Doc.: IEEE 802.11-13/0893 r00 Submission July 2013 Paul A. Lambert, Marvell SemiconductorSlide 1 Service Discovery Proposal Date: 2013-7-16 Authors: Previous.

Slides:



Advertisements
Similar presentations
CIM 2465 IP Addressing Scheme1 IP Addressing Scheme (Topic 4) Textbook: Networking Basics, CCNA 1 Companion Guide, Cisco Press Cisco Networking Academy.
Advertisements

Doc.: IEEE /0265r0 Submission February 2006 Zhonghui Yao, HuaweiSlide 1 Proposal for Online Enrolment Cluster Notice: This document has been prepared.
Doc.: IEEE /1262 r01 Submission Paul A. Lambert, Marvell SemiconductorSlide 1 Service Identifiers and Bloom Filters Date: Authors: Based.
Digital Signatures and Hash Functions. Digital Signatures.
Doc.: IEEE /0374r0 Submission March 2014 Ping FANG, HuaweiSlide 1 Two options for UPnP Printer Discovery Date: Authors:
Doc.: IEEE /1448 r00 Submission Paul A. Lambert, Marvell SemiconductorSlide Privacy Date: Authors: November 2013.
Submission doc.: IEEE /0531r0 May 2015 Michael Fischer, FreescaleSlide 1 A Possible Solution to the Beacon Length Problem Date: Authors:
Doc.: IEEE /1313r0 Agenda November 2013 Stephen McCann, BlackberrySlide 1 TGaq Mini Tutorial Date: Authors:
Doc.: IEEE Submission Nov 2013 Betty Zhao et. al., HuaweiSlide 1 Service Discovery with Association Date: Authors:
Doc.: IEEE /0961r0 Submission July 2012 Alex Ashley, NDS LtdSlide 1 Layer 2 Service Discovery Protocols Date: Authors:
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Physical & Logical Address COMP 315. MAC Address A media access control address (MAC address) is a unique identifier assigned to network interfaces for.
Doc.: IEEE ai Submission Paul Lambert, Marvell TGai Discovery Proposal Author: Abstract Short high-level proposal for discovery techniques.
Doc.:IEEE /0129r3 May 2012 Santosh Abraham, Qualcomm Inc. Short Beacon Slide 1 Authors:
Doc.: IEEE /0888 r00 Submission Paul A. Lambert, Marvell SemiconductorSlide 1 Security and Privacy Enhancements for Date: Authors:
Submission doc.: IEEE 11-14/0877r0 July 2014 SK Yong et.al., AppleSlide 1 Generic Service Discovery Proposal: Dynamic Bloom Filter Operation Date:
Doc.: IEEE /0158r2 Submission TGaq Pre-Association Discovery Protocol for ANDSF Discovery Service Date: May 2014 Joe Kwak, InterDigitalSlide.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Doc.: IEEE /700r1 Submission July 2013 RYU Cheol, ETRISlide 1 Discovery Modes and Discovery Proxy of Web Services Discovery Date: Authors:
NETWORKING PROTOCOLS How do Networks Talk? THE PROTOCOL Rules that define how network devices communicate with each other Ensures that products from.
Doc.: IEEE /0102r2 SubmissionLiwen Chu Etc.Slide 1 TGah Power Saving Date: Authors: Date: Jan, 2012.
Doc.: IEEE Submission ETRI May 2015 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Submission doc.: IEEE 11-14/0877r2 July 2014 SK Yong et.al., AppleSlide 1 Generic Service Discovery Proposal: Dynamic Bloom Filter Operation Date:
Doc.: IEEE /1164 r00 Submission September 2013 Paul A. Lambert, Marvell SemiconductorSlide 1 Some Par and 5C Requirements Date: Authors:
Submission doc.: IEEE 11-12/0553r4 May 2012 Jarkko Kneckt, NokiaSlide 1 Response Criteria of Probe Request Date: Authors:
Submission doc.: IEEE /162 January 2014 RYU Cheol, ETRISlide 1 Possible Agreements for the Design Date: Authors:
SubmissionSlide 1Dwight Smith, Motorola Mobility Nov 2012doc.: IEEE 11-12/1332r0 Other Service Discovery Concepts Date: Authors:
Doc.: IEEE /1378r0 Submission November 2008 Darwin Engwer, Nortel NetworksSlide 1 Improving Multicast Reliability Date: Authors:
Doc.: IEEE /0025r1 Submission January 2007 Peng Mo, Huawei Technologies Co., Ltd.Slide 1 MAPID for User Plane Support Notice: This document has.
Doc.: IEEE /0357r0 Submission March 2008 Michelle Gong, Intel, et alSlide 1 Enhancement to Mesh Discovery Date: Authors:
Doc.: IEEE Submission July 2014 Li, Hernandez, Dotlic, Miura, NICT Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /109r1 Submission July 2002 J. Edney, H. Haverinen, J-P Honkanen, P. Orava, Nokia Slide 1 Temporary MAC Addresses for Anonymity Jon.
Doc.: IEEE /1262 r03 Submission Paul A. Lambert, Marvell SemiconductorSlide 1 Service Identifiers and Bloom Filters Date: Authors: May.
Doc.: IEEE /0690r0 Submission Andrew Myers, BT Slide 1 July GPP SA3 Interworking Security Issues II Andrew Myers British Telecommunications.
Doc.: IEEE /1262 r02 Submission Paul A. Lambert, Marvell SemiconductorSlide 1 Service Identifiers and Bloom Filters Date: Authors: Nov.
Doc.: IEEE /0263r1 SubmissionJae Seung Lee, ETRI Spec Framework Proposal: Selection of the AP for Scanning Date: Slide 1 March 2012.
CSE5803 Advanced Internet Protocols and Applications (13) Introduction Existing IP (v4) was developed in late 1970’s, when computer memory was about.
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Security Framework Date: Authors:
Doc.: IEEE /1313r1 Submission November 2013 Stephen McCann, BlackberrySlide 1 TGaq Mini Tutorial Date: Authors:
Doc.: IEEE /1313r2 Submission November 2013 Stephen McCann, BlackberrySlide 1 TGaq Mini Tutorial Date: Authors:
Doc.: IEEE /1015r1 Submission Gabor Bajko, Nokia, Canpolat, Intel, Emmelmann, FOKUSSlide 1 Network Selection Optimization Date:
Doc.: IEEE /0067r0 Submission Jan 2014 Ping FANG, HuaweiSlide 1 Service Discovery for UPnP Printer Date: Authors:
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Key Centric Identity Date: Authors:
Doc.: IEEE e Submission July 2009 Andy Summers, Skip Ashton, EmberSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc: IEEE /0395r2 Submission March 2009 R. Roy, ConnexisSlide 1 WAVE ITS Station Technical Capabilities Summary Date: Authors:
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Doc.: IEEE /1313r4 Submission November 2013 Stephen McCann, BlackberrySlide 1 TGaq Mini Tutorial Date: Authors:
TGaq Transaction Protocol
Service Discovery Proposal
TGaq Service Transaction Protocol for ANDSF Discovery Service
White Space Map Notification
Service discovery architecture for TGaq
P802.11aq Pre-Association Service Discovery Summary
TGaq Transaction Protocol (update)
TGaq Transaction Protocol
P802.11aq Pre-Association Service Discovery Summary
P802.11aq Pre-Association Service Discovery Summary
TGaq Design Options Date: Authors: January 2013
Enhancements to Mesh Discovery
Enhancement to Mesh Discovery
Security for Measurement Requests and Information
Security for Measurement Requests and Information
Discussion on Group ID Structure
<month year> <doc.: IEEE doc> Julyl 2015
TGaq Mini Tutorial Date: Authors: November 2013
MAPID for User Plane Support
CID#89-Directed Multicast Service (DMS)
Device Collectives to Share Resources
Date Submitted: September 17, 2001
Presentation transcript:

doc.: IEEE /0893 r00 Submission July 2013 Paul A. Lambert, Marvell SemiconductorSlide 1 Service Discovery Proposal Date: Authors: Previous version in ISD SG as /0706

doc.: IEEE /0893 r00 Submission What is a Service? For IEEE , knowledge of “services” supported by a device help in the selection of the appropriate STA/AP for subsequent communications Examples might include: –Finding the right AP to connect to a print service –Finding a near-by WLAN supporting a particular application –Find a network (AP) with appropriate network connectivity and services for a particular set of applications –Find a AP/STA that can reach a particular application and user Paul Lambert, MarvellSlide 2 July 2013

doc.: IEEE /0893 r00 Submission What would this service discovery look like? Paul Lambert, MarvellSlide 3 Who has service “foo”? I have “foo” I have “bar” July 2013

doc.: IEEE /0893 r00 Submission More on “Services” There are many different existing ways to define application level services, possible examples include: UPnP, Bonjour, XML, OIDs, OUI fields, Bluetooth ids, URLS, Wi-Fi Alliance types (e.g. WFD), etc. Some of the above can be very large (e.g. UPnP) Many different organizations want to control and register identifiers to ensure interoperability (they want a single rooted hierarchy) Rapid growth of new mobile applications requires a simple process to ensure unique identification from many different organizations. Paul Lambert, MarvellSlide 4 July 2013

doc.: IEEE /0893 r00 Submission Mapping services to a unique identifier Most identifiers are made unique by creating hierarchies that are controlled by a central authority with sub branches delegated within a limited name space (e.g. DNS names and IANA) A powerful alternative is to define identifiers within a very large address space where the address space is so large that every identifier is guaranteed to a very high probability to be unique 16 octets can define a very large address space (2^128) to provide unique identifiers and is actually shorter in octets than most hierarchical naming schemes A hash function can be used to define a process for the creation of unique identifiers Paul Lambert, MarvellSlide 5 Very large set of possible identifiers. Used identifiers are a very small set within name space July 2013

doc.: IEEE /0893 r00 Submission Cryptographic Hash Functions A hash takes a block of data and returns a fixed size octet string such that any change in the data has a high probability of changing the hash value (aka digest) A “good’ cryptographic hash function has the property that it is infeasible to generate a message for a given hash Examples of well known cryptographic hash functions include: MD5, SHA-1, SHA-256 Paul Lambert, MarvellSlide 6 July 2013

doc.: IEEE /0893 r00 Submission Very Big Numbers Paul Lambert, MarvellSlide 7 “Astronomy has long been humanity's go-to subject when it comes to contemplating the truly enormous. But actually, if is so much more vast than the number of stars in the observable universe (10 15 times more vast*, or 4,000,000,000,000,000 in long-hand notation), then even the name "astronomical" is rather inadequate.” -- from Economist “Astronomy has long been humanity's go-to subject when it comes to contemplating the truly enormous. But actually, if is so much more vast than the number of stars in the observable universe (10 15 times more vast*, or 4,000,000,000,000,000 in long-hand notation), then even the name "astronomical" is rather inadequate.” -- from Economist July 2013

doc.: IEEE /0893 r00 Submission Process to define hash based identifiers Paul Lambert, MarvellSlide 8 Definition of “foo” service Definition of “bar” service Hash Function “foo” Service Id“bar” Service Id Any group can get together and define a service Each service needs to define an appropriate string (text or octets) to define there service A cryptographic hash is used to create a unique identifier and may be a truncated version of the full hash Resulting identifiers are unique and any device that recognizes the identifier will have knowledge of it’s usage July 2013

doc.: IEEE /0893 r00 Submission Service Discovery Proposal Define Service Discovery frames as new IEEE Management frame(s) of subtype Public Action. Public Action frames carry opaque “Service Id” octet string(s) that are created as a hash of some application specific information that uniquely identifies a service. For a Service Id, there may be an optional Service Capability field to provide service specific additional constraints Service Discovery is performed by: –Service Discovery request/response sequence (request may be unicast or broadcast for a Service Id) –Service Announcement, a unsolicited broadcast/multicast of a Service Id 46 bits of the Service Id can be used to create a multicast address for requests or announcements. Service Discovery frames may be constructed to allow request or indication of more than one service, however limitations on the fields should constrain the size of the Service Id fields, Service Capability fields and total size of the Discovery Frames. Paul Lambert, MarvellSlide 9 July 2013

doc.: IEEE /0893 r00 Submission Definitions Unique Service Identifier – the first 128 bits of the SHA-256 hash of an octet string identifying the service (Service Name). Service Name – an octet string created by the developer of the service that provides a unique identification of the service. For unprotected services, the octet string is human readable. Service Id – An identifier formed by truncating a Unique Service Identifier. 6 octets (48 bits) is a convenient size for a Service Id in IEEE applications. 46 bits is also an interesting size for a Service Id since it can be used as a multicast address. May 2012 Paul Lambert, MarvellSlide 10

doc.: IEEE /0893 r00 Submission Unique Service Identifiers vs. Service Identifiers Unique Service Identifier (USID) –128 bits long (16 octets) is large enough to be statistically unique (3E+38) –is a type of “UUID”, a well defined construct in other standards activities Service Identifier (SID) –Provides a convenient short identifier (e.g. 6 octets) –May not always be unique, there may be collisions. Collisions, however, can be very rare for well selected sizes and collision impact can be mitigated –Multiple Service Identifiers can be created from the same Unique Service Identifier by taking different ranges for the truncation (e.g. First 6 octets, next 6 octets...) May 2012 Paul Lambert, MarvellSlide 11

doc.: IEEE /0893 r00 Submission SIDs – Collisions and Security Multiple SIDs can be formed from the same USID and then used for discovery request versus discovery responses –E.g. SIDreq = 1 st 6 octets of USID SIDrsp = 2 nd 6 octets of USID –Same SID for req/rsp of 6 octets has 1 in 17 million collisions (2^24), Different Sid for req/rsp has 1 in 2.8 E+14 collision probability (2^48) -> much better –Different SiD for req/rsp has interesting privacy properties more difficult to correlate req to rsp Secure SiDs can be created to form private groups –Secure USID = first 128 bits of SHA-256(f(Service Name and Group Key)) –Secure SID = truncation of Secure USID May 2012 Paul Lambert, MarvellSlide 12

doc.: IEEE /0893 r00 Submission Protecting Service Discovery Privacy is important –Wireless discovery exposes mobile users new risks –Adoption of service discovery in mobile devices will be handicapped if privacy features are not supported May 2012 Paul Lambert, MarvellSlide 13 Service Name SHA-256 Hash (256 bits) USID (128 bits) Truncate 128 SID- req SID- rsp Protected Service Name i F(key,SN) GK i SHA-256 Hash (256 bits) USID (128 bits) Truncate 128 SID- req SID- rsp SID obscured by group key