Doc.: IEEE 802.11-04/0407r0 Submission Andrew Myers, BT Slide 1 March 2004 WLAN Backend System Security and WLAN Interworking Security Andrew Myers British.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Encrypting Wireless Data with VPN Techniques
U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
Workshop on Telecommunications for Disaster Relief, February 2003, Geneva Dag Nielsen & Catherine Mulligan Ericsson Response WLAN in Disaster and.
LMF/TTR Raimo Vuopionperä 6WINIT: Ericsson (Research) Objectives (6WINIT Kick-Off, London) Raimo Vuopionperä (Ph. D.), NomadicLab (LMF/TTR)
CAPANINA Multimedia Applications Demo Specifications for Trial 1 Milan Lalovic Wireless Networks, BT Exact.
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
Rev BMarch 2004 The ABC Service as a Research Infrastructure Rajesh Mishra Per Johansson Cahit Akin Salih Ergut.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
1 An overview Always Best Connected Networks Dênio Mariz Igor Chaves Thiago Souto Aug, 2004.
Doc.:IEEE /106 Submission Jamshid Khun-Jush, Ericsson January, 2002 Slide 1 Integration of WLAN and Wide Area Mobile Networks Author: Jamshid.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Interworking Architecture Between 3GPP and WLAN Systems 張憲忠, 何建民, 黃瑞銘, 紀嘉雄, 李有傑.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Doc.: IEEE /229r0 Submission Tan Pek-Yew, Panasonic Slide 1 March 2003 Interworking – QoS and Authorization Tan Pek Yew & Cheng Hong Panasonic.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
“IMS in a Bottle”: Initial Experiences from an OpenSER-based Prototype Implementation of the 3GPP IP Multimedia Subsystem Author:Joachim Fabini, Peter.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
Module 11: Remote Access Fundamentals
Doc.: IEEE /751r0 Submission July 2004 Max Riegel, SiemensSlide 1 Selling network access Views from a business perspective Max Riegel Siemens.
11/26 Integration of wireless LAN and 3G wireless - Interworking architecture between 3GPP and WLAN systems Ahmavaara, K.; Haverinen, H.; Pichna, R.; Communications.
Completing the Convergence Puzzle: A Survey and A Roadmap IEEE Wireless Communications ‧ June 2009 DJAMAL-EDDINE MEDDOUR, USMAN JAVAID, AND NICOLAS BIHANNIC,
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
Cellular Access Control and Charging for Mobile Operator Wireless Local Area Networks H. Haverinen, J. Mikkonen and T. Takamaki, Nokia Wei-Jen, Lin Advanced.
1 IEEE TGu Interworking with External Network Stefano M. Faccin Nokia IEEE Liaison to 3GPP2.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Common NAI/Password Fraud Issue 7/27/2005 Bryan Cook
WLAN-GPRS Integration For Next-Generation Mobile Data Networks Wireless Communications IEEE 2002 報告者:陳崇凱.
1 A VPN based approach to secure WLAN access John Floroiu
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Submission doc.: IEEE 11-13/0030r0 January 2013 Katsuo Yunoki, KDDI R&D LaboratoriesSlide 1 User Level Performance Date: Authors:
Doc.: IEEE /209r0 Submission 1 March GPP SA2Slide 1 3GPP System – WLAN Interworking Principles and Status From 3GPP SA2 Presented.
Doc.: IEEE /162r0 Submission March 2003 Stephen McCann & Max Riegel, SiemensSlide 1 Wireless Interworking Stephen McCann & Max Riegel, Siemens.
Submission doc.: IEEE /1402r0 November 2015 Joseph Levy, InterDigitalSlide 1 Thoughts on in a 3GPP 5G Network Date: Authors:
Doc.: IEEE /149r0 Submission March, 2002 Jun Hirano, Matsushita CommunicationSlide 1 Global Area Network (GAN) Concept Jun Hirano*, Tan Pek Yew**,
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
Doc.: IEEE /843r0 Submission Cheng Hong, Tan Pek-Yew, Panasonic Slide 1 November 2003 Interworking – WLAN Control Cheng Hong & Tan Pek Yew Panasonic.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Doc.: IEEE /0690r0 Submission Andrew Myers, BT Slide 1 July GPP SA3 Interworking Security Issues II Andrew Myers British Telecommunications.
Network Access Control
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
November 2001 Lars Falk, TeliaSlide 1 doc.: IEEE /617r1 Submission Status of 3G Interworking Lars Falk, Telia.
Applicability of Proxy Mobile IPv6 for Service Provider Wi-Fi Deployments Byju Pularikkal Rajeev Koodli Sri Gundavelli.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Securing Interconnect Networks By: Bryan Roberts.
1 Special Topics in Computer Engineering Supervised by Dr. Walid Abu-Sufah Jordan University Department of Computer Engineering.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Server-to-Client Remote Access and DirectAccess
Stephen McCann, Siemens Roke Manor
WLAN Interworking scenarios
WIEN Study Group Proposed Roadmap
Stephen McCann, Siemens Roke Manor
3GPP WLAN Interworking Security Issues
3GPP WLAN Interworking update
Presentation transcript:

doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 1 March 2004 WLAN Backend System Security and WLAN Interworking Security Andrew Myers British Telecommunications (WNG-SC) 18 th March 2004

doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 2 March 2004 Introduction Backend System Security WLAN Interworking Security Security of WLANs when interworking with external networks such as 3GPP etc...

doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 3 March 2004 WLAN Interworking Security WLAN Interworking Security The purpose of this presentation is to stimulate discussion on common approaches to securing backend systems within IEEE for the development of WLAN platforms and the security of WLAN interworking Why? …. A common security approach was adopted in the cellular or mobile networks with the primary reason to provide roaming capability which has proved to be very successful. A common security approach is one criteria for establishing partnerships between operators. Security is often a key aspect of Service Level Agreements Therefore the question is, does a common security approach need to be considered for guidance on developing WLANs?

doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 4 March 2004 HSSP A Customer Inbound Access Point C Firewall HSSP A Wireless LAN Hot Spot Network Layer HSSP A Core Network Internet Other Services Corporate A VPN Data Centre FW WLAN Back End System Security

doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 5 March 2004 Data Centre & Core Network Nodes Access Points AAA Server –Diameter –Radius Node Billing –TAP Records Data Centre Network Components –Service Selection Gateways –Network Management Systems –Service Management Systems –Internal Firewalls Access Point Controller [CAPWAP]?

doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 6 March 2004 Security Mechanisms 802.1X authentication for service segregation? VPN Tunnels –IPSec –SSL End User Management –Link Layer Key Management –Mechanisms for immediate Service Termination

doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 7 March 2004 Generic Security Considerations Computer Installations Computer Viruses Cryptography Data Comms and Networks Computer Development & Support Failure & Disaster Protection Interconnection Internet & Intranet Passwords & UserIDs PC Security Product Protection Information Management Data Protection Computer Media Handling Telecomms Fraud Alliances and Joint Ventures

doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 8 March 2004 HSSP A Customer Inbound Access Point C Firewall HSSP A Wireless LAN Hot Spot IPSec Application Layer Network Layer HSSP A Core Network HSSP A Customer Outbound Data Centre Access Point C Firewall Partner HSSP Wireless LAN Hot Spot Network Layer Partner HSSP Core Network Other Services Internet Other Services Corporate A VPN Internet Data Centre WLAN Interworking Security

doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 9 March 2004 Open Questions What consideration has been given by IEEE to the security measures and mechanisms that need to be applied to the various network nodes on a WLAN platform? Are there any other network nodes or security mechanisms that should be included? Is the interworking scenario likely or feasible (especially in terms of security and scalability)? Will / should the WIEN Study Group be addressing end to end security as well as interworking security?

doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 10 March 2004 Summary End to End Security –platform –service WLAN Interworking Security Security of interworking WLAN with other platforms e.g. GPRS, 3GPP etc...