Privacy Recommendation PAR Proposal

Slides:



Advertisements
Similar presentations
ECMP for 802.1Qxx Proposal for PAR and 5 Criteria Version 2 16 people from ECMP ad-hoc committee.
Advertisements

Submission doc.: IEEE Comment #1 from WG Comment: In Section 5.2.b two examples of spectrum resource measurements are given: PER and.
CSD for P802.1AS-REV WG Wednesday, 05 November 2014.
IEEE 802.1ABrev Extension for Auto Attach Nigel Bragg Dan Romascanu Paul Unbehagen.
Privecsg Tracking of Link Layer Identifiers Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
PAR and CSD for P802.1Qxx WG January PAR (1) 1.1 Project Number: P802.1Qxx 1.2 Type of Document: Standard 1.3 Life Cycle: Full Use 2.1 Title:
Doc.: IEEE /0684r0 Submission November 2005 Erik Schylander, PhilipsSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Standardization of Mobile Wireless Small Cell Backhaul (SCB) Document Number: IEEE r Date Submitted: Source: Junhyeong.
Page 1 IEEE Ethernet Working Group - CSD Version 2.3 Items required by the IEEE 802 CSD are shown in Black text, supplementary items required by.
Privecsg ‹#› IEEE 802 Privacy concerns about 802c PAR Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZunigaInterDigital.
CSD for P802.1Qcj WG January Project process requirements Managed objects – Describe the plan for developing a definition of managed objects.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
1 Recommendations Now that 40 GbE has been adopted as part of the 802.3ba Task Force, there is a need to consider inter-switch links applications at 40.
1 6/3/2003 IEEE Link Security Study Group, June 2003, Ottawa, Canada Secure Frame Format PAR: 5 Criteria.
Privecsg Tracking of Link Layer Identifiers Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
IEEE mban SubmissionSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:Resolution.
1 privecsg Privacy EC SG Update to NGP SG Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
1 IEEE interim, Orlando, Florida, March, 2008new-nfinn-fast-chains-rings-par5c-0308-v1 Fast Recovery for Chains and Rings Proposal for PAR and 5.
Doc.: IEEE sru Submission 11 November 2013 M Ariyoshi, S Kitazawa (ATR)Slide 1 Project: IEEE P Working Group for Wireless Personal.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
IEEE Std Proposed Revision Purpose, Scope & 5 Criteria.
Contents of this presentation ● PAR material (Title, Scope, Purpose) ● Material as developed at previous meetings ● Provision for new/revised material.
Proposed P802.16s Amendment Extension Request to RevCom
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE P criteria responses
Progressing OmniRAN Abstract
802.1CF perspective on planned Industry Connections activity
PPC Closing Report for Session #88
Nov 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Resolution of PAR and 5C Comments for MBAN Study.
doc.: IEEE <doc#>
Proposed P802.16s Amendment Extension Request to RevCom
Mesh Topology for Relays
802.1CF-D1.0 WG ballot comment remedies
802.1CF-D1.0 WG ballot comment remedies
Date: < yyyy-mm-dd >
An SDN-based approach for OmniRAN
Network instantiation
Brief Introduction to OmniRAN P802.1CF
SDN Functional Decomposition
GRIDMAN Task Group - Session #109
IEEE SCC41 PARs Date: Authors: August 2009 August 2009
IEEE 802 EC Privacy Recommendation SG Comments on Privacy PAR/CSD
Submission Title: [SGLECIM PAR & 5C comment resolution November 2010]
Submission Title: [Proposal on PAR and 5C draft for BAN]
[place document title here]
IEEE 802 Scope of OmniRAN Abstract
<month year> Denver, March 2006
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG FANE PAR & CSD Comment resolution March.
Submission Title: [Proposal on PAR and 5C draft for BAN]
doc.: IEEE <doc#1>
Jan Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [PAR and CSD document discussion] Date Submitted:
900 MHz ISM Band Date: Authors: January 2010 Month Year
<month year> Denver, March 2006
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG FANE PAR & CSD Comment resolution March.
What is a CA document? Date: Authors: March 2005 March 2005
An SDN-based approach for OmniRAN Reference Point mapping
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
[place document title here]
802.1CF ToC Refinements Abstract
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Response to PAR and 5C Comments.
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Project Planning Committee Closing Report - Session #81
IEEE MEDIA INDEPENDENT HANDOVER DCN: bcast
OmniRAN SDN Use Case ToC
OmniRAN SDN Use Case ToC
IEEE MEDIA INDEPENDENT SERVICES DCN:
Submission Title: TG9ma Opening Report for July Meeting
Metrology SG Closing Report – Session #81 - DRAFT
Presentation transcript:

Privacy Recommendation PAR Proposal Date: [2015-06-03] Authors: Name Affiliation Phone Email Juan Carlos Zúñiga InterDigital Labs j.c.zuniga@ieee.org Notice: This document does not represent the agreed view of the IEEE 802 EC Privacy Recommendation SG. It represents only the views of the participants listed in the ‘Authors:’ field above. It is offered as a basis for discussion. It is not binding on the contributor, who reserve the right to add, amend or withdraw material contained herein. Copyright policy: The contributor is familiar with the IEEE-SA Copyright Policy <http://standards.ieee.org/IPR/copyrightpolicy.html>. Patent policy: The contributor is familiar with the IEEE-SA Patent Policy and Procedures: <http://standards.ieee.org/guides/bylaws/sect6-7.html#6> and <http://standards.ieee.org/guides/opman/sect6.html#6.3>. Abstract This document presents a PAR-CSD text proposal for consideration/discussion by the IEEE 802 Privacy EC SG.

Privacy Recommendation PAR/CSD Proposal Juan Carlos Zuniga InterDigital Labs

Dates, WG and Number of People PAR Request Date: 17-Jul-2015 PAR Approval Date: 09-Nov-2015 PAR Expiration Date: 09-Nov-2018 Working Group 802.1 WG Number of active people expected: 18

Title IEEE Recommended Practice for Privacy Considerations for IEEE 802 Technologies.

Scope of the Project This recommended practice specifies a privacy threat model for IEEE 802 technologies and provides recommendations on how to protect against privacy threats.

Purpose The purpose of this recommended practice is to promote a consistent approach by IEEE 802 protocol developers to mitigate privacy threats identified in the specified privacy threat model and provide a privacy guideline.

Need IEEE 802 technologies play a major role in Internet connectivity, yet have the potential to disclose their users’ private information*. A recommended practice to promote a consistent approach by IEEE 802 protocol developers to mitigate Internet privacy threats is needed. * https://wiki.tools.ietf.org/html/draft-iab-privsec-confidentiality-threat-07

Stakeholders Developers, providers, and users of services, content and equipment for wired and wireless network connectivity using IEEE 802 standards. This includes software developers, networking IC developers, bridge and NIC vendors, service providers and users.

Possible Registration Activity This project does not envision any registration activity.

Managed Objects Describe the plan for developing a definition of managed objects. The plan shall specify one of the following: a) The definitions will be part of this project. b) The definitions will be part of a different project and provide the plan for that project or anticipated future project. c) The definitions will not be developed and explain why such definitions are not needed. c) This recommended practice document does not specify any managed objects.

Coexistence A WG proposing a wireless project shall demonstrate coexistence through the preparation of a Coexistence Assurance (CA) document unless it is not applicable. a) Will the WG create a CA document as part of the WG balloting process as described in Clause 13? (yes/no) b) If not, explain why the CA document is not applicable. A CA document is not applicable because this project does not specify wireless spectrum operations.

Broad Market Potential Each proposed IEEE 802 LMSC standard shall have broad market potential. At a minimum, address the following areas: a) Broad sets of applicability. b) Multiple vendors and numerous users. New Internet applications are being used across multiple networks and devices. These developments bring enormous economic and social value to individuals and to society as a whole. However, such value may not be fully achieved without successfully addressing the growing privacy threat. Most Internet connections make use of technologies developed in IEEE 802 (e.g. IEEE 802.1, 802.3, 802.11, 802.15, etc.), and some companies have already started implementing privacy features on top of IEEE 802 standards. Providing privacy features is already seen as a business advantage, as users can continue to have confidence and trust in Internet technologies, applications and services. This recommendation will foster continued growth of deployment of IEEE 802 technologies for communication devices.

Compatibility Each proposed IEEE 802 LMSC standard should be in conformance with IEEE Std 802, IEEE 802.1AC, and IEEE 802.1Q. If any variances in conformance emerge, they shall be thoroughly disclosed and reviewed with IEEE 802.1 WG prior to submitting a PAR to the Sponsor. a) Will the proposed standard comply with IEEE Std 802, IEEE Std 802.1AC and IEEE Std 802.1Q? b) If the answer to a) is no, supply the response from the IEEE 802.1 WG. The review and response is not required if the proposed standard is an amendment or revision to an existing standard for which it has been previously determined that compliance with the above IEEE 802 standards is not possible. In this case, the CSD statement shall state that this is the case. a) Yes.

Distinct Identity Each proposed IEEE 802 LMSC standard shall provide evidence of a distinct identity. Identify standards and standards projects with similar scopes and for each one describe why the proposed project is substantially different. There is currently no standard that defines a privacy threat model and associated recommended practice for IEEE 802 technologies.

Technical Feasibility Each proposed IEEE 802 LMSC standard shall provide evidence that the project is technically feasible within the time frame of the project. At a minimum, address the following items to demonstrate technical feasibility: a) Demonstrated system feasibility. b) Proven similar technology via testing, modeling, simulation, etc. The recommended practice will define recommendations that can be followed by standards developers to improve privacy. Privacy threat models have been developed in the industry by standards development organizations, such as the Internet Engineering Task Force (IETF). The IEEE 802 LAN/MAN Standards Committee and the IETF have successfully carried out three experiments testing the feasibility of a proposed solution to address privacy risks associated with tracking globally-unique media access control (MAC) addresses in wireless networks based on IEEE 802.11™, and technical reports of these experiments have been published [https://mentor.ieee.org/privecsg/documents] .

Economic Feasibility Each proposed IEEE 802 LMSC standard shall provide evidence of economic feasibility. Demonstrate, as far as can reasonably be estimated, the economic feasibility of the proposed project for its intended applications. Among the areas that may be addressed in the cost for performance analysis are the following: a) Balanced costs (infrastructure versus attached stations). b) Known cost factors. c) Consideration of installation costs. d) Consideration of operational costs (e.g., energy consumption). e) Other areas, as appropriate. The recommended practices will take into consideration the need to minimize cost impact to implement the mitigation methods.