Naming Implications for ADS Study Group

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1078r0 SubmissionBill Carney (Texas Instruments)Slide 1 Wi-Fi Alliance Liaison Report September 15, 2004 Bill Carney Wi-Fi Alliance.
Advertisements

Doc.: IEEE /1317r1 Submission November 2010 B.Carney, OakTree WirelessSlide 1 “L 3 ” * Update From September Date: Authors: *LONGER.
CH1 CWNA Certification Questions. Network Architecture Model What are the layers of the Network Architecture Model? – Core – Distribution – Access.
Home Wireless Security David Mitchell 12/11/2007.
AD description template definition Marián Mlynarovič FIIT Lectures 2006.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
Internet 2 Corporate Value Proposition Stuart Kippelman (J&J) Jeff Lemmer (Ford) December 12, 2005.
Wi-Fi Alliance Update to IEEE Publicity Committee Dallas DFW Hyatt, March 11, 2003 Bill Carney Texas Instruments Wi-Fi Alliance Liaison.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
BEHAVE BOF (Behavior Engineering for Hindrance AVoidancE) Cullen Jennings Jiri Kuthan.
TEC reactions to the proposals of Geoff McMullen David Williams TERENA General Assembly, Prague October 24-25, 2002.
RIC 2009 Emerging Issues Materials and Mechanical
Geneva, 09 December Commission Proposal on the General Safety of Motor Vehicles Automotive Unit- F1 Geneva, 09 December Informal document No.
World Wireless LAN Security Technologies Market Securing The Wireless Communications Revolution “Potential wireless local area network (WLAN) end-users.
App End-to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting Date:
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 1Submission Project: IEEE P Working Group for Wireless Personal.
1 01/27/03 Scenarios. 2 01/27/03 Business Applications Scenario 1: Secure EPON – FTTH/FTTB (provider network) Scenario 2: IEEE 802 Link Security – RPR.
Doc.: IEEE /1147r1 Submission November 2009 David Halasz, AclaraSlide 1 Path Protection Date: Authors:
The role of the ILO in the International Labour movement; Decent Work Agenda and ILO Workers’ Group priorities Turin 6 September 2012 Esther Busser.
History and Implementation of the IEEE 802 Security Architecture
Gas Regional Initiative South South-East
History and Implementation of the IEEE 802 Security Architecture
Re-evaluating the WPA2 Security Protocol
July 12, 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Increasing Broadcast Reliability] Date.
ILO SPECIALIST ON SOCIAL SECURITY
Wireless Protocols WEP, WPA & WPA2.
Response to Official Comments
IECA Conference March 4th, 2017
Presented By: Rohit Maurya
Mobile Banking What can it do for you?.
Wi-Fi Liaison Report September 2003
Wireless Networking Chapter 23.
Closing Report Date: Authors: November 2010 November 2010
IEEE 802 EC Privacy Recommendation SG Comments on 802c PAR and CSD
IEEE 802 JTC1 Standing Committee Nov 2017 opening report for EC
Management Frame Protection Study Group Request
IEEE i Dohwan Kim.
Submission Title: [PC Meeting Minutes Nov. 03]
Wi-Fi Alliance Liaison Report March 16, 2005
The work of the working groups in 2013
Submission Title: [PC Meeting Minutes Nov. 03]
IP and NGN Projects in ITU-T Jean-Yves Cochennec France Telecom SG13 Vice Chair Workshop on Satellites in IP and Multimedia - Geneva, 9-11 December 2002.
Formal Amendment Chapter 3 Section 2.
Publicity Committee /.15 Brian Mathews, PC Chair
Technical Activities IEEE Future Directions Overview
Wi-Fi Alliance Liaison Report November 17, 2004
Prioritized MAC Access Mechanism of Routing-related Frame for ESS Mesh
Drone Use Case Followup
Forum of the ICT Coalition for Children Online Brussels, 14 July 2016
Management Frame Protection Study Group Request
How RTA can fit to Date: September 2016
Gas Regional Initiative South South-East
Update to IEEE Publicity Committee
July 12, 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Increasing Broadcast Reliability] Date.
Drone Use Case Followup
Security Issues with Wireless Protocols
Special Features of the Swedish Government Sector
Commercial Arrangements For Gas Quality Service – Introduction
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Wi-Fi Alliance Liaison Report July 14, 2004
Wi-Fi Alliance Liaison Report
Evaluation of ESF support to Gender Equality
The Need for an AP Functional Description
Management Frame Priority SG Input
Response to Official Comments
Gas Regional Initiative South South-East
Submission Title: [WG Proposal to form Radio2 Study Group]
Presentation transcript:

Naming Implications for ADS Study Group Bill Carney (Texas Instruments)

SECURITY is a STRONG Word There is a binary implication regarding the word “security” w/r/t 802.11 Either the network is secure or it isn’t Market impact from WEP crack resulted in deferred product adoption, principally within enterprise class applications Industry participants treated this as a crisis, rolling out an interim security fix via WPA 802.11i ratification heralded industry migration to new level of robust security Concerns about Wi-Fi security mechanisms no longer command media and market attention Problem has been solved Bill Carney (Texas Instruments)

ADS – A Problematic Name Media pay close attention to IEEE work, often looking to play up controversy and contention As presently labeled, “Advanced Security Study Group” could mistakenly imply that there are flaws and/or problems with the robust security just adopted with 11i Especially likely for those who do not follow IEEE work closely Coupled with the word “Advanced”, “Security” has an even more dangerous connotation, implying that there is a more secure mechanism in the offing, one that fixes problems with existing technology Could again forestall adoption of today’s secure products, if mischaracterized or reported as such in the press Bill Carney (Texas Instruments)

A New Name is Recommended Think about the market implications for how outsiders will understand what this group is undertaking Try to tie the SG Name to the specific scope of work (i.e., “management frame protection”) Avoid using the word “Security” in describing the core attributes of the proposed amendment Encourage a new name to emerge from this meeting to reduce the possibility of any confusion Bill Carney (Texas Instruments)

Motion “Move to rename the ADS Study Group to Protected Management Frame (PMF) Study Group.” Bill Carney (Texas Instruments)