21-07-0446-00-00001 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-07-0446-00-0000 Title: Security SG Report Date Submitted: November 20, 2007 Authors.

Slides:



Advertisements
Similar presentations
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Security SG Opening Notes Date Submitted: May 13, 2008 Presented.
Advertisements

IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Security TG Closing Note Date Submitted: January 22, 2009 Presented at IEEE
IEEE MEDIA INDEPENDENT HANDOVER DCN: hwnm Title: HWN Mgmt. SG Closing Report Date Submitted: July 15, 2010 Presented at IEEE
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec Title: Initiate An Exercise for Generating a 21a Document Date Submitted: September 21, 2009.
DAIDALOS /11 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: DVB-H Motion Date Submitted: March, 2008 Presented.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Functional Requirements for SRHO Date Submitted: Jan, 2010 Presented at IEEE
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Your Title Here Date Submitted: Month, NN, 200x Presented at IEEE.
21-06-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx Title: Pre-establishment of IP connectivity discussion Date Submitted:
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Initial Proposal on IEEE Down Selection Process Date Submitted: October 12,
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx LB1c-handover-issues.ppt Title: Handover Commands Thoughts and Open Issues.
_3gpp_inter-tech_handover IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Considerations for 3GPP/non-3GPP Handover.
IEEE MEDIA INDEPENDENT HANDOVER Title: Multi-Radio Power Management Date Submitted: September, 2007 Presented at IEEE 802 September.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MEDIA INDEPENDENT HANDOVER – Heterogeneous-RAT Mobility within.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Report on Potential Link Sync Events for IEEE r Date Submitted:
Doc.: IEEE /xxxxr0 Submission March 2007 Srinivas Sreemanthula Slide 1 IEEE MEDIA INDEPENDENT HANDOVER DCN: SSID-info-MIH-IS.ppt.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Security SG Notes Date Submitted: September, 19, 2007 Presented at IEEE
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Possible MIH security approaches and issues Date Submitted: September.
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx Title: Proposal for adding a key hierarchy based approach in the security.
DCN: ieee u-update Stephen McCann, Siemens Roke Manor IEEE MEDIA INDEPENDENT HANDOVER DCN: ieee u-update.
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Annex A.7 abnormal handover flow Date Submitted: May 24, 2007 Presented at IEEE
es IEEE MEDIA INDEPENDENT HANDOVER DCN: es Title: Response to ES PAR and 5C Comments Date Submitted: March.
IEEE DCN: Title: TG Opening Note Date Submitted: November 11, 2013 IEEE session #59 in Dallas, TX, USA Authors or Source(s):
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: SB Recirculation-2 Summary Date Submitted: January 2008 Presented.
21-08-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: XXXX Title: MIH_MN_HO_Commit Revisited Date Submitted: March, 2008 Presented.
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho Title: More Discussion on “MGW vs. MIH-PoS” in IEEE c Date Submitted: Sept. 19 th,
support_for_comment_res1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Length Encoding Example Date Submitted:
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Issues with Splitting HO Commands Date Submitted: January 11,
ES-CS-Adhoc-Rep.ppt IEEE MEDIA INDEPENDENT HANDOVER DCN: ES-CS-Adhoc-Rep.ppt Title: ES/CS Ad-hoc Discussions.
xxx IEEE MEDIA INDEPENDENT HANDOVER Title: Mobile Device MIH Model Date Submitted: Sept. 07 Presented at IEEE session #22,
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Application Considerations in Handover Date Submitted: July, 15, 2004 Presented at.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Security SG Report Date Submitted: September 20, 2007 Presented.
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx Title: IETF Liaison Report Date Submitted: November 16, 2006 Presented.
IEEE MEDIA INDEPENDENT HANDOVER Title: An Architecture for Security Optimization During Handovers Date Submitted: September,
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IETF Pre-authentication Activity Date Submitted: February 26, 2006.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: bcast
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: bcast
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Your Title Here
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: mugm
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Presentation transcript:

IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Security SG Report Date Submitted: November 20, 2007 Authors or Source(s): Yoshihiro Ohba Abstract: Report of Security SG meeting at IEEE session 23 in Atlanta

IEEE presentation release statements This document has been prepared to assist the IEEE Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEEs name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEEs sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE The contributor is familiar with IEEE patent policy, as outlined in Section 6.3 of the IEEE-SA Standards Board Operations Manual and in Understanding Patent Issues During IEEE Standards Development Section 6.3 of the IEEE-SA Standards Board Operations Manualhttp://standards.ieee.org/guides/opman/sect6.html#6.3 IEEE presentation release statements This document has been prepared to assist the IEEE Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEEs name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEEs sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE The contributor is familiar with IEEE patent policy, as stated in Section 6 of the IEEE-SA Standards Board bylaws and in Understanding Patent Issues During IEEE Standards Development Section 6 of the IEEE-SA Standards Board bylawshttp://standards.ieee.org/guides/bylaws/sect6-7.html#6

Outline Two meeting slots: Nov. 17 (Mon) AM2, Nov. 15 (Thu) PM2 4 TR (Technical Report) contributions All contributions address Security Signaling Optimization during Handover (SSOH) One contribution also addresses MIH-level Security Mechanism (MIHS) One contribution for performance evaluation on SSOH One contribution for combining security signaling and QoS resource reservation Discussed PAR and 5C issues There will be 2 nd call for TR contributions before January 2007 meeting

TR contribution on re-authentication TR contribution: MIH_Key_Hierarchy.dochttp:// MIH_Key_Hierarchy.doc Presented slides: MIH%20key-hierarchy%20approaches.ppthttp:// MIH%20key-hierarchy%20approaches.ppt The contribution addresses inter-technology handover between EAP-based technologies using HOKEY re-authentication Re-authentication may be performed proactively via the serving network, or reactively via the target network Proactive re-authentication may require a new work in In reactive re-authentication, native EAP transport defined in each link-layer such as 802.1X may be used with or without modification Need for a new work in is smaller than proactive re- authentication In both proactive and reactive re-authentication, candidate authenticator discovery mechanism is needed

TR contribution on inter-domain handover w/ pre-authentication TR contribution: %20security_signaling_inter-domain.doc %20security_signaling_inter-domain.doc Presented slides: %20security_signaling_inter-domain.ppt %20security_signaling_inter-domain.ppt The contribution addresses inter-domain handover where a direct or indirect trust relationship exists between the serving and target network Pre-authentication is identified as the potential approach In the case of indirect trust relationship, pre-authentication signaling needs be performed along the chain of trust Proxy authenticator is introduced to support pre- authentication across domains with indirect trust relationship

TR contribution on inter-technology handover w/ pre- authentication (1/2) TR contribution: Security%20SG%20Use%20Case.doc Security%20SG%20Use%20Case.doc Presented slides: %20-Use%20Case.ppt %20-Use%20Case.ppt The contribution addresses inter-technology handover between specific technologies: and Pre-authentication is identified as the potential approach The same approach is generally applicable to other technologies as long as the target network supports EAP

TR contribution on inter-technology handover w/ pre- authentication (2/2) TR contribution: MIH_Security_TR_Use_Case_Scenarios.doc MIH_Security_TR_Use_Case_Scenarios.doc Presented slides: Use_Case_Scenario.ppt Use_Case_Scenario.ppt The contribution addresses inter-technology handover to a specific set of technologies that support EAP Inter-domain handover is also supported Handover to Non-EAP technologies are not supported

Performance evaluation on SSOH Authentication%20Signaling%20Performance%20in%20MIH.p pthttp:// Authentication%20Signaling%20Performance%20in%20MIH.p pt NS-2 simulation results are shown on security signaling performance for full authentication, re-authentication and pre- authentication for handover between and Full authentication is based on EAP-TTLS w/MD5 Re-authentication is based on HOKEY ERX Three performance metrics: EAP latency, post-handover security signaling latency and transmission latency Some issues with simulation conditions AAA latency is underestimated Simulation runs unnecessarily EAP during r FT Additional evaluation is encouraged

Combining security signaling and QoS resource reservation secure_Handover_with_QoS.ppthttp:// secure_Handover_with_QoS.ppt The purpose is to provide seamless mobility with QoS Proactive QoS signaling for resource reservations at IP layer using QoS NSLP where anticipation of movement is feasible The proposed approach is to combine network access authentication and QoS signaling Even the two types of signaling are combined, network access authentication needs to complete before QoS reservation

Discussion on PAR and 5C PAR-related material: SSG_Scope_Issues.ppt SSG_Scope_Issues.ppt 5C-related material: Annex A of Support for Non-EAP authentication was discussed heavily Straw poll was taken Support for handover with EAP: Yes(20)/No(0) Support for handover with Non-EAP: Yes(10)/ No(7) Support for inter-technology handover: Yes(21)/No(0) Open issues Definition of administrative domain needs to be revised to cover a scenario where multiple ESSes are served by a single AAA server Clarification on relationship with Linksec is needed

Security SG Milestones November 2007 All contributions intended to be included in the TR need to be submitted before the meeting Detailed submission guidelines will be posted to the reflector PAR/5C discussion January 2008 All major studies are expected to be done PAR/5C discussion February 2008 Submit PAR/5C to IEEE 802 EC to create a TG March 2008 Completion of TR Discuss feedback on PAR/5C Joint Meeting with Link Security Task Group Done

Next Steps Jan Meeting SSOH: Security Signaling Optimization during Handover MIHS: MIH-level Security mechanism 4 TR Contributions 1 TR Contribution On SSOH TR Contributions on MIHS, etc. Baseline TR Nov Meeting PAR/5C Mar Meeting TR PAR/5C Submission to EC (by Feb 14, 2008) Presentation of PAR to general 802 membership Approval by EC Coordination w/ other WGs Approval by WG PAR Submission to IEEE-SA Standards Board Submission Deadline: Jan. 7, 2008