IEEE MEDIA INDEPENDENT HANDOVER

Slides:



Advertisements
Similar presentations
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: LB1c-handover-issues.ppt Title: MIH Security – What is it? Date Submitted:
Advertisements

xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: LB1c-handover-issues.ppt Title: MIH Security – What is it? Date Submitted:
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIIS and Its Higher Layer Transport Requirements: Ad hoc Update and Discussion on.
IEEE MEDIA INDEPENDENT HANDOVER Title: An Architecture for Security Optimization During Handovers Date Submitted: September,
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Subscription ID Scope Date Submitted: June, 14 th, 2007 Presented.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Message Flow Date Submitted: March 1, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
Doc.: IEEE /0310r0 Submission Sept 2007 Srinivas Sreemanthula Slide 1 IEEE MEDIA INDEPENDENT HANDOVER DCN: MIH-Security-Options.ppt.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Capability Discovery Amendment Date Submitted: April 20, 2006.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Handover Initiation Strategy Consistency Date Submitted: November,
IEEE MEDIA INDEPENDENT HANDOVER DCN: bcst Title: Overview of Draft P802.21b/D0.01 Date Submitted: May 11, 2010 Presented at IEEE
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: bcast
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Date Submitted: June 2nd, 2008 Radio States
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Group management in MIHF Date Submitted: November 4, 2011 Presented at IEEE session #47 in Atlanta.
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho Title: Missing Gaps Related with MGW Date Submitted: June 13, 2012 Presented at IEEE c.
IEEE MEDIA INDEPENDENT HANDOVER DCN: mugm
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0102-00-0sec Title: Use Cases for MIH Services and MIH Protocol Threats Date Submitted: April 02, 2008 Presented at Security Study Group Teleconference on April 02, 2008 Authors or Source(s):   Shubhranshu Singh (Samsung) Marc Meylemans (Intel), Subir Das (Telcordia Technologies) Abstract: This document provides some deployment scenarios of MIH services and discusses the common security threats of MIH Protocol

IEEE 802.21 presentation release statements This document has been prepared to assist the IEEE 802.21 Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.21. The contributor is familiar with IEEE patent policy, as stated in Section 6 of the IEEE-SA Standards Board bylaws <http://standards.ieee.org/guides/bylaws/sect6-7.html#6> and in Understanding Patent Issues During IEEE Standards Development http://standards.ieee.org/board/pat/faq.pdf> 

Deployment Scenarios (1/4) Scenario 1: MN is in the home network and the MIH services (e.g., IS, ES, CS) are provided by the home network. hPoS Core Network PoA Home Network Access Network Note: This and the following scenarios assumes PoA and PoS are separate entities however in some specific cases they might be co-located. We’ll address issues involved in such cases separately. Mobile Node

Deployment Scenarios (2/4) Scenario2: MN is in the visited network and MIH services are provided by the home network hPoS Home Network PoA Visited Network Mobile Node

Deployment Scenarios (3/4) Scenario3: MN is in the visited network and MIH services are also provided by the visited network. There is a relationship between home and visited networks hPoS Home Network vPoS PoA Visited Network Mobile Node

Deployment Scenarios (4/4) Scenario4: MN is in the visited or Home network and MIH services are provided by 3rd Party network. PoS 3rd Party Network PoA Home or Visited Network Mobile Node

What are the Issues? How to secure MIH Protocol message exchange? How to secure the access to MIH services? How to secure discovery of MIHF network entity?

What are the Common Threats? Message Modification Message Hijacking/Replay False Identity of MIHF Denial of Service No MIH Service Access Control False Network MIHF Entity Information

Message Modification Issues Some intermediate node may be capable of snooping, altering and forwarding the MIH packets IE in Information services could be altered in Request or Response messages MIH events can be modified e.g., to change threshold values or even event ids and parameters Commands such as, Handover-candidate response or Handover-commit from MN or network could be modified to affect handover (packets buffered/rerouted) Having means for data protection (integrity and encryption) between source and target MIHFs at underlying layer can mitigate this security threat

Hijacking/Replay Issues An ongoing session with one MIHF can be hijacked while providing the response or future packets from a different MIHF node A certain event or command can be stored from one session and replayed later to the same node Having means to verify the authenticity of the peer MIHF’s packet can mitigate this security threat

False Identity of MIHF Any node can provide an MIHF ID to gain access to the network MIHF entity Service Request or Response messages can be generated with any known/expired MIHF ID for which the service is not authorized or allowed MIH events can be send to change threshold values or other parameters MIH Commands such as, Handover-candidate response or Handover-commit can be send to affect handover Having means for data origin authentication from the source MIHF can mitigate this security threat

Denial of Service Issues MIH events or commands can be originated by spoofing the MIHF ID Spoofing can be done as either a mobile node or a network entity that has the MIHF Any event or command can be triggered falsely to affect the network selection and handover e.g., Link-Going-Down, Link-Down and Handover-commit Having means to verify the authenticity of the MN MIHF ID or network entity that has the MIHF can mitigate this security threat

MIH Access Control Issues MIH access control is what MIH services the users can receive Operator may apply subscription profile to the user for customization (e.g, may be linked with MIHF ID) User can only use certain access technologies or can only query about certain access technologies Various roaming plans or information may be available depending on subscription profile Having means for authenticating MIHF ID can mitigate this security threat

False Network MIHF Entity Information This is a discovery issue IEEE 802.21 defines MIH Function discovery at layer 2 and IETF defines at higher layers Discovery without proper security may lead to finding MIHF that may not be trustworthy L2 broadcast discovery is a good example, any entity can respond that it is MIH Function capable Our scope should be limited to L2 discovery We can not work on something that we have not defined Having means to protect information at lower layer can mitigate this security threat. If it uses management plane before association (e.g. 802.11) nothing much we can do

What is Available/Recommended In all scenarios: Either Media Specific transport (e.g. L2) or Media independent transport (e.g., L3 and above) Media Specific Transport (e.g., MN  PoA) Security is provided by the link layers (except management plane, e.g., 802.11) Media Independent Transport (e.g., MN  PoA or PoA  PoS) Use IPsec, TLS, DTLS

Next Steps? Update TR to reflect the agreed upon deployment scenarios Perform threat analysis for the agreed upon deployment scenarios and capture them in the TR In particular, capture the threats and assumptions specific to deployment scenarios Based on the threat analysis, discuss/decide what is already available and what is specific to MIH Protocol