ProjectIEEE 802.20 Working Group on Mobile Broadband Wireless Access TitleIEEE 802.20 MBWA Security Architecture.

Slides:



Advertisements
Similar presentations
ProjectIEEE Working Group on Mobile Broadband Wireless Access TitleEvaluation criteria: The Segment Approach.
Advertisements

xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx Title: Proposal for adding a key hierarchy based approach in the security.
IEEE MEDIA INDEPENDENT HANDOVER DCN: REVP-Session#57-Agenda Title: m Session #57 Agenda Date Submitted: July 18 th 2013 To be.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Secure Handover with QoS Support Date Submitted: November, 14,
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: PoA Capabilities of IE with IPv6 Prefix Availability Date Submitted: May 2006 Authors.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Reference Model and Use-Cases for Information Service Date.
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Sec Title: Considerations on use of TLS for MIH protection Date Submitted: January 14, 2010.
MuGM IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Use of certificates as a base security level for securing PoS/MN multicast communication.
IEEE MEDIA INDEPENDENT HANDOVER Title: Use Cases, Security Study Group Date Submitted: Nov 13 th, 2007 Presented at: IEEE Security SG Authors.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Message Flow Date Submitted: March 1, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx Title: IETF Liaison Report Date Submitted: November 16, 2006 Presented.
Doc.: IEEE /0310r0 Submission Sept 2007 Srinivas Sreemanthula Slide 1 IEEE MEDIA INDEPENDENT HANDOVER DCN: MIH-Security-Options.ppt.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Problem Scenario Date Submitted: September, 2007 Presented at.
Synchronization Drafting Group Schedule Document Number: IEEE C802.16m-09/0379 Date Submitted: Source: Paul Cheng
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: FMCA MIH Work Item Date Submitted: March, 2009 Presented at IEEE.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IEs related Issues Date Submitted: March 2007 Presented at IEEE session.
ProjectIEEE Working Group on Mobile Broadband Wireless Access TitleLiaison relationships with external organizations.
IEEE MEDIA INDEPENDENT HANDOVER Title: An Architecture for Security Optimization During Handovers Date Submitted: September,
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IETF Liaison Report Date Submitted: September 20, 2007 Presented.
IEEE MEDIA INDEPENDENT HANDOVER DCN: 100 Title: Cross Domain Trigger and Handover Talking Points Date Submitted: July 13, 2004.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: MIH security issues Date Submitted: July, 02, 2007 Presented at.
IEEE DCN: SAUC Title: TG Closing Note Date Submitted: November 14, 2013 Presented at IEEE session #59 in Dallas, Texas,
ProjectIEEE Working Group on Mobile Broadband Wireless Access TitleRepeater issues for MBWA Date Submitted.
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE C /36 Project IEEE Working Group on Mobile Broadband Wireless Access Title Proposed Work Plan.
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE C /xx Project IEEE 802 Executive Committee Study Group on Mobile Broadband Wireless Access Title Evaluation Methodology:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: bcast
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE DCN: Title: TG Opening Note Date Submitted: Mar 09, 2015
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Your Title Here
IEEE MEDIA INDEPENDENT HANDOVER DCN: mugm
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

ProjectIEEE Working Group on Mobile Broadband Wireless Access TitleIEEE MBWA Security Architecture Date Submitted Source(s)T.Charles Clancy William A. Arbaugh WAA Associates, LLC. (443) Paul Nguyen Defense Information Systems Agency Center for Standards Management - Networks Division (703) (703) (Fax) Re:Straw man Security Architecture Abstract This presentation presents a straw man security architecture for The design goals of this architecture are to meet the security and mobility requirements, meet U.S. DOD requirements for the protection of sensitive but UNCLASSIFED information, and be free of intellectual property claims. PurposeInformational Notice This document has been prepared to assist the IEEE Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy The contributor is familiar with IEEE patent policy, as outlined in Section 6.3 of the IEEE-SA Standards Board Operations Manual and in Understanding Patent Issues During IEEE Standards Development.Section 6.3 of the IEEE-SA Standards Board Operations Manualhttp://standards.ieee.org/guides/opman/sect6.html#6.3http://standards.ieee.org/board/pat/guide.html IEEE C /XXXX

IEEE MBWA Mobile Broadband Wireless Access Security Architecture T. Charles Clancy William A. Arbaugh Paul Nguyen

Overview Design Requirements and Challenges Potential Solution Set Proposed Solution and Motivation Next Steps and Timeline

Design Requirements and Goals Meet Security and Mobility requirements. –Support fast hand-offs –Use current upper layer standards when appropriate Meet minimum US DOD requirements for protection of sensitive but UNCLASSIFIED information (SBU). –FIPS compliant –Support public key based mutual authentication Free of intellectual property claims

Solution Space Confidentiality –Control Messages: None Needed for trouble shooting –Data: AES-CCM based solution is only algorithm/mode pair meeting all requirements. Integrity –Control Messages: HMAC-SHA1 Prevents denial of service and session hijacking at the protocol level –Data: AES-CCM

Solution Space cont. Authentication and Access Control –IEEE 802.1X / EAP Some issues such as state machine synchronization and transitivity of trust, but adopted by and most actively worked solution at the moment. Cross domain roaming issues currently unresolved. –Kerberos Not as many issues as 1x/EAP but more complex. Supports cross domain roaming. Dictionary attack against default authentication method. Seems to be losing favor.

Solution Space cont. Default Authentication Method –Public key systems have suffered deployment and management problems and are costly in terms of computation for clients. –Password based systems suffer from dictionary attacks and the lack of key management.

Proposed Solution Confidentiality (Layer 2) –Control Messages: None –Data Messages: AES-CCM Integrity (Layer 2) –Control Messages: HMAC-SHA1 –Data Messages: AES-CCM

Proposed Solution, cont. Authentication and Access Control –IEEE 802.1x / EAP Current approach embraced by and actively being worked in IETF and IEEE. Should allow Interworking once cross domain roaming issues resolved. Supports multiple, standardized, authentication methods. Trust transitivity can be mitigated by ensuring that ALL base stations mutually authenticates with the AAA server and communicate via a secure channel.

Default EAP Method IEEE defines EAP/TLS as the default method. –Too slow (~800ms best case and ~3sec worst case) for fast roaming unless combined with back-end methods. –Traditional password systems suffer from passive and active dictionary attacks (those that don’t, e.g. EKE, SPEKE, et. al. are patented).

Default EAP Method, cont. We’ve developed a method to “boot strap” a plain text password/PIN into a cryptographically strong password. –Suffers from a very small window where a dictionary is attack can theoretically succeed, e.g. during initial registration only. We can prevent this attack with additional computation, but we’re not sure it is worth the cost. –Supports strong key management, i.e. agreement on current session key and updating of authentication key. –Will be submitted to the IETF for standardization and is IP free (we believe).

Next Steps Feedback from group (March) Finalize design and authentication method (Early April) Publish design and authentication method for review (Mid April) Develop a C based reference implementation for the authentication method (End of April) Update design and authentication as needed based on review (End of April / early May) Presentation of final design document (May meeting)

Questions?