Security Association Establishment for Handover Protocols Jari Arkko Ericsson Research NomadicLab.

Slides:



Advertisements
Similar presentations
802.1AF - directions define requirements to find and create connections in terms of Discovery - Authentication - Enable 1.Discover of what can be done.
Advertisements

Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Fast and Secure Universal Roaming Service for Mobile Internet Yeali S. Sun, Yu-Chun Pan, Meng-Chang Chen.
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
AAA Mobile IPv6 Application Framework draft-yegin-mip6-aaa-fwk-00.txt Alper Yegin IETF 61 – 12 Nov 2004.
1 DHCP-based Fast Handover protocol NTT Network service systems laboratories Takeshi Ogawa draft-ogawa-fhopt-00.txt 62nd IETF - Minneapolis.
Overview of the Mobile IPv6 Bootstrapping Problem James Kempf DoCoMo Labs USA Thursday March 10, 2005.
1 Role of Authorization in Wireless Network Security Pasi Eronen Jari Arkko November 3, 2004 This document has been produced partially in the context of.
Bootstrapping MIP6 Using DNS and IKEv2 (BMIP) James Kempf Samita Chakrarabarti Erik Nordmark draft-chakrabarti-mip6-bmip-01.txt Monday March 7, 2005.
1 Arkko et al, DIMACS Workshop Nov ‘04 Secure and Efficient Network Access DIMACS Workshop, November 3 rd, 2004, Piscataway, NJ, USA Jari Arkko Ericsson.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
Media-Independent Pre-Authentication (draft-ohba-mobopts-mpa-framework-01.txt) (draft-ohba-mobopts-mpa-implementation-01.txt) Ashutosh Dutta, Telcordia.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
November st IETF MIP6 WG Mobile IPv6 Bootstrapping Architecture using DHCP draft-ohba-mip6-boot-arch-dhcp-00 Yoshihiro Ohba, Rafael Marin Lopez,
1 EAP Usage Issues Feb 05 Jari Arkko. 2 Typical EAP Usage PPP authentication Wireless LAN authentication –802.1x and i IKEv2 EAP authentication.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Problem Statement for Authentication Signaling Optimization Date.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
August 1, 2005IETF63 PANA WG Pre-authentication Support for PANA (draft-ohba-pana-preauth-00.txt) Yoshihiro Ohba
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Proposal for IEEE Study Group on Security Signaling Optimization.
A Route Optimization Scheme Based on Roaming in PMIPv6 (pROR) S.-s. Oh, H.-Y. Choi, and S.-G. Min 1 in Fifth International Joint Conference on INC, IMS.
1 Julien Laganier MEXT WG, IETF-79, Nov Authorizing MIPv6 Binding Update with Cryptographically Generated Addresses
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
1 Local Security Association (LSA) The Temporary Shared Key (TSK) draft-le-aaa-lsa-tsk-00.txt Stefano M. Faccin, Franck Le.
IEEE MEDIA INDEPENDENT HANDOVER Title: An Architecture for Security Optimization During Handovers Date Submitted: September,
AAA and Mobile IPv6 Franck Le AAA WG - IETF55. Why Diameter support for Mobile IPv6? Mobile IPv6 is a routing protocol and does not deal with issues related.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Detailed analysis on MIA/MSA architecture Date Submitted: January 5, 2010 Present.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
1 Arkko, 57th IETF: SEND base protocol issue list Issues in the SEND base document draft-ietf-send-ipsec-01.txt
August 2, 2005draft-vidya-mipshop-fast-handover-aaa-00 Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-00.txt) Vidya Narayanan Narayanan.
1 NetLMM Vidya Narayanan Jonne Soininen
Secure Neighbor Discovery in IPv6 Jari Arkko Ericsson Research James Kempf DoCoMo US Labs.
1 Background and Introduction. 2 Outline History Scope Administrative.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Sec Title: Considerations on use of TLS for MIH protection Date Submitted: January 14, 2010.
Problem Scope Objective To demonstrate/determine clearly the need for an edge protocol that allows a user to interact with an agent in the network for.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
+ Solution Overview (LR procedure) The whole sequence for localized routing Local routing capability detection Local routing Initiation LR scope or LR.
IEEE MEDIA INDEPENDENT HANDOVER Title: Use Cases, Security Study Group Date Submitted: Nov 13 th, 2007 Presented at: IEEE Security SG Authors.
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
1 Alternative (Future) Proposals for MIPv6 Security MIP6 BOF/WG IETF-57 Jari Arkko, Ericsson Research NomadicLab Charlie Perkins, Nokia Research Center.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
1 Network Selection Problem Definition Draft-ietf-eap-netsel-problem-01.txt Jari Arkko Bernard Aboba.
Presentation at ISMS WG Meeting1 ISMS – March 2005 IETF David T. Perkins.
NETLMM Applicability Draft (Summary) 28 Sep
San Diego, August 2004 IETF 60 th – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-01) Gerardo Giaretta.
Minneapolis, March 2005 IETF 62 nd – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena Demaria.
IEEE MEDIA INDEPENDENT HANDOVER Title: An Architecture for Security Optimization During Handovers Date Submitted: September,
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-05.txt Bernard Aboba Microsoft IETF 62, Minneapolis, MN.
August 4, 2004EAP WG, IETF 601 Authenticated service identities for EAP (draft-arkko-eap-service-identity-auth-00) Jari Arkko Pasi Eronen.
Thoughts on Bootstrapping Mobility Securely Chairs, with help from James Kempf, Jari Arkko MIP6 WG/BOF 57 th IETF Vienna Wed. July 16, 2003.
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Media-Independent Pre-authentication (MPA) Framework
Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-01.txt)
for IP Mobility Protocols
Jari Arkko Bernard Aboba
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho
NETLMM Applicability Draft (Summary)
CARD Designteam A. Singh, D. Funato, H. Chaskar, M. Liebsch
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

Security Association Establishment for Handover Protocols Jari Arkko Ericsson Research NomadicLab

Outline l Scope l Problem l Solutions

Scope -- Movements AR AP AAA MN AR AP RRRR

Scope -- Movements AR AP AAA MN AR AP RRRR As it moves to a new place, the MN needs to talk to (1) Access points

Scope -- Movements AR AP AAA MN AR AP RRRR As it moves to a new place, the MN needs to talk to (1) Access points (2) AAA

Scope -- Movements AR AP AAA MN AR AP RRRR As it moves to a new place, the MN needs to talk to (1) Access points (2) AAA (3) Access routers

Scope -- Movements AR AP AAA MN AR AP RRRR As it moves to a new place, the MN needs to talk to (1) Access points (2) AAA (3) Access routers (4) Possibly other routers

Scope - The Access Router zThe focus of this presentation is the communication with the access router zCurrent general case is that no security is used for this communication, plain forwarding/ND/ICMP is just used zThis does not hold for all protocols -- many mobility protocols need a security association between the MN and the AR yExamples: Context Transfer, Fast Handover, CARD yDifferent types of security associations are needed in different cases

The Problem zCurrent mobility protocols themselves do not provide security association establishment zConfiguration of pair-wise security associations between all MNs and ARs is not practical zReliance to a trusted 3rd party might not answer to important authorization questions (e.g., can *this* node request *that* stream to be moved with FMIP?) zWhat are the options?

Options for SA establishment 1/2 zIKE? yIssue 1: Shared key provisioning between MN and an arbitrary visited network router yIssue 2: Authorization? zKey derivation as side effect of network access AAA yFor instance, branch off new key hierarchy from EAP reserved keys yCan be defined for network access purposes, needs a new system-level security design draft in EAP WG yIssue 1: may require a new node to be involved in addition to the AAA and AP -- how to send keys to that? yIssue 2: theoretical vs. practical availability of an underlying AAA run -- e.g. likelihood of UAM vs X authentication -- though maybe not an issue if you are doing fast movements (?)

Options for SA establishment 2/2 zKey derivation as side effect of network access AAA cont’d yIssue 3: inter-admin handovers -- e.g. from my home AR to the city AR, no roaming may be involved if I just have two credentials zSEND-like solution? yOne-sided certificates for routers (SEND RS/RA part) -- used in CARD yIssue: certificate revokation checks? yAddress ownership (IPR may apply) -- used in draft-kempf- mobopts-handover-key-00.txt zA single mechanism vs. allowing multiple?

Framework - Fundamentals zSource of trust -- pairwise config vs. trusted 3rd party (CA or AAA) vs. intrinsic proofs such as address ownership zDeployment -- need per mobile node configuration or not? zAuthorization -- what can you do with the AR?

Framework - Protocol Design Issues zReuse -- independent vs. reuse of security for another purpose zLayering -- interaction with a lower layer vs. independent yUsing a branch of EAP AMSK vs. rerunning EAP zSeparation of SA establishment and use -- but what about authorization? zType of an SA? yLikely “application” specific yBut ability to use MIPv6 BAD would often be useful zEfficiency -- look at the # messages and timing of the whole flow

Tentative Proposal zRely on router certificates whenever possible yExample: CARD, SEND yManufacturing and configuring MNs is easy yWorked well for the web yApplicable when no trust for the MN is needed zUse “application specific” security for MN if really needed yExample: draft-kempf-handover-key-00.txt yMay not need any configuration! zSeparate certs/ownership vs. use of this yBetter separation than assuming a kmgmt protocol that provides a shared secret