Security considerations for M2M IEEE 802.16 Presentation Submission Template (Rev. 9) Document Number: IEEE 802.16ppc-10/0037 Date Submitted: 2010-07-09.

Slides:



Advertisements
Similar presentations
Device Cooperation for M2M Communications IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16p-10/0004r1 Date Submitted:
Advertisements

DL/UL data transmission for M2M devices IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16p-10/0020 Date Submitted:
Authenticated Validity for M2M devices IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16p-11/0251 Date Submitted:
Interference Mitigation by Initial Configuration for Femtocell Access Points in IEEE802.16m Network IEEE Presentation Submission Template (Rev.
Contribution to IEEE n System Requirements Document IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16gman-10/0018.
Security Support for Multi-cast Traffic in M2M communication Document Number: IEEE C802.16p-10/0022 Date Submitted: Source: Inuk Jung, Kiseon.
Comments on HO decision and initiation ( ) IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C80216m-10_0765 Date Submitted:
Self-Organization Networks for Disaster Relief IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16gman-10/0015 Date Submitted:
M2M Study Report: Status Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16ppc-10/0008 Date Submitted:
Frame structure supporting the WirelessMAN-OFDMA frames IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C80216m-09_0475r1 Date.
Relay DG Report (for Session #63.5 TGm Closing) IEEE Presentation Submission Template (Rev. 9) Document Number: C80216m-09_2211 Date Submitted:
Group based paging operation for p system IEEE Presentation Submission Template (Rev. 9.2) Document Number: IEEE C80216p-10_0018 Date Submitted:
1 Consideration on the Update Procedure of the System Information for M2M IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C80216p-10/0023r1.
Integrated Relay Architecture for IEEE m Systems Document Number: S802.16m-07_299 Date Submitted: November 12, 2007 Source: Sassan Ahmadi
ITU-R Liaison Group Report - Session #76 Opening Plenary IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE L /0061 Date.
Document Number: IEEE C xx/x049 Date Submitted: Source(s): Kanghee Kim and Kunmin Yeo (ETRI) and
Analysis of BR preamble selection strategies in 5-step BR procedure IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C80216m-10_1249r1.
Proposed Feature Rapporteur Group Timelines and Call for contributions IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16m-09/0762r2.
Enhancements for WirelessMAN-OFDMA IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16ppc-10/0069r2 Date Submitted:
16m Relay frame structure considering interfering issue IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16m-08/1176r1.
Text Proposals of HR-MS Forwarding in 16n Network IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16n-11/0074 Date Submitted:
Multi-Radio Integration for Heterogeneous IEEE Network Beyond 4G IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C /0015.
Project Planning Committee Closing Report (Session #77) IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE Gdoc.
Relay to Relay Communication - A SDD Proposal for m IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16m-08/047 Date.
11 ITU-R Liaison Group Report - Session #75 Closing Plenary IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE L /0058.
Synchronization Drafting Group Schedule Document Number: IEEE C802.16m-09/0379 Date Submitted: Source: Paul Cheng
Session # NRR Committee Opening Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE /0018 Date Submitted:
Femtocell Over-The-Air Signaling Supported by Relay Link Document Number: IEEE C802.16m-09/0809 Date Submitted: 2009/04/24 Source: Hung-Yu Wei, Shih-Lung.
12/10/2016 Smart Grid Requirements for IEEE M2M Network IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16ppc-10/0042.
DC RG Report Document Number: IEEE C802.16n-11/0088 Date Submitted: Source: Ming-Tuo Zhou, Sungcheol Chang DC RG.
Coordinated AP for tightly coupled BS-AP interworking for Multi-RAT devices IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE.
Definition of Device Collaboration Mode for Low Power Consumption IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16p-10_0030.
Project Planning Committee Opening Report (Session #77) IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE Gdoc.
Project Planning Committee (PPC): Session #67 Closing Plenary Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE.
Project Planning Committee (PPC): Session #68 Closing Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE ppc-10/0010.
Femto BS coexistence with WiFi-AP IEEE Presentation Submission Template (Rev. 9) Document Number: [IEEE C802.16m-08/1309r1] Date Submitted: [ ]
Title: Terminal-to-terminal direct communication Document Number: C /0010 Date Submitted: Jan 10, 2010 Source: Mariana GoldhamerVoice:
Relay/EMBS Ad-Hoc Group Report Document Number: IEEE C802.16m-09/2678r1 Date Submitted: Source: Kanchei(Ken) Loa Relay/LBS/EMBS.
Session # NRR Committee Closing Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE /0008 Date Submitted:
Suggestions for GRIDMAN PAR Proposal IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16gman-10/0005 Date Submitted:
Multi-Level Codes Sequence for Simultaneous MCS Feedback IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S80216m-08/1152 Date.
1 On 3GPP2 Femto Security Anand Palanigounder Qualcomm Inc. Notice: Contributors grant a free, irrevocable license to 3GPP2 and its Organization.
Session # Maintenance Task Group Opening and Agenda IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE maint-09/0006.
IEEE n-11/0012 Session # TGn Opening Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE n-11/0012.
HR-MS Discovery & Association Considerations for n IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16n-10/0069r1.
Frame Structure Considerations for n IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16n-11/0005 Date Submitted:
Project Planning Committee (PPC): Session #70 WG Opening Plenary Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE.
Session # Maintenance Task Group Opening Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE maint-11/0028.
1 Modifications on Subband (SB) Partitioning Equations ( and ) IEEE Presentation Submission Template (Rev. 9) Document Number:
Deregistration Identifier Analysis IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C80216m-10_1083r1 Date Submitted:
Clarification on the Usage of Femtocell Over The Air (OTA) Signaling ( ) Document Number: IEEE C802.16m-09/2603 Date Submitted: Source:
Dynamic Subcarrier/Subchannel Allocation for Interference Mitigation in IEEE802.16m Networks IEEE Presentation Submission Template (Rev. 9) Document.
IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C /0009 Date Submitted: Source(s): Shilpa Talwar, Kerstin.
Project Planning Committee (PPC): Next revision project
Discussion of n System Requirements
Discussion of n System Requirements
Emergency Service – NS/EP Vs E-911 for IEEE m
Session # NRR Committee Closing Report
Project Planning Committee (PPC): Report
IEEE Presentation Submission Template (Rev. 9) Document Number:
Mesh Topology for Relays
Project Planning Committee Opening Report
Project Planning Committee Opening Report (Session #77)
Session # Maintenance Task Group Opening and Agenda
IETF 16ng Working Group Update
Authenticated Validity for M2M devices
Project Planning Adhoc: WG Opening Plenary Report
Network Synchronization Considerations for n
Session # NRR Committee Closing Report
Session # NRR Ad Hoc Committee Report
Presentation transcript:

Security considerations for M2M IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE ppc-10/0037 Date Submitted: Source: Eldad Zeira, Alex Reznik InterDigital Communications Corp. Venue: Session #68, San Diego Base Contribution: None Purpose: To be discussed and adopted by Project Planning Committee / p Notice: This document does not represent the agreed views of the IEEE Working Group or any of its subgroups. It represents only the views of the participants listed in the “Source(s)” field above. It is offered as a basis for discussion. It is not binding on the contributor(s), who reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy: The contributor is familiar with the IEEE-SA Patent Policy and Procedures: and. Further information is located at and.

212/4/2015 M2M networks are more vulnerable to security threats than traditional networks –… and handle highly critical missions Network attacks can lead to false situational awareness, loss of privacy, and even become physical attacks –Compromised by physical or remote reconfiguration or impersonation SR recognizes this issue and recommends that it is in scope of the M2M PAR

312/4/2015 M2M devices handle highly critical missions while being… –deployed in highly distributed networks –provisioned in the field and managed over the air –operated without human supervision M2M networks and applications are vulnerable to: –Misleading reports –Network (denial of service) attacks –Loss of privacy –Cyber attacks can become physical attacks The awareness of an attack is in itself an important security related information

412/4/2015 Security susceptibilities of M2M use cases Susceptibility  Misleading reports Network attacks (particularly for WAN) Data privacyCyber attacks become physical attacks M2M use case  Secured access, surveillance, remote maintenance False situational awareness DoS attacks prevent obtaining of situational awareness Tracking, tracing & recovery False location reports Prevents timely tracking Public safety Similar to security, especially if acts of terrorism are considered Payment Transmission of information to unauthorized parties Health Care False situational awareness Prevents awareness of emergency conditions Transmission of information to unauthorized parties Malicious control can have serious health implications Smart grid Prevention of timely control requires unavailable electrical resources Malicious control can cause lasting damage to grid

512/4/2015 The vulnerabilities, more precisely… Physical Attacks such as insertion of valid authentication tokens into a manipulated device, inserting and/or booting with fraudulent or modified software (“re-flashing”), and environmental/side-channel attacks, both before and after in-field deployment. Compromise of Credentials comprising brute force attacks on tokens and (weak) authentication algorithms, physical intrusion, or side-channel attacks, as well as malicious cloning of authentication tokens residing on the device. Configuration Attacks such as fraudulent software update/configuration changes, mis- configuration by the owner, subscriber or user, mis-configuration or compromise of the access control policies. Attacks on the Network. These are the main threats to the network operator: Impersonation of devices, traffic tunneling between impersonated devices, mis- configuration of the firewall in the modem/router/gateways, Denial of Service (DoS) attacks against the core network. They may also include changing the device’s authorized physical location in an unauthorized fashion or attacks on the radio access network, using a rogue device.

612/4/2015 Security requirements in SR (0002r7, sec. 4.7) security functions, including integrity protection and the confidentiality for M2M service traffic shall be supported for M2M devices. Expected use cases for WAN M2M systems make them vulnerable to security threats in the form of physical or remote attacks on hardware, software / firmware, compromise of credentials, configuration and network attacks (e.g., denial of service). WAN M2M system should support appropriate level of authentication for the M2M device or M2M gateway to provide secure access to the authorized M2M devices. The system should support verification and validation of the exchanged data

712/4/2015 What do we need to do? 5.7 Security (from SR) –Enhanced security may require changes to the network entry/re-entry procedure. No other standardized changes in MAC / PHY are required

812/4/2015 Proposed modification to M2M PAR scope This amendment specifies IEEE Std medium access control (MAC) enhancements and minimal OFDMA PHY modifications to provide functionalities for efficient Machine to Machine communication. Enhancements are lower power consumption at the subscriber station, support by the base station of significantly larger numbers of devices, enhanced access priority, time-tolerant/controlled operation, improved device authentication at network entry and efficient support for small burst transmissions. This amendment provides continuing support for WirelessMAN- Advanced Air Interface and legacy WirelessMAN- OFDMA equipment.