10 March 2002 doc.: IEEE 802.15-02/126r0 Bob Huang, Sony ElectronicsSlide 1Submission Project: IEEE P802.15 Working Group for Wireless Personal Area Networks.

Slides:



Advertisements
Similar presentations
Submission doc.: IEEE /044r0 21 January 2002 Bob Huang, Sony ElectronicsSlide 1 Project: IEEE P Working Group for Wireless Personal Area.
Advertisements

Doc.: IEEE a-Updating-15-7-security Submission May 2015 Robert Moskowitz, HTT ConsultingSlide 1 Project: IEEE P Working Group for.
Doc.: IEEE s Submission January 2015 Mineo Takai, Space-Time EngineeringSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE xxxxx Submission doc. : IEEE doc. : IEEE pac Nov 2012 Slide 1 Project: IEEE P Working.
Doc.: IEEE e Submission March 2015 Gyung-Chul Sihn (ETRI) et al.Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /272r0 Submission June 2001 Phil Jamieson, Philips SemiconductorsSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE xxx e Submission March 14, 2008 Huawei, Telecom Italia Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Submission January, 2004 Patrick Kinney, Kinney Consulting LLCSlide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE /0410r0 Submission September 2004 Hewlett Packard, Sony ElectronicsSlide 1 Project: IEEE Working Group for Wireless Personal.
Doc.: IEEE xxxxx Submission doc. : IEEE Nov 2012 Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE /0136r0 Submission March 2006 Abbie Mathew, NewLANS Project: IEEE P Working Group for Wireless Personal Area Networks Submission.
May 2001 William A. ArbaughSlide 1 doc.: IEEE /245r0 Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /424r0 Submission November 2002 Dr. John R. Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Drafting of IEEE e.
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANS) Submission Title: [A critical view of the proposed compromise – A marketing.
Doc.: IEEE /133r0 Submission March 2003 Michael Park, Samsung Electronics co., LtdSlide 1 Project: IEEE P Working Group for Wireless Personal.
July 2004 Jay Bain, Fearn Consulting doc.: IEEE /0379r0 Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /0xxr0 Submission January, 2001 Allen Heberling, Eastman Kodak CompanySlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission November 2012 Sunggeun Jin (ETRI)Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission doc. : IEEE March 2009 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE c Submission Philips May, 2006 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /080r0 Submission February 2004 Welborn, MotorolaSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE Submission July 2008 Kiran Bynam, SamsungSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /357r0 Submission July 2001 Phil Jamieson, Philips SemiconductorsSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /244r1 Submission July 2000 James P. K. Gilb, MobilianSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission July 2014 Li, Hernandez, Dotlic, Miura, NICT Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE Submission November 2003, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANS) Submission Title: [Proposal to Add Location Awareness as an Important New.
Doc: IEEE Submission July 2015 Hernandez,Li,Dotlić,Miura (NICT)Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /054r0 Submission January 2003 Dr. John R. Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
a Slide 1 Michael Mc Laughlin, decaWave Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Doc.: IEEE Submission Sept Byung-Jae Kwak, ETRISlide 1 NOTE: Update all red fields replacing with your information; they are.
Doc.: IEEE /0051r2 Submission January 2004 Dr. John R. Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: IEEE Submission September 2009 Roberts [Intel] Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Submission November 2015 Slide 1Li Qiang, Huawei Technologies Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Doc.: IEEE /074r0 Submission January, 2001 Allen Heberling, Eastman Kodak CompanySlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE b Submission July 2004 Liang Li, WXZJ Inc Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE xxxxx Submission doc. : IEEE Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P
Doc.: IEEE c TG3c Presentation Jan C.S SumSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)‏
Doc.: IEEE g TG4g Presentation Jan 2010 C.S. Sum1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)‏
Doc.: IEEE /073r0 Submission March 2003 Dr. John R. Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: IEEE g Submission March 2011 Xing Tao (SIMIT/WSNIRI), Khanh Tuan Le (TI) Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /0111r1 Submission May 2006 LEE, CUNYSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Submission March, 2010 Adrian Jennings, Time Domain doc.: IEEE f Slide 1 Project: IEEE P Working Group for Wireless Personal.
10 March 2002 doc.: IEEE /126r1 Bob Huang, Sony ElectronicsSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
14 March 2002 doc.: IEEE /152r1 Gregg Rasor, MotorolaSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
14 March 2002 doc.: IEEE /152r2 Gregg Rasor, MotorolaSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
Submission Title: [Add name of submission]
June 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposed Scenarios for Usage Model Document.
Submission Title: [WG-TG3 Opening Report May03]
doc.: IEEE <doc#>
Submission Title: Technical proposal of discovery for PAC
March 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Toumaz response to TG6 Call for Applications]
Submission Title: [Compromise Proposal] Date Submitted: [12Sept2004]
Submission Title: [802.11n Liaison Report May 2009]
doc.: IEEE <doc#>
Submission Title: IEEE : Need for baseline mode
doc.: IEEE <doc#>
Submission Title: [Resolutions for CID 85, 86, and 87]
Submission Title: [Compromise Proposal] Date Submitted: [12Sept2004]
doc.: IEEE <doc#>
doc.: IEEE <doc#>
Submission Title: European UWB Regulations Date Submitted: 14 May 2003
<month year> doc.: IEEE / January 2005
27 Febraury 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Sub-committee Status Report.
Submission Title: [WG-TG3 Opening Report Jan02]
March, 2006 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Summary of ad hoc meetings for potential.
Submission Title: Security Suite Compromise
Submission Title: [TG3a Compromise Direction]
Presentation transcript:

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Suite Comparative Characteristics Date Submitted: 10 March, 2002 Source: Bob Huang Company: Sony Electronics Address: One Sony Drive TA3-12, Park Ridge, NJ Voice: , FAX: , Re: P Security Suite Abstract:This presentation identifies and discusses some differences in the proposed security suites. The information on the suites was drawn from contributions presented at the Schaumburg ad hoc meeting (February ’02) and related at that meeting discussions. The specific contributions were , and 02114r2. Also considered were the meeting minutes (02122), the Security Sub-committee Status Report (02121) and some personal notes of mine. This contribution provides a practical perspective on the differences in the security suite proposals. Purpose:For information and guidance to prior to the Security Suite selection. Notice:This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 2Submission TG3 Security Suite Comparative Characteristics A Perspective

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 3Submission (My) Baseline Thoughts The cryptographic algorithms proposed are hard to break – offer high security Greater attention should be paid to the strength of the protocol It will be difficult to thoroughly evaluate the protocol(s) in a short time It is best to evaluate the fit of the security suites against the applications: ‘Where the rubber meets the road’

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 4Submission Presentation Outline (My) Baseline Thoughts Approach to Evaluation What are the Major Differences? Look at the Trust Models Look at Security Topology Summary & Conclusions

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 5Submission (My) Baseline Thoughts (cont.) The MAC (draft) standard –Must have a mandatory security suite –May have an optional security suite –Message structure (public key object) to allow The standards text to accommodate divergent architectures as mandatory and optional Either architecture to be mandatory or optional –Based on the assertion that the security manager implementation was ‘basically free’, the security manager will be included in devices in the distributed system –Agreed to at ad hoc in Schaumburg (Feb ’02)

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 6Submission Approach to Evaluation Focus on differences How well do the differences support the applications? How do the differences impact the user? How do the differences impact the manufacturer? First: Identify and understand the differences

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 7Submission What are the Major Differences? Basic premeses for this comparison: Not considering differences in cryptographic algorithms or protocols All approaches have flexibility in implementation to allow ‘changing’ the fundamental characteristics –Therefore, must compare ‘native mode*’ Most used/natural mode Most efficient mode * Assumption: operation outside of the ‘native mode’ will cost more

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 8Submission What are the Major Differences? Fundamental differences Trust model: –Digital certificates (fixed model or infrastructure based) –Consumer/user trust model Security topology –Centralized (with PNC) –Distributed

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 9Submission Framework for Considering Trust Models When is the first trust decision made? Interoperability When activated Control/flexibility Typical use model Next: Consider trust models against this framework

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 10Submission Trust model: Fixed model digital certificates Imbedded at manufacture (royalty fee applies) –Example given at Schaumburg ad hoc: $0.05 each Interoperability: Manufacturers must act in unison Activated at manufacture (fixed trust) Control/flexibility –Fixed by definition, therefore no flexibility after deployment –What to accept any device that can authenticate (not restricted to a particular device) –Consumer can not control (who is in the network) Typical use: DVB, 5C

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 11Submission Trust model: Infrastructure model digital certificates Imbedded at manufacture (royalty) Interoperability: typically closed system Activated/deactivated ‘On-line’ –Implies communications infrastructure –Allows tracking of device use Infrastructure model allows strong central control –Single controlling party: a service provider not the consumer, not the manufacture Typical use: Cable system

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 12Submission Trust model: Consumer/user Interoperability: –Dependent on P , not on implementation or industry agreements –Immediate interoperability Activated by user/consumer –At startup –At addition of new devices Control/flexibility –Consumer has control control Typical use: modeled on user controlled wired security

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 13Submission Trust models: Conclusions Digital certificate trust: fixed or infrastructure based –Some additional cost at manufacture –Control By infrastructure No consumer control in typical model (native mode*) Consumer/user trust –Similar to physical wired security: consumer controlled * Assumption: operation outside of the ‘native mode’ will cost more Which model applies to applications? your

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 14Submission What are the Major Differences? Fundamental differences Trust model: –Digital certificates (fixed model or infrastructure based) –Consumer/user trust model Security topology –Centralized (on PNC) –Distributed

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 15Submission Security Topology Security manager implementation is –More complex (costly) than simple device security –More responsibility than simple device Different security topologies –Centralized (with PNC) –Distributed (each device is security manager)

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 16Submission Centralized Security Topology Security manager located with PNC –Complexity centralized in one powerful device (the PNC) –Simple to activate by user –Some critical tasks performed infrequently (n times), therefore process power may be ‘borrowed’ from other PNC activities Authentication? Key provisioning/re-provisioning Provides unified network wide security Allows additional (individual) link security to be applied

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 17Submission Distributed Security Topology Security manager (capability) located in every device Piconet is divided into logical security networks Each device decides who it will connect to Less exposure than centralized security manager –Compartmentalized: Not higher security, more complex Each device has security manager complexity –Memory, processing power Critical tasks performed multiple times – up to n x n times (n x n relationships) –Authentication –Key provisioning/re-provisioning How?

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 18Submission Security Topology Conclusions Centralized topology –Less complex/lower cost –Easy to use (less user action) –Fewer authentications (better use of radio resources) Distributed topology –Each device makes trust decision –Compartmentalizes security

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 19Submission Security Topology Number of sequential authentications for 5 devices: Distributed = SM: Security Manager Display & SM Camcorder & SM DVD Player & SM Display Camcorder DVD Player Centralized = PNC & SM Receiver 4 DTR PNC & SM Receiver 4 DTR & SM Each authentication consumes channel time, takes CPU cycles and adds delay.

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 20Submission Security Topology How does the security topology overlay the MAC control structure? Distributed = SM: Security Manager Centralized = PNC & SM DTR DisplayCamcorder DVD Player Receiver Display & SM Camcorder & SM DVD Player & SM PNC & SM Receiver 4 DTR & SM

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 21Submission What are the Major Differences? Fundamental differences Trust model: –Digital certificates (fixed model or infrastructure based) –Consumer/user trust model Security topology –Centralized (on PNC) –Distributed

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 22Submission Conclusion on Major Differences Framework success: 1.Different approaches have different advantages 2.If the first big application of fails, it will be harder for the second application to succeed. 3.Therefore consider the first applications that will make a success. 4.Later consider the second applications that will make a success. 5.Choose an appropriate security suite for overall success. Go with your longest and your strongest ! Closing note

10 March 2002 doc.: IEEE /126r0 Bob Huang, Sony ElectronicsSlide 23Submission Conclusion on Major Differences? Framework success: 1.Different approaches have different advantages 2.If the first big application of fails, it will be harder for the second application to succeed. 3.Therefore consider the first applications that will make a success. 4.Later consider the second applications that will make a success. 5.Choose an appropriate security suite for overall success. Go with your longest and your strongest ! Closing note