Doc.: IEEE 802.11-12/0573r1 Submission May 2012 David Halasz, Motorola MobilitySlide 1 Scalable Authentication Date: 2012-5-6 Authors:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1097r1 Submission Sep 2012 Timo Koskela, Renesas Mobile CorporationSlide 1 Reserve Channel List in ah Date: Authors:
Advertisements

Submission doc.: IEEE 11-13/0070r1 Enabling AP Sleep Date: Authors: Jafarian, Qualcomm Slide 1 January 2013.
Doc.: IEEE /0881r0 Submission July 2012 Anna Pantelidou, Renesas Mobile CorporationSlide 1 PS Mode Enhancements with Timing Indication Date:
Doc.: IEEE /1002r0 July 2011 Hyangsun You, LG Electronics Inc. Submission IPv6 for ah Author: Date: July 19, 2011 NameCompanyAddressPhone .
MAC Header Compression
Submission doc.: IEEE 11-12/0420r2 March 2012 Fei Tong, CSRSlide 1 Providing extended range with limited transmission power in ah network Date: 14-March-2012.
Applications of Wireless Sensor Networks in Smart Grid Presented by Zhongming Zheng.
Doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 1 Coexistence of Legacy & RSN STAs in Public WLAN Byoung-Jo “J” Kim AT&T Labs-Research.
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
Analysis of the Performance of IEEE for Medical Sensor Body Area Networking ECE 5900 Computer Engineering Seminar Instructor: Dr. Chigan Huaming.
Wireless Video Sensor Networks Vijaya S Malla Harish Reddy Kottam Kirankumar Srilanka.
Doc.: IEEE /0672r0 Submission May 2011 ZTE CorporationSlide 1 IEEE ah network operation & management consideration for functional requirement.
1 Energy Efficient Communication in Wireless Sensor Networks Yingyue Xu 8/14/2015.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Doc.: IEEE /0323r0 SubmissionRon Porat, BroadcomSlide 1 Views on ah Use Cases Date: Authors: March 2011.
Doc.: IEEE /0028r1 Submission January 2012 Anna Pantelidou, Renesas Mobile CorporationSlide 1 Power Saving Possibilities for Networks Supporting.
Doc.: IEEE /376r1 Submission March 2012 Anna Pantelidou, Renesas Mobile CorporationSlide 1 On The BSS Max Idle Period Date: Authors:
Doc.: IEEE /650r0 Submission May 2012 Anna Pantelidou, Renesas Mobile CorporationSlide 1 Grouping Methodology Date: Authors:
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Doc.: IEEE /0585r1 Submission May 2012 David Halasz, Motorola MobilitySlide 1 IEEE ah and Security Date: Authors:
Doc.: IEEE /0060r1 Submission January 2011 Minyoung Park, Intel Corp.Slide 1 Low Power Capability Support for ah Date: Authors:
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Submission doc.: IEEE /0801r1 Akira Kishida, NTT Issues of Low-Rate Transmission Date: Authors:
Submission doc.: IEEE 11-12/0281r0 March 2012 Jarkko Kneckt, NokiaSlide 1 Recommendations for association Date: Authors:
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Doc.: IEEE /0089r0 Submission Listen interval update Jan 2013 Slide 1 Date: Authors: Jinsoo Choi, LG Electronics.
Submission doc.: IEEE 11-14/0877r0 July 2014 SK Yong et.al., AppleSlide 1 Generic Service Discovery Proposal: Dynamic Bloom Filter Operation Date:
Doc.: IEEE /0878r0 Submission July 2012 Timo Koskela, Renesas Mobile CorporationSlide 1 On the Channel Switching in ah Date:
Submission doc.: IEEE /1112r1 Use Case of LRLP Operation for IoT September 2015 Chittabrata Ghosh, IntelSlide 1 Date: Authors:
Doc.: IEEE /0750r1 Submission Use Case Document Definitions Date: May 2011 Tom Siep, CSRSlide 1 Authors:
Doc.: IEEE /0326r0 Submission Month Year Tom Siep, CSRSlide 1 Use Case Ref List Doc Discussion Date: Authors:
Submission Title: [Wireless Neighborhood Area Networks - WNAN] Date Submitted: [15 July, 2008] Source: [Tommy Childress]Company [Cellnet+Hunt] Address:
Doc.: IEEE /0863r0 Submission July 2012 David Halasz, Motorola MobilitySlide 1 Propagation delay and extended range IEEE Date:
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Doc.: IEEE /0435r1 Submission March 2011 Marc Emmelmann, Fraunhofer FOKUSSlide 1 Definitions and Terminology from Date: Authors:
Doc.: IEEE /1306r0 Submission November 2015 Tim Godfrey (EPRI)Slide 1 Use Case for LRLP and Full Function in STA. Date: Authors:
Doc.: IEEE /374r0 Submission March 2012 Anna Pantelidou, Renesas Mobile CorporationSlide 1 Grouping For.11ah Networks Date: Authors:
Doc.: IEEE /1378r0 Submission November 2008 Darwin Engwer, Nortel NetworksSlide 1 Improving Multicast Reliability Date: Authors:
Doc.: IEEE /0175r2 Submission June 2011 Slide 1 FCC TVWS Terminology Date: Authors: Peter Ecclesine, Cisco.
Doc.: IEEE /0337r0 Submission Mar 2011 Dwight Smith, Motorola MobilitySlide 1 Discussion – Issues with Access at Portals Date: Authors:
Doc.: IEEE /0364r3 SubmissionJeongki Kim, LG ElectronicsSlide 1 AID Reassignment Protocol Date: Authors: May 2012.
Submission doc.: IEEE 11-11/1204r1 ZTE CorporationSlide 1 Power saving mechanism consideration for ah framework Date: Authors: Sept 2011.
Doc.: IEEE /0970r1 Submission July 2011 Guixia Kang, BUPTSlide 1 IEEE ah Healthcare Use Cases Date: Authors:
Doc.: IEEE /0687r2 Submission May 2011 Michael Bahr, Siemens AGSlide 1 Need and proposal for necessary flexible DTIM setting in MBSSs with MCCA.
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Security Framework Date: Authors:
Doc.: IEEE /0409r5 Submission May 2012 Shoukang Zheng et. al, I2R, SingaporeSlide 1 Supporting Low Power Operation Date: Authors:
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Doc.: IEEE /1115r0 Submission November 2009 Samir Hodroj, T-Mobile USASlide 1 Firmware Notification Date: Authors:
ZigBee
Doc.: IEEE /0326r0 Submission Month Year Tom Siep, CSRSlide 1 Use Case Ref List Doc Discussion Date: Authors:
Submission doc.: IEEE /1064r0 September 2015 Jarkko Kneckt, NokiaSlide 1 Long Range, Low Power Design Criteria Date: Authors:
Submission doc.: IEEE /0443r0 March 2016 Shahrnaz Azizi, Intel Corporation Date: Addressing the range and power requirements of indoor.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
Proposed Functional Requirements for 11az
IEEE ah Healthcare Use Cases
WUR-based Power Save Operations of AP
Consideration on Max Idle Period Extension for ah Power Save
Bluetooth Based Smart Sensor Network
Proposed Functional Requirements for 11az
IEEE ah Timeline Projection
Use Case Document Definitions
Consideration on Max Idle Period Extension for ah Power Save
Setting of DTIM Interval for MCCA
Speaker : Yu-Ping Chen Advisor : Quincy Wu Date : 2010/01/17
Device Collectives to Share Resources
Consideration on Max Idle Period Extension for ah Power Save
Konstantinos Georgantas, HIIT
Presentation transcript:

doc.: IEEE /0573r1 Submission May 2012 David Halasz, Motorola MobilitySlide 1 Scalable Authentication Date: Authors:

doc.: IEEE /0573r1 Submission Overview This submission looks at use cases and requirements for security mechanisms based on These requirements were first presented in ah as ah-ieee ah-and-security Scalability –Scaling to very large number of devices –Scaling to low power long battery life devices –Scaling to minimize or distribute the requirements of authentication services May 2012 David Halasz, Motorola MobilitySlide 2

doc.: IEEE /0573r1 Submission Additional Use Cases of Interest Use Case 1 : Sensors, meters, smart objects [2] –Of particular interest since the traffic has characteristics that are not typical of most wireless LANS Use Case 2 : Backhaul Sensor and meter data [2] –Consumers access to meter data is different than utility access to meter data. [ 2] - 11/457r0, 11/17r5, 11/253, 11/241r0 May 2012 David Halasz, Motorola MobilitySlide 3

doc.: IEEE /0573r1 Submission Characteristics of Use Cases Devices in network may be procured from many vendors. The number of STAs/APs may be very large. Devices may have very long lifetime (20-30 years). Devices may be mobile over their lifetime, be recycled or replaced, or be redeployed. Installed devices may operate in spread-out locations, without physical protection or oversight by personnel. May 2012 David Halasz, Motorola MobilitySlide 4

doc.: IEEE /0573r1 Submission Characteristics of Use Case 1 Traffic is periodic with a small amount of data. Power consumption is a large concern. So sleep times will be larger than normal. The number of STAs per AP will be large and go beyond the current maximum AID range of Always-on connectivity to remote devices may not be guaranteed. Full Internet connectivity and access to remote AAA may not be guarenteed. May 2012 David Halasz, Motorola MobilitySlide 5

doc.: IEEE /0573r1 Submission Implications of Use Case 1 to Security Power consumption is a large concern. Need to try and keep security setup traffic to not be much larger than data. –Implication: Initial security establishment should be efficient in its use of the number of transmissions. –Implication: It will be desirable for security establishment to be valid across long client sleep time. –Implication: Initial security establishment should avoid involvement of remote network devices with unpredictable response times during the protocol. –Implication: Initial security establishment should avoid involvement of an on-line and remote network device. May 2012 David Halasz, Motorola MobilitySlide 6

doc.: IEEE /0573r1 Submission Implications of Use Case 1 to Security (2) APs will be concerned with the amount of memory required per STA. This is because there can be many STAs per AP. Also it is expected that many clients will desire traffic to be buffered over long sleep times. –Implication: Should look for ways to minimize memory needs on an AP. May 2012 David Halasz, Motorola MobilitySlide 7

doc.: IEEE /0573r1 Submission Use Cases 1 and 2 Implications to Security Configuration and maintenance cost is a large concern. So devices should be easy to install, without need for shielded set-up, pre-planning, or expensive personnel. Implication: Initial security establishment should minimize assumptions on coordination of security capabilities between devices (since this would reduce flexibility of deployment). Implication: Initial security establishment should not reduce flexibility of (re)deployment over lifetime. Implication: Initial security establishment should be carried out in operational network (“hot swap”). May 2012 David Halasz, Motorola MobilitySlide 8

doc.: IEEE /0573r1 Submission Use Cases 1 and 2 Implications to Security cont. STAs and APs will be concerned about computational cost of initial security establishment. Ill behaved devices may cause excessive calculations and consume energy. Implication: Should look for ways to increase efficiency of security calculations, in terms time latency and energy cost. May 2012 David Halasz, Motorola MobilitySlide 9

doc.: IEEE /0573r1 Submission Security and Specification Framework The draft specification shall define authentication mechanisms that may be used that avoid involvement of an on-line and remote network services. The draft specification definition of security establishment should not reduce flexibility of (re)deployment over lifetime. May 2012 Paul Lambert, MarvellSlide 10