Group Communications at Concordia J. William Atwood High Speed Protocols Laboratory Concordia University Montreal, Quebec, Canada.

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

Router Identification Problem Statement J.W. Atwood 2008/03/11
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Security Controls and Systems in E-Commerce
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
URP Usage Scenarios for NAS Yoshihiro Ohba August 2001 Toshiba America Research, Inc.
User Identity Policy Element Tim Moore Microsoft.
L. Alchaal & al. Page Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment Lina ALCHAAL Netcelo S.A., Echirolles INRIA.
Ólafur Ragnar Helgason – Reykjavik University - Distance learning using IP multicast Ólafur Ragnar Helgason Network Systems and Services.
SPI 2003 Secure Audio and Video Conferencing system Jaroslav Dočkal, Tomáš Bouček, Petr Dušek, Tomáš Koníř.
Securing the Broker Pattern Patrick Morrison 12/08/2005.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 67 - ANCP WG November 5-10, 2006 draft-moustafa-ancp-security-threats-00.txt.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Streaming Video over the Internet: Approaches and Directions Dapeng Wu, Yiwei Thomas Hou et al. Presented by: Abhishek Gupta
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Ubiquitous Access Control Workshop 1 7/17/06 Access Control and Authentication for Converged Networks Z. Judy Fu John Strassner Motorola Labs {judy.fu,
History Since created in 1995, RADIUS has been used to provide authentication, authorization and generate accounting information for dial-in users. However,
Circuit & Application Level Gateways CS-431 Dick Steflik.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
Integrated Security Model for SNMPv3 (ISMS) pronounced "is" "miss" David T. Perkins & Wes Hardaker 60 th IETF August 6, 2004.
Chapter 17 TACACS+.
Guoliang YANG Problem Statement of China Telecom.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
PMIPv6 multicasting support using native infrastructure draft-sijeon-multimob-direct-routing-pmip6-01.txt Seil Jeon and Younghan Kim 81 st IETF, July 2011,
A Policy Framework for Multicast Group Control Salekul Islam and J. William Atwood Concordia University Department of Computer Science and Software Engineering.
Users’ Authentication in the VRVS System David Collados California Institute of Technology November 20th, 2003TERENA - Authentication & Authorization.
1 Open Pluggable Edge Services OPES Abbie Barbir, Ph.D.
1 AAA Framework for Multicasting draft-ietf-mboned-multiaaa-framework-01.txt July 11, 2006 Hiroaki Satou Hiroshi Ohta
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Support Services & IP Multimedia Subsystem (IMS)
1 Accounting, Authentication and Authorization Issues in “Well Managed” IP Multicasting Services November 9, 2005 Tsunemasa Hayashi
D1 - 04/10/2015 Present document contains informations proprietary to France Telecom. Accepting this document means for its recipient he or she recognizes.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
NTT 2005 © 1 AAA Framework for Multicasting draft-satou-multiaaa-framework-00.txt November 9th, 2005 Hiroaki Satou Hiroshi.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
1 Policy-based architecture. 2 Policy management view of the architecture IP MMed domain is a converged services domain where voice, video, data are provided.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
WLAN-GPRS Integration For Next-Generation Mobile Data Networks Wireless Communications IEEE 2002 報告者:陳崇凱.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
SAML for SIP Hannes Tschofenig, Jon Peterson, James Polk, Douglas Sicker, Marcus Tegnander.
Configuring AAA Kamyar Miremadi Laila Sherif Summer 2005.
Alex Leifheit NETWORKS. NETWORK A number of interconnected computers, machines, or operations. Key Components Network components, Network Architecture,
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
Understand Internet Security LESSON Security Fundamentals.
IP Multicast Receiver Access Control draft-atwood-mboned-mrac-req draft-atwood-mboned-mrac-arch.
Softwire Security Requirement Update draft-ietf-softwire-security-requirements-02.txt IETF Meeting, Prague March 19, 2007 Shu Yamamoto Carl Williams Florent.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Zueyong Zhu† and J. William Atwood‡
P2P Streaming for Mobile Nodes: Scenarios and Related Issues
Secure Electronic Transaction
Multicast in Virtual Router-based IP VPNs
ISMS Information Security Management System
J. William Atwood Bing Li Concordia University, Montreal
Authors: Hannes Tschofenig Henning Schulzrinne Maarten Buechli
IEEE MEDIA INDEPENDENT HANDOVER
Policy-Based IPSec Management (Role combination)
3GPP and SIP-AAA requirements
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

Group Communications at Concordia J. William Atwood High Speed Protocols Laboratory Concordia University Montreal, Quebec, Canada

2007/01/11 Group Communications at Concordia2 Problem Statement No one can make money using multicast Solution Add Security Add User Identification Add (distributed) Accounting

2007/01/11 Group Communications at Concordia3 IETF Mboned Working Group Multicast Accounting Requirements draft-ietf-mboned-macct-req-04.txt Multicast AAA Framework draft-ietf-mboned-multiaaa-framework- 02.txt

2007/01/11 Group Communications at Concordia4 IETF Multicast Accounting Requirements What is needed for a “fully AAA enabled IP multicast network”? Recognition that “proprietary solutions” are not desirable Recognition that requirements include provision of Quality of Service 14 identified functional requirements

2007/01/11 Group Communications at Concordia5 IETF Framework Provides a framework for AAA End User (EU) Content Provider (CP) Network Service Provider (NSP)

2007/01/11 Group Communications at Concordia6 An Architecture for Group Management More interacting components than are discussed in the IETF work Actors Content provider (CP) Merchant (MR) Financial Institution (FI) Network Service Provider (NSP) End User (EU)

2007/01/11 Group Communications at Concordia7 Component Interactions CPMRFI NSP EU

2007/01/11 Group Communications at Concordia8 Requirements Identify participants (Authentication) Authorize Participants (Authorization) Account for resource usage Authenticate sender Confidentiality (if required)

2007/01/11 Group Communications at Concordia9 Subdividing the CP and NSP Content provider Content server Network Service Provider AAA Server Core Routers Access Routers

2007/01/11 Group Communications at Concordia10 Sequence of Actions CPMRFI NSP EU AAASNAS/AR CR RP NAS/ AR

2007/01/11 Group Communications at Concordia11 Status 1 Key management PhD Dissertation on use of Proxy Encryption completed MCS Thesis on Packet Manipulation completed Visiting colleague: paper on use of HIP

2007/01/11 Group Communications at Concordia12 Status 2 User Identification and AAA MCS Thesis on EU/AR/AAAS interactions completed PhD Dissertation on mechanisms and policies in progress – presented today

2007/01/11 Group Communications at Concordia13 Status 3 Deployment PhD Dissertation on deployment strategies and mechanisms almost completed

2007/01/11 Group Communications at Concordia14 Status 4 Securing the business and financial interactions MCS Thesis completed PhD Dissertation beginning

2007/01/11 Group Communications at Concordia15 For more information