Emergency Services IAB Tech Chat 28 th February 2007 Hannes Tschofenig.

Slides:



Advertisements
Similar presentations
Emergency Communication over IP Matt Lepinski
Advertisements

Internet Standards- Emergency Services Hannes Tschofenig Mail comments to and/or
Emergency Services Chitra S VOIP Security Fall 2008.
1 3GPP2 IP Based Emergency Calls IETF/3GPP Hosted SDO Emergency Services Coordination Workshop Columbia University, New York 5-6 October, 2006 Deb Barclay.
1 5 th SDO Emergency Services Workshop October 2008 “sos” URI parameter for marking emergency requests Milan Patel 5 th SDO Emergency Services Workshop.
Risks with IP-based Emergency Services draft-ietf-ecrit-trustworthy-location.
Origins of ECRIT IETF has been working on location since 2000 –Spatial BoF, eventually GEOPRIV chartered in 2001 GEOPRIV provides location information.
WiMAX Network Architecture and Emergency - Status Update – 7th Emergency Services Workshop College Park, MD, USA May 2010 Contact:
Internet Real-Time Lab, Columbia University Next Generation Project Jong Yul Kim, Wonsang Song, and Henning Schulzrinne.
Internet Real-Time Lab, Columbia University Emergency Calling for VoIP Wonsang Song, Jong Yul Kim, and Henning Schulzrinne.
Draft-ietf-ecrit-location-hiding-req Location Hiding: Problem Statement and Requirements Henning Schulzrinne, Laura Liess, Hannes Tschofenig, Barbara Stark,
Trustworthy Location Information draft-tschofenig-ecrit-trustworthy- location draft-tschofenig-ecrit-trustworthy- location Hannes Tschofenig, Henning Schulzrinne.
Requirements for Resource Priority Mechanisms for the Session Initiation Protocol draft-ietf-ieprep-sip-reqs-01 Henning Schulzrinne Columbia University.
IETF ECRIT WG workshop 1 ETSI EMTEL (Special Committee on Emergency Communications) Producing and maintaining Standards for Emergency Communications Presented.
The Next Generation Proof-of-Concept System.
SDO Emergency Services Coordination Workshop (ESW06) 1 Emergency Service Identifiers Presented by Henning Schulzrinne Columbia University
An SAIC Company Telcordia View of NENA Progress on VoIP Migration Plan Telcordia Contacts: Nadine Abbott (732) An SAIC Company.
March 2006IETF65 - ECRIT1 Emergency Service Identifiers draft-ietf-ecrit-service-urn-01 Henning Schulzrinne Columbia University
Location Hiding: Problem Statement, Requirements, (and Solutions?) Richard Barnes IETF 71, Philadelphia, PA, USA.
SDO Emergency Services Coordination Workshop (ESW06) Report Hannes Tschofenig IETF 67, San Diego, November 2006.
ECRIT interim meeting - May Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats Hannes Tschofenig Henning.
Ernst Langmantel Technical Director, Austrian Regulatory Authority for Broadcasting and Telecommunication (RTR GmbH) The opinions expressed in this presentation.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Emergency calls related work done in IETF Gabor Bajko May 22, 2006.
SDO Emergency Services Coordination Workshop (ESW06) 1 A Location-to-Service Translation Protocol (LoST) & Mapping Protocol Architecture Ted Hardie Andrew.
NENA Next Generation Architecture
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
November 2006IETF 67 - ECRIT Location-to-URL Mapping Architecture and Framework draft-ietf-ecrit-mapping-arch Henning Schulzrinne Columbia University
What is ETSI EMTEL all about Claire d’Esclercs Technical Officer for EMTEL European Telecommunications Standards Institute.
ECRIT: Emergency Calling Henning Schulzrinne (with Jong Yul Kim, Wonsang Song, Anshuman Rawat, Matthew Mintz-Habib, Amrita Rajagopal and Xiaotao Wu) Dept.
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
1 DHCP Authentication Discussion INTAREA meeting, 70th IETF Vancouver, Canada Jari Arkko and Ralph Droms.
1 Location Hiding Henning Schulzrinne Laura Liess Hannes Tschofenig.
IETF – ECRIT Emergency Context Resolution using Internet Technologies ESW 5 – Vienna October 2008 Marc Linsner.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
November 2005IETF64 - ECRIT1 Emergency Service Identifiers draft-ietf-sipping-sos-01 draft-schulzrinne-sipping-service-01 Henning Schulzrinne Columbia.
PSAP Callback draft-ietf-ecrit-psap-callback Phone BCP Status Usage Scenarios.
IETF GEOPRIV Status Richard L. Barnes BBN Technologies GEOPRIV Secretary Emergency Services Workshop October 2008.
July 2006IETF66 - ECRIT1 LoST: A Location-to-Service Translation Protocol draft-ietf-ecrit-lost-00 Ted Hardie Andrew Newton Henning Schulzrinne Hannes.
ATOCA IETF 79, Beijing Martin Thomson; Scott Bradner.
ECRIT Virtual Interim Meeting 3rd June 2009, 1PM EDT (New York) Marc Linsner Hannes Tschofenig.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-ietf-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning Schulzrinne.
Core VoIP and 911 issues and alternatives Henning Schulzrinne Columbia University August 2003.
ECRIT - Getting Certain URIs, and Alternatives to Getting Emergency Dialstring(s) draft-polk-ecrit-lost-server-uri-00 draft-polk-dhc-ecrit-uri-psap-esrp-00.
ECRIT IETF 72 July 2008 Dublin Hannes Tschofenig Marc Linsner Roger Marshall.
Emergency Context Resolution with Internet Technologies BOF (ecrit) Jon Peterson, Hannes Tschofenig BOF Chairs.
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture 13 th April 2007, THE FIRST INTERNATIONAL WORKSHOP ON RESEARCH.
Doc.: IEEE /1723r0 Submission November 2006 Stephen McCann, Hannes Tschofenig (Siemens)Slide 1 Summary of Emergency Services Workshop Notice:
ECRIT IETF 70 December 2007 Vancouver Hannes Tschofenig Marc Linsner Roger Marshall.
Internet Real-Time Lab, Columbia University NG9-1-1 Prototype Demo Jong Yul Kim, Wonsang Song, and Henning Schulzrinne.
Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats-01.txt Hannes Tschofenig, Henning Schulzrinne, Murugaraj.
Internet Real-Time Lab, Columbia University NG9-1-1 Prototype Demo Jong Yul Kim, Wonsang Song, and Henning Schulzrinne.
NetCri'07 LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering Points Henning Schulzrinne, Hannes Tschofenig, Andrew Newton, Ted.
Extensions to the Emergency Services Architecture for dealing with Unauthenticated and Unauthorized Devices draft-ietf-ecrit-unauthenticated-access-03.txt.
EAP in Unauthenticated Network Access to Emergency Services draft-schulzrinne-ecrit-unauthenticated-access-06 H. Schulzrinne, S. McCann, G. Bajko, H. Tschofenig,
ECRIT interim meeting - Washington, DC - Feb LUMP: Location-to-URL mapping draft-schulzrinne-ecrit-lump Henning Schulzrinne Columbia University.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-03.txt Hannes Tschofenig, Henning.
Emergency Context Resolution with Internet Technologies (ecrit) Hannes Tschofenig, Marc Linsner IETF 66, Montreal, June 2006.
ECRIT - IETF 62 (March 2005) - Minneapolis 1 Requirements for Emergency Calling draft-schulzrinne-sipping-emergency-req-01 draft-ietf-sipping-sos-01 Henning.
ECRIT WG IETF-75 Trustworthy Location Bernard Aboba
12th April 2007, SDO Emergency Services Workshop 2007
Emergency Context Resolution with Internet Technologies Marc Linsner Roger Marshall IETF 86 Orlando March 13, 2013.
Location Configuration at Layer 7
Henning Schulzrinne Stephen McCann Gabor Bajko Hannes Tschofenig
Service requirements from 3GPP TS
Emergency Service Identifiers draft-ietf-ecrit-service-urn-01
Thoughts on VoIP and Emergency Calling
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
IEEE Emergency Services
Presentation transcript:

Emergency Services IAB Tech Chat 28 th February 2007 Hannes Tschofenig

Outline  Introduction  The Building Blocks  Architectural Models  Challenges  How the IAB can help us

Introduction  Authority to Citizen  Example: Cell broadcast for Tsunami warning  Authority to Authority  Example: Communication between emergency personnel  Citizen to Authority  Example: VoIP emergency call Authorities Citizen Note that some SDOs use the term “individuals” instead of “citizen”.

History JFMAMJJASONDJFMAMJJASOND ECRIT BOF 1 st ECRIT WG Meeting IETF ECRIT WG 1 st ECRIT Interim Meeting IETF#63 JFMAMJJASONDJFMAMJJASOND nd ECRIT Interim Meeting 4 th ECRIT WG Meeting IETF ECRIT WG 5 th ECRIT WG Meeting IETF#62IETF#61 2 nd ECRIT WG Meeting 3 rd ECRIT WG Meeting IETF#64 IETF#65 IETF#66 IETF ECRIT – 3GPP Workshop 1 st SDO Emergency Services Workshop 2 nd SDO Emergency Services Workshop IETF#67IETF#68 6 th ECRIT WG Meeting IETF ECRIT – IEEE Workshop 7 th ECRIT WG Meeting

Links  Joint IETF ECRIT / 3GPP Emergency Services Workshop  SDO Emergency Services Coordination Workshop (ESW06)  IETF ECRIT / 3GPP / TISPAN Emergency Services Work  Reviews by VoIP providers still ongoing.

The ECRIT Universe ECRIT GEOPRIV SIP OGC Regulators Open Geospatial Consortium (OGC) NENA, TISPAN, EMTEL, ATIS 3GPP, 3GPP2, IEEE, ITU-T, PacketCable DSL Forum, Wimax, OMA, TIA, OASIS,

Architectural Considerations Last Mile, Inc. (Access Provider) ISP, Inc. (Internet Service Provider) VoIP, Inc. (Application Service Provider) Layer 7 Layer 2 Layer 3 Common point - The end device!  Two main questions:  Who knows the location of the end host?  What is the relationship between access network provider and application service provider?

Building Blocks

 Manual configuration  GPS  Link layer mechanisms (e.g., LLDP-MED, ongoing work in the IEEE)  DHCP (civic and geospatial) RFC 4776 for civic location information RFC 3825 for geodetic location information  Application layer protocols (e.g., Geopriv L7 LCP, OMA) Location Configuration

Building Blocks

 Purpose  For UA : To indicate emergency call  For Proxies: To handle the emergency call specially  For Mapping Protocol: To resolve to PSAP URI  Emergency Identifier  draft-ietf-ecrit-service-urn-05.txt  Example: urn:service:sos Identifying an Emergency Call Emergency Numbers

 Emergency numbers vary in countries  Example: 911 for North America, 112 for Europe  some countries uses separate numbers for ambulance/police/fire  Required to support both home and visited emergency number  e.g., for an American traveler who is visiting Europe, both 911 and 112 should be recognized as emergency  Configuration of emergency numbers and dial strings important  Home Emergency Number: User can set his/her home country through device configuration.  Visited Emergency Number: Obtained via LoST Emergency Numbers

Building Blocks

Location-to-Service Translation (LoST)  Status: WGLC started  Location Information (PSAP) URI Service Identifier Service Number Service Boundary + +

LoST Architecture T1 (.us) T2 (.de) T3 (.dk) G G G G G broadcast (gossip) T1:.us T2:.de resolver seeker 313 Westview Leonia, NJ US Leonia, NJ  tree guide

Building Blocks

Architectural Models  Model 1: Location Information is available to End Host  This allows UA recognition & UA resolution as well as UA recognition & Proxy resolution  Model 2: Reference to Location Information is available to End Host  Might translate to model 1 if end host is allowed to resolve the reference  Translates to model 3 if end host is not allowed to resolve the reference (but relaxes assumptions of model 3)  Model 3: Location Information is NOT available to End Host  Assumption: SIP intermediaries are in the access network (or have a very close relationship to them)  Proxy recognition & Proxy resolution is a subcase of this model.

Mapping Server SIP proxy PSAP / Call Taker (1)Location Location + Service Identifier (2) PSAP URI + service number (3) INVITE PSAP URI To: urn:service:sos (5) INVITE PSAP URI To: urn:service:sos (6) (4) dial dialstring UA Recognition & UA Resolution  Location Information is provided by the access network.  IETF ECRIT preferred emergency service architecture  SIP Proxy is user’s preferred SIP provider. It may re-run LoST SOS caller

PSAP / Call Taker Mapping Server SIP proxy SOS caller (3)Location Location + Service Identifier (4) PSAP URI (5) INVITE urn:service:sos To: urn:service:sos (2) INVITE PSAP URI To: urn:service:sos (6) (1) dial dialstring Location Server UA Recognition & Proxy Resolution  Assumes that SIP proxy is able to determine the end hosts location information.  This assumes a close relationship to the access network

PSAP / Call Taker Mapping Server SIP proxy (3)Location Location + Service Identifier (4) PSAP URI (5) INVITE To: (2) INVITE PSAP URI To: urn:service:sos (6) (1) dial dialstring Location Server Proxy Recognition & Proxy Resolution  End host does not understand emergency service concept.  Legacy support scenario SOS caller

Challenges  Security Threat model assumes that the end host is not trustworthy.  Location Information Too many protocols to obtain location information are available. They also use different formats.  Regulators Regulators have a lot to say. Unfortunately, very little detailed guidance is available.  Business Models No unified architecture (too many cooks). Business models impacting architectural design

Challenge: Security  Example security threats: “location spoofing”, prank calls, fraud  Countermeasures:  Real-Time Check: PSAP receives a call with faked location information.  Determine identity of adversary for later prosecution.  Aspects are discussed mostly in GEOPRIV WG since the solutions refer to protocols developed there.  Further reading: Overview Paper on Security (NetCri Workshop 2007)

Challenge: Location Information  To accomplish interoperability in the Internet either the network or the end host need to implement all location configuration protocols.  Location information differ in the format and the functionality (e.g., OMA and OGC GML).  Maybe a job for the IAB liaison persons but might be too late already.  Alignment between IEEE and IETF GEOPRIV is quite good.  Architectural assumptions of some Location Configuration Protocols are not compatible; not only the format.

Challenge: Regulators  So far no indication from the regulator side regarding  preference for one of the architectural models  confidentiality protection of emergency calls  unauthenticated network access  priority for emergency services (  QoS and IEPREP-like mechanisms)  unauthenticated emergency call  requirements on network providers to disclose location information

Example: Unauthenticated Network Access  Bob wants to make an emergency call  Assume he is not yet attached to a network.  Assume he has no credentials for this particular network.  Bob uses a special link layer attachment procedure to attach to the network without authentication and authorization.  Bob initiates the emergency call.  How does the access network know whether Bob is really making an emergency call or not just calling his friend for free?  Answer: 1)It understands the concept of SIP-based emergency calls OR 1)It tunnels all emergency traffic to someone that understands it.

Challenge: Business Models Request Location Reference Location Reference PSAP Location Access Network End Host Dereference

Challenge: Business Models  Location-by-reference itself is not a bad concept; but it can be misused  The problem appears if access network providers only want to make location only available to “authorized” entities.  Authorized could mean only to entities that have a business relationship with the access network provider.  Without location information location-based routing does not work.  If VoIP has to do location-based routing then it need create business contracts with access providers.  There are many VoIP providers and even more access providers  impractical solution

How the IAB could help us  Interacts with other SDOs  “SDO Emergency Services Workshop” (April 2007) is only one event in the overall stream of activities  Help us to investigate security aspects of the emergency services architecture  Develop an IAB position on the IETF emergency service architecture  Provide input to the long ongoing GEOPRIV L7 LCP discussion  Help to educate regulators  Interact with PSAP operators (and regulators) regarding the public availability of PSAP boundary data. This is important for a robust global LoST architecture.