Identities and Network Access Identifier in M2M Page 1 © 2010 3GPP2 3GPP2 and its Organizational Partners claim copyright in this document and individual.

Slides:



Advertisements
Similar presentations
Binding of cdma2000 access subscription with specific device(s) 3GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
Advertisements

Use cases for Device Binding 3GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
Page 1 Title: Traffic Detection Function Extensions for cdma2000 1x and HRPD Networks Sources: Qualcomm Contact: George Cherian
Mobile IPv4 FA CoA Support in WLAN Interworking Raymond Hsu Qualcomm Inc. Notice: QUALCOMM Incorporated grants a free, irrevocable license.
Dynamic HA Assignment for MIPv4 in WLAN Interworking Raymond Hsu, Qualcomm Inc., Wing C. Lau, Qualcomm Inc., Notice:
MIP6-HA-Local-Assignment-Capability indication to MS Contributors grant a free, irrevocable license to 3GPP2 and its Organization Partners.
Source Avi Lior, Bridgewater Jun Wang and George Cherian, Qualcomm Incorporated Dec 07, 2009 Page 1 IPv4 Exhaustion and IPv4-IPv6 Transition in 3GPP2 Notice.
1 DSMIP6 Support QUALCOMM Inc. Jun Wang, George Cherian, Masa Shirota Notice.
IP Connectivity for E911 in HRPD/PDS Networks Page 1 IP Connectivity for Emergency Calls in HRPD/PDS Networks 3GPP2 Meeting, 1/07 IP Connectivity for Emergency.
XHRPD Example Scenario for MSS Masa Shirota Qualcomm Inc. July 15, GPP2 Dalian Meeting Recommendation: FYI Notice QUALCOMM Incorporated grants a.
Overview & Definitions for Downloadable Credentials 1 S GPP2 TSG-S WG1 Source: Sprint, US Cellular, Motorola Mobility, Qualcomm Contact(s):
HRPD Femto Local IP Access: Overview Peerapol Tinnakornsrisuphap Qualcomm October 27 th, GPP2 Seoul,
1 IP Service Authorization Support and Mobility Selection for X.S0011-E Source: QUALCOMM Inc.: Masa Shirota, George Cherian, Jun Wang,
1 | 3GPP2 TSG-X Discussion | December GPP2 X R1 TITLE: TITLE: M2M Deployment Scenarios for 3GPP2SOURCE Mike Dolan, Alcatel-Lucent,
May 14, 2007 Violeta Cakulev, Mike Dolan, Frank Alfano, Nancy Lee - Alcatel-Lucent ABSTRACT: This contribution discusses the benefits on several features.
1 May 14, 2007 Zhibi Wang, Simon Mizikovsky – Alcatel-Lucent Vidya Narayanan, Anand Palanigounder – QUALCOMM ABSTRACT: Access authentication architecture.
1 cdma2000® Data Service Transition to NULL Support Jun Wang Ravi Patwardhan June 5, 2003 Recommendation -
© Alcatel-Lucent | M2M Numbering | April 12, GPP2 M2M TITLE Numbering in 3GPP2 for M2MSOURCE Mike Dolan, Alcatel-Lucent, Mike.
Revised Solution for Device Binding Revised from S GPP2 TSG-SX WG4 SX Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
Broadcast Area Based Management for BCMCS Quanzhong Gao Weidong Wu 04/05/2005.
Security Framework for (e)HRPD 1 S GPP2 TSG-S WG4 Source: QUALCOMM Incorporated Contact(s): Anand Palanigounder
1 IPsec-based MIP6 Security Qualcomm Inc. Starent Inc. Notice: Contributors grant free, irrevocable license to 3GPP2 and its Organization Partners to incorporate.
IP Packet Tunneling and Routing in UMB March 26 th, 2007 Qualcomm/Alcatel-Lucent/Hitachi Notice Contributors grant a free, irrevocable license to 3GPP2.
1 Notice Contributors grant a free, irrevocable license to 3GPP2 and its Organization Partners to incorporate text or other copyrightable material contained.
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
QUALCOMM PROPRIETARY 3GPP2 Network Evolution Architecture Dec. 04, 2006 Lucent Technologies Nortel Networks Qualcomm Inc. Hitachi, Ltd Huawei Technologies.
1 A13 Proxy for supporting HRPD Handout from femto AP to macro AN Peerapol Tinnakornsrisuphap David Ott
1 Flow Mobility Support QUALCOMM Inc. George Cherian, Jun Wang, Masa Shirota
HUAWEI TECHNOLOGIES CO., LTD. Slide title :32-35pt Color: R153 G0 B0 Corporate Font : FrutigerNext LT Medium Font to be used by customers and partners.
X xxx China Telecom Requirements on Accounting at HA/LMA Title: Accounting at HA/LMA for cdma2000 (Work Item # 3GPP ) Sources: China Telecom.
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
Proposed 1x Device Binding Solution Based on SX & SX GPP2 TSG-SX WG4 SX Source(s): Qualcomm Incorporated.
80-VXXX-X A July 2008 Page 1 QUALCOMM Confidential and Proprietary PMIP Comparison QUALCOMM Inc. Jun Wang, George Cherian, Masa Shirota
Proposed Solution for Device Binding 3GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
May 12, 2008 Alcatel Lucent, Cisco, Motorola, Nortel, Verizon ABSTRACT: Proposed is additional key hierarchy and derivation for EPS access over eHRPD.
X xxx ZTE Discussion on cdma2000 Charging with PCC Title: Discussion on PCC Charging for cdma2000 1x and HRPD Sources: China Telecom, ZTE Contact:
Mobility Management in WLAN IW Inma Carrion, Vijay DevarapalliNokia Raymond HsuQualcomm Inc. Pete McCann, Frank AlfanoLucent Serge ManningSprint Notice:
FMS/TR-069 File Download Security Source: QUALCOMM Incorporated Contact(s): Anand Palanigounder Yinian Mao
1 Authentication and User Profile April 24, 2007 Jun Wang QUALCOMM Inc. Notice Contributors grant a free, irrevocable license to 3GPP2 and its Organization.
Title: Placement of ROHC, Authenticator and Requirements for a robust Mobility Management Scheme Abstract: This contribution proposes a new architectural.
X xx ZTE VSP Proposal 1 Title: 3GPP2 Specific Vendor Specific Protocol Sources: ZTE Contact: Rajesh Bhalla
User Notification Protocol Nikolai Leung, QUALCOMM Incorporated (703) Notice: QUALCOMM Incorporated grants.
Background Both RoHCv1 and RoHC v2 are supported in 3GPP LTE R8 and R9
Supporting Local Breakout in HRPD Femto Peerapol Tinnakornsrisuphap Qualcomm Doug Knisely
Jun Wang Anand Palanigounder Peerapol Tinnakornsrisuphap
3GPP2 Network Evolution: UMB->HRPD Handoff October 16, 2007 Qualcomm Inc. Contact: Jun Wang Notice Contributors grant a free, irrevocable license to 3GPP2.
Remote access to Local IP network via Femto Peerapol Tinnakornsrisuphap Anand Palanigounder
Title: Network Firewall Configuration and Control (NFCC): High Level Overview Trevor Plestid x4138 Dan Willey
Page 1 C.S Bug Fix Masa Shirota, QUALCOMM Inc. October 25, 2010 Recommendation: FYI Notice QUALCOMM Incorporated.
X xxx ZTE Discussion on cdma2000 Charging with PCC Title: Inter-RAT RAN information management protocol Stack Sources: NSN Contact: Scott Marin,
3GPP2 X xxx Title: Subscriber QoS Profile Support in eHRPD System Sources: China Telecom, ZTE Contact: CT: Peirong Li Wenyi.
Page 1 Notice © All rights reserved. Qualcomm Incorporated grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate.
1 Remote IP Access - Stage 2 Architecture proposal for adoption Peerapol Tinnakornsrisuphap Anand.
Jun Wang Anand Palanigounder Peerapol Tinnakornsrisuphap
EHRPD-LTE Inter Technology Spectrum Optimization Source: Qualcomm Incorporated Contact: Jun Wang/George Cherian September 9, 2013 Notice ©2013. All rights.
EAP over HRPD Comments Qualcomm, Inc. Vidya Narayanan, Dondeti, Lakshminath, Jun Wang, Pete Barany Notice: QUALCOMM Incorporated grants a free, irrevocable.
1 HRPD Fast Handoff Jun Wang and Raymond Hsu Qualcomm Inc Notice: QUALCOMM Incorporated grants a free, irrevocable license to 3GPP2 and its Organization.
1 Notice (c) ZTE CORPORATION. ZTE Corporation, grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other.
1 SAMSUNG BCMCS Security Architecture and Key Management JUNHYUK SONG SAMSUNG Incorporated grants a free, irrevocable license to 3GPP2 and its Organization.
1 PPP Free Operation Mobility Management January 16, 2006 Jun Wang, Pete Barany, Raymond Hsu Qualcomm Inc Notice: Contributors grant free, irrevocable.
1 On 3GPP2 Femto Security Anand Palanigounder Qualcomm Inc. Notice: Contributors grant a free, irrevocable license to 3GPP2 and its Organization.
Signaling Packet Routing for Layer 3 approach in UMB-HRPD/1x interworking KDDI Corporation, Tsunehiko Chiba, Osamu.
WLAN IW Enhancement for Multiple Authentications Support QUALCOMM Inc.: Raymond Hsu, QUALCOMM Inc.: Masa Shirota,
3GPP2 A r0 3GPP2 C xxxr0 TSG-A WG3 and TSG-C WG2 Title: M2M Congestion Control in the RAN Source: Mike Dolan Dave Rossetti Satish.
Clarifications on Work Split among TSG-X/A for 3GPP2 Network Evolution March 26, 2007 Airvana/Alcatel-Lucent/CTC/Fujitsu/ Hitachi/KDDI/NEC/Qualcomm/ZTE.
1 IP Service Authorization Support and Mobility Selection Source: QUALCOMM Inc.: Masa Shirota, George Cherian, Jun Wang,
Source: Qualcomm Incorporated Contact: Jun Wang, George Cherian March 1, 2010 Page 1 3GPP2 Femtocell Phase II Femto Access Control Enhancement Notice ©
Requirement for Proxy Mobile IP tunnel for AGW-eBS data tunnel Qualcomm, Inc. Contributors grant a free, irrevocable license to 3GPP2 and its Organization.
Presentation transcript:

Identities and Network Access Identifier in M2M Page 1 © GPP2 3GPP2 and its Organizational Partners claim copyright in this document and individual Organizational Partners may copyright and issue documents or standards publications in individual Organizational Partner's name based on this document. Requests for reproduction of this document should be directed to the 3GPP2 Secretariat at Requests to reproduce individual Organizational Partner's documents should be directed to that Organizational Partner. See for more information. This document has been prepared by Bridgewater Systems to assist the development of specifications by 3GPP2. It is proposed to the specification formulating group as a basis for discussion and is not to be construed as a binding proposal on the contributor. Huawei Technologies specifically reserves the right to amend or modify the material contained herein and nothing herein shall be construed as conferring or offering licenses or rights with respect to any intellectual property of Bridgewater Systems. Bridgewater Systems is also willing to grant licenses under such contributor copyrights to third parties on reasonable, non-discriminatory terms and conditions for purpose of practicing 3GPP2’s specifications which incorporates this contribution. Notice: M2M Source:Bridgewater Systems Contact:Avi Lior December 6, 2010

Identities Identify an entity in a domain – Identity’s uniqueness can be global, in which case, for example the identities are assigned by a central body. E.g., MAC address – Identity’s uniqueness can be non-global that is, relative to a specific domain User’s login name is unique within the domain of the service provider. We can make such identities globally unique by associating globally unique information with the identity. – Eg., loginname + service provider’s globally unique identitfier

Authentication We authenticate because we want to ensure we provide service to known entities for various reasons. We have two parties: – Authenticator: the entity that wants to know whether something is authentic – Authoritative party: the entity trusted by the Authenticator that performs the authentication (Authentication Server) To authenticate an entity the Authoritative party typically uses the entity’s identity to find a shared secret that it and the entity being authenticated knows. – Secret: something that the authenticating party knows, or trusted third party knows. – PKI based authentication is different. To authenticate an entity, the Authenticator needs to know the Authoritative party directly or indirectly. – The Authenticator does not need to know the identity of the entity.

Login example Entity wants service and presents the Authenticator with an identity (login name) and authoritative party (home network) – Authenticator contacts the Authoritative party passing it the login name – The authoritative domain uses the login name to authenticate the entity. Using some authentication procedure. Two requirements: – The identity must only be unique within the context of the Authoritative party. – Authenticator must be able to locate the Authoritative party.

Identity Privacy - Identity Hiding For privacy reasons, the identity can be hidden from the Authenticating party. All the Authenticating party needs to know is the authoritative party or a route to it. The Authoritative party will use some mechanism to identify the entity to be authenticated. – Obtain the identity via a secured communication channel with the entity being authenticated – Use a pseudo-identity that can be used to determine the true identity.

Authentication with Identity Hiding Authenticator want to authenticate a device which presents to it just the Authoritative realm. The Authenticator contacts the Authoritative realm. The Authoritative realm communicates with the device getting its identity (in private) The Authoritative party signals the Authenticator whether or not the authentication succeeded.

Network Access Identifier NAI is designed by the IETF to accommodate the use cases described earlier as the syntax of user identifier used when roaming (RFC 4282) – Optionally carry only user identifier – Optionally carry only an authoritative domain – the home operator – Optionally specify routing – routing decoration – Other decoration (not in RFCs but commonly used) Used by many of the IETF protocols and other SDOs In AAA it is used to help the AAA client and proxy route AAA messages to the home network.

NAI Examples Only identifier: avi Only authoritative Both identifier and authoritative domain: – Routing decoration: – Other decoration: –

NAI Size Usage of NAI determines its ultimate size: – Size of the identity portion – Size of the realm – Size of routing realms and number of them. 4282: handle at least 72 octets recommended 253. – 3GPP2: 72 octets over RADIUS is the max. Depends on the protocol being used as well. – RADIUS max is 253 octets – Diameter max is 2^24 – 9 octets

Identity portion of the NAI When we send an identity in the NAI then it should only be used by the home realm. From RFC 4282: “Interpretation of the username part of the NAI depends on the realm in question. Therefore, the "username" part SHOULD be treated as opaque data when processed by nodes that are not a part of the authoritative domain (in the sense of Section 4) for that realm.” In other RFCs ( ) where user privacy can be accommodated it is recommended that the NAI used to route the AAA message does not include the username/identity at all – so called Privacy Network Access Identifier.

M2M and NAI Whether NAI is used or not is not the issue: – NAI will be used to convey information over the protocols. The question is what goes in the NAI. – That is driven by different requirements and use cases. – The NAI is part of the tool kit we provide.

M2M Identities What are we identifying: – M2M Device? – M2M Service subscription? – M2M cdma2000 modem? – M2M cdma2000 Subscription? – PAN modem? – PAN subscription? Recomendation; – 3GPP2 worry about M2M cdma2000 subscription and M2M 3GPP2 modem identifier – These identifiers could also be used by M2M service layer if desired.

Which NAI format to use? Determined by the procedure being performed: – Are we doing device/modem authentication? – Are we doing subscription authentication? Are we enabling identity privacy? What are the roaming requirements? What other NAI decoration is needed?

Bottom line… Determine what the identifier is identifying and how big should it be. – There are size constraints In the case where the identifier is sent then the maximum size over RADIUS is 253 octets which includes everything you put in the NAI. Keep it as small as you can. Is it globally unique or is it unique in the context of a home realm – If it is globally unique which registry is controlling it. Do we need to convey it outside the home realm? – Recall the identity is really only required by the home realm. – If not, we better understand why? – Privacy concerns of revealing the true identity. Do we need to know in the RAN or PDSN etc whether the entity is an M2M Device, Device type or group(s) it belongs to during the authentication process. Or can we have that information conveyed after the authentication What is needed for successful M2M roaming model. – Note: the actually identity may be the least important aspect.