and Link Adaptation Motions
[ Policies and Procedure Summary]
Beam Ad Hoc Agenda Date: Authors: March 2007 March 2007
TGu Closing Report Date: Authors: January 2006 January 2006
Draft P802.11s D1.03 WordConversion
Questions to the Contention-based Protocol (CBP) Study Group
January Opening Report
TGu-changes-from-d0-04-to-d0-05
for video transmission, Status
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
TGu-changes-from-d0-03-to-d0-04
TGu Motions Date: Authors: May 2006 May 2006
WNG SC Closing Report Date: Authors: November 2005
3gpp2-liaison-report-november-2005
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Use of KCK for TGr Management Frame Protection
Use of KCK for TGr Management Frame Protection
TGu Motions Date: Authors: September 2006 September 2006
TGr Proposed Draft Revision Notice
WNG SC Closing Report Date: Authors: July 2006 July 2006
TGp Motions Date: Authors: January 2006 Month Year
Presentation transcript:

January 2006 doc.: IEEE 802.11-xx/xxxx January 2006 SIP based Fixed Mobile Convergence (FMC) – A Security Analysis framework Date: 2006-01-16 Authors: Notice: This document has been prepared to assist IEEE 802.11. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.11. Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures <http:// ieee802.org/guides/bylaws/sb-bylaws.pdf>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <stuart.kerry@philips.com> as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 802.11 Working Group. If you have questions, contact the IEEE Patent Committee Administrator at <patcom@ieee.org>. Colin Blanchard, BT Group Colin Blanchard, BT Group

January 2006 doc.: IEEE 802.11-xx/xxxx January 2006 Abstract Security for UMA based Fixed Mobile Convergence (FMC) is specified in 3GPP TS 43.318 "Generic Access to the A/Gb interface, but security for SIP based FMC still under consideration and will be driven by maximising reuse of existing mechanisms and the need for “seamless” handover. The mechanisms common to more than one standard and those that are unique to what needs to be protected, need to be analysed. Security for SIP based FMC needs to take such an analysis into account. It is proposed that IEEE 802.11u considers the need for such an analysis and which group would be best placed to complete it. Colin Blanchard, BT Group Colin Blanchard, BT Group

Current standardisation status January 2006 Current standardisation status Security for UMA based FMC specified in 3GPP TS 43.318 "Generic Access to the A/Gb interface; Stage 2 http://www.3gpp.org/ftp/Specs/archive/43_series/43.318/43318-200.zip Security for SIP based FMC still under consideration http://docbox.etsi.org/tispan/tispan/50-20051128-Sophia_P9/09TD298%20FMCA.zip Colin Blanchard, BT Group

SIP based FMC Security Likely to be driven by January 2006 SIP based FMC Security Likely to be driven by Reuse of existing mechanisms defined by the standards development organisation responsible for the components (WLAN AP, IMS platform) that make up the design ( IEEE, IETF, 3GPP, TISPAN) The need for “seamless” handover You know that you have changed networks by explicit notification e.g. billing and NOT by a dropped session Colin Blanchard, BT Group

Required Security Features January 2006 Required Security Features Authentication and Key agreement- Link Layer Authentication and Key agreement – Network layer User Identity/location Privacy- link Layer User Identity/location Privacy- Network Layer Traffic Integrity and confidentiality protection – Link layer (user plane, control plane) Traffic Integrity and confidentiality protection – Network Layer (user plane, control plane) Colin Blanchard, BT Group

Reuse of existing mechanisms January 2006 Reuse of existing mechanisms Many mechanisms are common to more than one standard Others are unique to what needs to be protected and, for example, the position in a protocol stack Some may require modification for more general applicability A preliminary analysis is summarised in the following tables: Colin Blanchard, BT Group

1 Authentication and Key agreement mechanisms - Link Layer January 2006 1 Authentication and Key agreement mechanisms - Link Layer UMA FMC 3GPP WLAN IMS TISPAN NAS SIP FMC 3GPP AKA Not required ? EAP-AKA  EAP-SIM End user certificate Network certificate Colin Blanchard, BT Group

2 Authentication and Key agreement mechanisms – Network Layer January 2006 2 Authentication and Key agreement mechanisms – Network Layer UMA 3GPP WLAN IMS TISPAN NAS SIP FMC 3GPP AKA Not required  ? EAP-AKA EAP-SIM End user certificate Network certificate Colin Blanchard, BT Group

3 User Identity/location Privacy mechanisms - link Layer January 2006 3 User Identity/location Privacy mechanisms - link Layer UMA 3GPP WLAN IMS TISPAN NAS SIP FMC Temp id  X ? Encrypted Colin Blanchard, BT Group

4 User Identity/location Privacy mechanisms – Network layer January 2006 4 User Identity/location Privacy mechanisms – Network layer UMA 3GPP WLAN IMS TISPAN NAS SIP FMC Temp id  X ? Encrypted Colin Blanchard, BT Group

January 2006 5 Traffic Integrity and confidentiality protection mechanisms – Link layer UMA 3GPP WLAN IMS TISPAN NAS SIP FMC WEP  Not required ? WPA WPA2 IPSec TLS * Don’t care - Treat as “black box” and just provide the key Colin Blanchard, BT Group

January 2006 6 Traffic Integrity and confidentiality protection mechanisms – Network Layer UMA 3GPP WLAN IMS TISPAN NAS SIP FMC WEP Not required ? WPA WPA2 IPSec  TLS X FFS Colin Blanchard, BT Group

Modification for more general applicability January 2006 Modification for more general applicability Control only or user plane protection Emphasis often on control plane Location of security termination points GANG, P-CSCF, PDG QoS Management within IPsec Tunnels Far end NAT transversal Colin Blanchard, BT Group

Summary and Proposal A complete analysis will be required January 2006 Summary and Proposal A complete analysis will be required Security for SIP based FMC needs to take such an analysis into account It is proposed that IEEE 802.11u considers the need for such an analysis and which group would be best placed to complete it Colin Blanchard, BT Group