ISHIKAWA Chiaki YRP UNL Slide 1 doc.: IEEE Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Support in Heterogeneous Mesh] Date Submitted: [29 May, 2004] Source: [ISHIKAWA Chiaki and OKUMA Yasuyuki] Company [YRP Ubiquitous Networking Laboratory] Address [ Nishigotanda, Shinagawa, Tokyo, , Japan] Voice:[ ], FAX: [ ], Re: [ n/a ] Abstract:[Supporting multiple security profile is essential for heterogeneous mesh management (i.e., mixed devices. We explain, eTRON, PKI-based secure architecture, and the use of implemented eTRON chip in usch mesh network management and give observation.] Purpose:[To raise issues to be discussed in (mesh) standardization. ] Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P
ISHIKAWA Chiaki YRP UNL Slide 2 doc.: IEEE Submission Security Support in Heterogeneous Mesh ISHIKAWA, Chiaki OKUMA, Yasuyuki YRP Ubiquitous Networking Laboratory
ISHIKAWA Chiaki YRP UNL Slide 3 doc.: IEEE Submission Mesh Network Homogeneous Network – devices with the same profile Heterogeneous Network – devices with different profiles. The latter will be the majority in ad-hoc networking (in our view).
ISHIKAWA Chiaki YRP UNL Slide 4 doc.: IEEE Submission Heterogeneous Profiles Impact on self-organization. –We want to use optimal connection in terms of the security use (and other use for that matter). –Quick Reconfiguration may be impacted. –(Figure: heterogeneous mesh.)
ISHIKAWA Chiaki YRP UNL Slide 5 doc.: IEEE Submission Importance of the Security in Mesh. Security is important! –It is not too much to stress this point many times over. –It is so even in the case of mesh network. Make no mistake about it. An advertising kiosk in a public place needs security, too! (note page 92, [2]), –Taking advantage of the best security feature of each node is important.
ISHIKAWA Chiaki YRP UNL Slide 6 doc.: IEEE Submission eTRON Architecture eTRON stands for entity-TRON. [1] –PKI-based security architecture. Support cryptographic algorithms in a flexible manner: algorithm-agnostic framework. –(Figure to be added.: eTRON )
ISHIKAWA Chiaki YRP UNL Slide 7 doc.: IEEE Submission Application of eTRON IC chip in mesh environment. Ubiquitous Communicator (UC) Terminal. –A hand-held device with communication functions for UWB ad-hoc networking (and bluetooth, WCDMA, etc..) –eTRON + UC terminal => an ideal powerful fully-functional device for multi-hop network environment (we offer end-to-end authentication.)
ISHIKAWA Chiaki YRP UNL Slide 8 doc.: IEEE Submission eTRON + UC terminal in mesh (Figure to be added.) eTRON chip + UC terminal can – be used for key distribution. – Establish connection and act as coordinator by choosing best security profile available. (eTRON chip and UC terminal can offer all the profiles of 4b.)
ISHIKAWA Chiaki YRP UNL Slide 9 doc.: IEEE Submission Issues Desirable to have MAC-level profile transfer (read) between devices. –Necessary for quick self & secure configuration.
ISHIKAWA Chiaki YRP UNL Slide 10 doc.: IEEE Submission References. [1] Ken Sakamura, Noboru Koshizuka, The eTRON Wide- Area Distributed-System Architecture for E-Commerce, IEEE MICRO, Vol. 21, No. 6, Dec. 2001, pp [2] Jose A. Gutierrez, et al., Low-Rate Wireless Personal Area Networks... Enabling Wireless Sensors with IEEE [3] Ken Sakamura, The TRON Intelligent House, IEEE MICRO, Vol. 10, No.2, Apr. 1990, pp
ISHIKAWA Chiaki YRP UNL Slide 11 doc.: IEEE Submission