May 2001 William A. ArbaughSlide 1 doc.: IEEE 802.15-01/245r0 Submission Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)

Slides:



Advertisements
Similar presentations
Doc.: IEEE a-Updating-15-7-security Submission May 2015 Robert Moskowitz, HTT ConsultingSlide 1 Project: IEEE P Working Group for.
Advertisements

Doc.: IEEE /124r1 Submission May 2000 Ian Gifford, M/A-COM, Inc.Slide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [LB97 PICS Scrub] Date Submitted:
Doc.: IEEE s Submission January 2015 Mineo Takai, Space-Time EngineeringSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE xxxxx Submission doc. : IEEE Nov 2012 Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE /0136r0 Submission March 2006 Abbie Mathew, NewLANS Project: IEEE P Working Group for Wireless Personal Area Networks Submission.
Doc.: IEEE Submission Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Drafting of IEEE e.
Doc.: IEEE /133r0 Submission March 2003 Michael Park, Samsung Electronics co., LtdSlide 1 Project: IEEE P Working Group for Wireless Personal.
July 2004 Jay Bain, Fearn Consulting doc.: IEEE /0379r0 Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
September 2003 doc.: IEEE Submission Slide 1 Jason Ellis, Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission November 2012 Sunggeun Jin (ETRI)Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission doc. : IEEE March 2009 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /436r0 Submission November 2003 Vijay DhingraSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /0528r0 Submission September 2005 Dr. John R. Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission September 2009 Roberts [Intel] Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Submission November 2015 Slide 1Li Qiang, Huawei Technologies Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE SCWNGSlide 1 September 2012 Pat Kinney, Kinney Consulting LLC Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE xxxxx Submission doc. : IEEE Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P
Doc.: wng0> Submission Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Using Host.
Doc.: IEEE g TG4g Presentation Jan 2010 C.S. Sum1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)‏
Doc.: IEEE g Submission March 2011 Xing Tao (SIMIT/WSNIRI), Khanh Tuan Le (TI) Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE wng0 SCWNGSlide 1 May 2012 Pat Kinney, Kinney Consulting LLC Slide 1 Project: IEEE P Working Group for Wireless Personal.
Submission Title: [Add name of submission]
May 2000 doc.: IEEE /109r0 May 2000 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: WPAN Requirements.
<month year> doc.: IEEE < e>
June 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed Scenarios for Usage Model Document.
doc.: IEEE <doc#>
<month year> doc.: IEEE <030158r0> March 2004
doc.: IEEE <doc#>
Project: IEEE Wireless Personal Area Networks (WPANs)
March 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Toumaz response to TG6 Call for Applications]
<month year> doc.: IEEE < e>
<May,2009> doc.: IEEE <doc .....> <July 2009>
doc.: IEEE <doc#1>
doc.: IEEE <doc#>
<month year> doc.: IEEE <xyz> January 2001
< Sept > Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [IG LPWA Draft Call for Contributions]
August, 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Enhancing reliability of data transmission.
<month year> doc.: IEEE < e>
February 19 May 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: LECIM-IG Closing Report for Beijing.
March 2009 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: VLC – Application Category Terms & Mobility.
平成31年2月 doc.: IEEE /424r1 November 2008
<month year> doc.: IEEE <xyz> November 2000
<month year> doc.: IEEE / January 2005
doc.: IEEE <doc#>
doc.: IEEE /XXXr0 Sep 19, 2007 June 2009
Submission Title: [Frame and packet structure in ]
November 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Simplified geometry for the usage model.
Sept Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Add the Authentication to Enhance the Security.
<month year>20 Jan 2006
<month year> <Nov 2018>
doc.: IEEE <doc#>
<month year> doc.: IEEE < e>
<month year> doc.: IEEE / September 2004
doc.: IEEE <doc#1>
<month year> doc.: IEEE / July 2004
March 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [DF6 Radio-burst length over PSDU size] Date.
doc.: IEEE <doc#>
<month year> doc.: IEEE <030158r0> <March 2003>
September 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suggested TG3c PAR Changes] Date Submitted:
Mar 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution for Comment 70 ] Date Submitted:
Mar 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution for Comment 70 ] Date Submitted:
平成31年7月 doc.: IEEE /424r1 November 2007
August, 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Improve the latency between GTS request.
July 2003 doc.: IEEE <03/242> July 2003
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Dependable Interest Group Closing.
Submission Title: TG9ma Agenda for September Meeting
Jan 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TeraHertz Closing Report Date Submitted: January.
May 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Source identification Date Submitted: May, 2015.
12/15/2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AWGN Simulation Results] Date Submitted:
Presentation transcript:

May 2001 William A. ArbaughSlide 1 doc.: IEEE /245r0 Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: IEEE : Security-Privacy Introduction and Overview Date Submitted: May, 2001 Source: William A. ArbaughCompany: University of Maryland Address: Voice: , Re: [ ] Abstract: Security and Privacy principles Purpose: 1) To inform the IEEE about fundamental security and privacy issues in wireless personal area networks. Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that these viewgraphs become(s) the property of IEEE and may be made publicly available by P

May 2001 William A. ArbaughSlide 2 doc.: IEEE /245r0 Submission Security/Privacy Introduction and Overview William A. Arbaugh

May 2001 William A. ArbaughSlide 3 doc.: IEEE /245r0 Submission Talk Outline Introduction Roadmap Scenarios Preliminary threat analysis Preliminary requirement analysis

May 2001 William A. ArbaughSlide 4 doc.: IEEE /245r0 Submission Some beginning thoughts “Security is a process” “Cryptography is not security ” “ To be effective, security must be transparent ”

May 2001 William A. ArbaughSlide 5 doc.: IEEE /245r0 Submission You can never have 100% Security is all about Risk Management

May 2001 William A. ArbaughSlide 6 doc.: IEEE /245r0 Submission Similarities to but… WPAN is a much more difficult problem CPU constraints Power constraints Memory constraints Cost constraints Infrastructure issues The end points in are hosts.

May 2001 William A. ArbaughSlide 7 doc.: IEEE /245r0 Submission Security Architecture Elements Integrity Source of data, i.e. prevent datagram forgeries Data content, i.e. prevent data modification Confidentiality How long does the data need to remain protected? Authentication

May 2001 William A. ArbaughSlide 8 doc.: IEEE /245r0 Submission Trusted Element What is it? Most every day transactions have a common trusted element to them. Establishing a trusted element with each scenario is one of the most difficult aspects of a security architecture for WPAN.

May 2001 William A. ArbaughSlide 9 doc.: IEEE /245r0 Submission Roadmap Define scenarios Develop threat model Define requirements Develop architecture External review

May 2001 William A. ArbaughSlide 10 doc.: IEEE /245r0 Submission Scenarios Consumer Peripherals Photo frames Trade show Exchange info Exchange proprietary info

May 2001 William A. ArbaughSlide 11 doc.: IEEE /245r0 Submission Scenarios cont. Trading floor / Auctions Bids public, but need non-repudiation Settlement Kiosks/commerce

May 2001 William A. ArbaughSlide 12 doc.: IEEE /245r0 Submission Threat Classes Class I Clever outsiders that attempt to take advantage of existing system weaknesses. Access to moderately sophisticated equipment is assumed. Class II Knowledgeable insiders with detailed information about various parts of the system, and they may have access to sophisticated equipment.

May 2001 William A. ArbaughSlide 13 doc.: IEEE /245r0 Submission Threat Classes cont. Class III Funded organizations able to assemble specialized teams with access to extremely sophisticated equipment.

May 2001 William A. ArbaughSlide 14 doc.: IEEE /245r0 Submission Threat and Requirements The next few slides present a “straw man” for both the threat and security requirements for each scenario. They are designed to be the starting point for discussions.

May 2001 William A. ArbaughSlide 15 doc.: IEEE /245r0 Submission Consumer Threat Model ConfidentialityIntegrityAuthentication None-Class I

May 2001 William A. ArbaughSlide 16 doc.: IEEE /245r0 Submission Trade Show Threat Model ConfidentialityIntegrityAuthentication None-Class I None 1 1.It would be nice, but establishing a common trust element is too dificult.

May 2001 William A. ArbaughSlide 17 doc.: IEEE /245r0 Submission Auction Threat Model ConfidentialityIntegrityAuthentication NoneClass II -Class III

May 2001 William A. ArbaughSlide 18 doc.: IEEE /245r0 Submission Kiosk Threat Model ConfidentialityIntegrityAuthentication Class I – Class III

May 2001 William A. ArbaughSlide 19 doc.: IEEE /245r0 Submission Requirements A single solution WILL NOT meet all of the potential requirements. Choices (all have draw backs) Engineer to the strongest requirements Implement a security association mechanism Provide minimal support (Class I protection) in.15 and meet stronger requirements with upper layers

May 2001 William A. ArbaughSlide 20 doc.: IEEE /245r0 Submission Now What? Committee should agree on a set of scenarios representing typical WPAN usage. Committee agrees on a threat model for each scenario. Committee agrees on security requirements for each scenarios. Architecture developed based on the above. Architecture submitted for external review.

May 2001 William A. ArbaughSlide 21 doc.: IEEE /245r0 Submission Conclusions Security is a process and must be viewed holistically with the rest of the system. Security must be designed into the system from the beginning.