Doc.: IEEE 15-13-0677-02-0009-tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 1 Project: IEEE P802.15 Working Group for.

Slides:



Advertisements
Similar presentations
Doc.: IEEE xxx Submission January 2015 N. Sato and K. Fukui (OKI)Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Advertisements

Doc.: IEEE xxxxx Submission doc. : IEEE Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P
Doc.: IEEE a-Updating-15-7-security Submission May 2015 Robert Moskowitz, HTT ConsultingSlide 1 Project: IEEE P Working Group for.
Doc.: IEEE s Submission January 2015 Mineo Takai, Space-Time EngineeringSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE e Submission f TG November 2009 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /0136r0 Submission March 2006 Abbie Mathew, NewLANS Project: IEEE P Working Group for Wireless Personal Area Networks Submission.
Doc.: IEEE /xxxr0 Submission Phil Jamieson November 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE Hop-Discuss Submission July 2014 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Moving-KMP-Forward Submission September 2012 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless.
Doc.: IEEE KMP-Transport-Joint Submission July 2012 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless.
Doc.: IEEE HIP-over-TG9 Submission May 2012 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission doc. : IEEE March 2009 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE tg9-Opening-Report-mar-2015 Submission Mar 2015 Robert Moskowitz, HTT Consulting Slide 1 Project: IEEE P Working Group.
Doc.: IEEE Moving-KMP-Forward Submission January 2013 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless.
Doc: IEEE Submission July 2015 Hernandez,Li,Dotlić,Miura (NICT)Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE kmp Submission September 2011 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission Mar 2014 Tero Kivinen, INSIDE Secure Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE Submission September 2009 Tim Godfrey, EPRISlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Communicating.
Doc.: IEEE e Submission July 2009 Andy Summers, Skip Ashton, EmberSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE tg9-technical-decisions Submission July 2013 Robert Moskowitz, Verizon Slide 1 Project: IEEE P Working Group for Wireless.
Robert Moskowitz, Verizon
Submission Title: [Add name of submission]
Project: IEEE 802 EC Privacy Recommendation Study Group
November 2012 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Moving KMP Forward Date Submitted: November.
Robert Moskowitz, Verizon
Jan 2014 Robert Moskowitz, Verizon
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
January 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Proposal for primitives for KMP transport.
Robert Moskowitz, Verizon
<May,2009> doc.: IEEE <doc .....> <July 2009>
July 2013 Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Nov 2013 Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
1/2/2019<month year> doc.: IEEE Jan 2013
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Nov 2013 Robert Moskowitz, Verizon
March 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Moving KMP Forward Date Submitted: March.
Nov 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: KMP TG9 Opening Report San Antonio 2014 Date.
Jan 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Jan 2015 closing report Date Submitted: Jan.
Jan 2014 Robert Moskowitz, Verizon
Jan Robert Moskowitz, Verizon
July 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: July 2014 closing report Date Submitted: July.
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
July 2013 Robert Moskowitz, Verizon
<month year> <Nov 2018>
Robert Moskowitz, Verizon
Nov 2013 Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
July 2012 Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
July 2013 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Technical Decisions for KMP transport Date.
Robert Moskowitz, Verizon
May 2014 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG9 Hop Discussion Date Submitted: May 15, 2014.
Presentation transcript:

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: KMP tg9 proposed document changes Date Submitted: Nov 12, 2013 Source: Robert Moskowitz, Verizon Address 1000 Bent Creek Blvd, MechanicsBurg, PA, USA Voice:+1 (248) , Re: KMP TG9 Opening Report for November 2013 Session Abstract:tg9 proposed document changes Purpose:To focus activities during the meeting Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 2 TG9 Proposed document changes Dallas, TX November 12, 2013

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 3 Address Format Current Long addresses SHOULD be used when the KMP is performed to establish an SA. Short address MAY be used when the KMP updates an existing SA. Proposed The SA is associated with the long addresses. Thus long addresses SHOULD be transmitted when the KMP is performed to establish an SA. Short address MAY be transmitted when the KMP updates an existing SA.

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 4 ACK is no proof of processing Current As Key Management payloads may exceed the MPDU, a simple frame chaining method using Forced ACKs will provide the needed fragmentation support. The use of the Forced ACKs allow the sending device to be assured the receiving device has all the frames to reassemble the Key Management payload. Sending lost frames is handled within the MAC and not apparent to the KMP transport. The receiving side MUST anticipate duplicate frames if its ACK was lost. This behavior is accommodated within state machines.

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 5 ACK is no proof of processing Additional text If a fragment is lost, that is, the inbound state machine registers a skipped fragment, then the inbound processing fails; this is considered an acceptable behavior. A KMP SHOULD be able to handle a lost message, therefore no effort will be made to recover a loss fragment.

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 6 Security Associations Additional text Many types of security associations are possible as described in the Security-related MAC PIB attributes section in and An implementer of this recommended practice will select from the options allowed to request the KMP higher layer to establish the desired SA and provide the necessary keys to the MAC PIB.

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 7 More on ACKs Current a simple frame chaining method using Forced ACKs will provide the needed fragmentation support. The use of the Forced ACKs allow the sending device to be assured the receiving device has all the frames to reassemble Proposed a simple frame chaining method using the MAC Acknowledgment Frame will provide the needed fragmentation support. The use of the MAC Acknowledgment Frame allow the sending device to be assured the receiving device has all the frames to reassemble

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 8 More on ACKs in Inbound Machine Current Firstly there MAY be duplicate frames if the ACK was lost and the packet was resent. Proposed Firstly there MAY be duplicate frames if the MAC Acknowledgment Frame was lost and the packet was resent.

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 9 More on ACKs in Outbound Machine Current fragment accordingly and set transmission with Forced ACK. Proposed fragment accordingly and set transmission with the Acknowledgment Request (AR) field in the Frame Control to require a MAC Acknowledgment Frame.

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 10 KMP rekey Current The KMP rekey is triggered by the MacSecurityRekey PIB. If this is true then the KMP will be instructed to rekey the SA. Proposed An MLNE SAP will monitor both the MacSecurityRekey and the MacFrameCounter. If the MacSecurityRekey is true, then the KMP will be instructed to rekey the SA. If the MacFrameCounter > 0xffffffff – n, the MacSecurityRekey is set to true and the KMP will be instructed to rekey the SA. N is some value large enough such that the MacFrameCounter will not wrap by other uses during rekeying. A value of at least 1000 is recommended.

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 11 MacSecurityRekey Replace text with Used in the Rekey SAP to indicate when rekeying is required. May be set by an upper layer to force rekeying.

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 12 System View PHY Services MAC Services Data MCPS Information Element Shim Other IE processes KMP Service DATA higher layer Key Request Keys Data Traffic IE frames Key and rekey Request Key Request

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 13 System View Add text after Figure The only direct communication between the KMP Information Element Shim and the KMP Service is the KMP ID Value and KMP payload. Any other MAC information needed by the KMP Service should be obtained through existing MLME calls.

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 14 MLME KMP-Data.send Add section The KMP-Data.send primitive requests the transfer of a KMP payload to another device. The semantics of this primitive are: KMP-Data.send ( KMP ID Value, KMP Payload )

doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 15 MLME KMP-Data.recv Add section The KMP-Data.recv primitive delivers a KMP payload from another device. The semantics of this primitive are: KMP-Data.recv ( KMP ID Value, KMP Payload )