Doc.: IEEE 802.19-10/0152r0 Submission November 2010 Alex Reznik, et. al. (InterDigital)Slide 1 Device Security Standards Overview Notice: This document.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0165r1 SubmissionPäivi Ruuska, NokiaSlide 1 Implementation aspects of a coexistence system Notice: This document has been.
Advertisements

Doc.: IEEE /0129r2 Submission July 2012 Mika Kasslin, NokiaSlide 1 How to accommodate different CE-CM interaction approaches in IEEE ?
Authenticated Validity for M2M devices IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16p-11/0251 Date Submitted:
Device Security Overview
Summary of 3GPP TR GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
Overview & Definitions for Downloadable Credentials 1 S GPP2 TSG-S WG1 Source: Sprint, US Cellular, Motorola Mobility, Qualcomm Contact(s):
Doc.: IEEE /0033r2 IMS Emergency Call Requirements January 2007 Donghee ShimSlide 1 IMS Emergency Call Requirements & Emergency Call number support.
Doc.: IEEE /0104r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide 1 Channel Selection Support in TVWS Date: Authors:
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
Doc.: IEEE /0262r1 Submission March 2010 Ha-Nguyen Tran et al., NICTSlide 1 Requirements and Amendment Regarding TVWS Database Access Notice:
Doc.: IEEE /02r0 Submission January 2013 Ranga Reddy, SelfSlide 1 January 2013 TGa Review IEEE P Wireless RANs Date: Authors:
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
Doc.: IEEE /0850r4 Submission September, 2005 Yao Zhonghui, Huawei Slide u Proposal Notice: This document has been prepared to assist.
FMS/TR-069 File Download Security Source: QUALCOMM Incorporated Contact(s): Anand Palanigounder Yinian Mao
Security considerations for M2M IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE ppc-10/0037 Date Submitted:
IEEE MEDIA INDEPENDENT HANDOVER DCN: REVP-Proposal-on-the-security-of Title: Proposal on the security of Date Submitted:
Doc.: IEEE /2154r1 Emergency Call Number Support September, 2007 Elly (Eunkyo) KimSlide 1 Emergency call number support Date: Authors:
Doc.: IEEE /0310r0 Submission Sept 2007 Srinivas Sreemanthula Slide 1 IEEE MEDIA INDEPENDENT HANDOVER DCN: MIH-Security-Options.ppt.
IEEE MEDIA INDEPENDENT HANDOVER DCN: REVP-Proposal-on-the-security-of Title: Proposal on the security of Date Submitted:
Doc.: IEEE /20rev0 SubmissionSlide 1 P Assumptions and Architecture Notice: This document has been prepared to assist IEEE It.
Doc.: IEEE /0013r0 Submission January 2012 Mika Kasslin, NokiaSlide 1 Motivation for Monitor WSO Notice: This document has been prepared to assist.
Submission doc.: IEEE /0015r0 January 2016 Sho Furuichi, SonySlide 1 Proposal for CM discovery/selection/ association as CE operation Date:
and LMAP liaison Document Number: IEEE R0 Date Submitted: Source: Antonio BovoVoice:
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Proposed Presentation for 3GPP Date Submitted: September,
Doc.: IEEE /0019r0 Submission February 2010 Mika Kasslin, NokiaSlide 1 High Level Architecture View Notice: This document has been prepared to.
1 On 3GPP2 Femto Security Anand Palanigounder Qualcomm Inc. Notice: Contributors grant a free, irrevocable license to 3GPP2 and its Organization.
Doc.: IEEE /0013r0 Submission January 2010 Mika Kasslin, NokiaSlide 1 Coexistence architecture of Notice: This document has been prepared.
Doc.: IEEE /0085r1 Submission June 2010 Tuncer Baykas, NICTSlide TG1 and System Design Document Notice: This document has been prepared.
Doc.: IEEE /0162r0 Submission November 2010 Jihyun Lee, LG ElectronicsSlide 1 TVWS Coexistence Procedures and Protocols Notice: This document.
14 March 2002 doc.: IEEE /152r1 Gregg Rasor, MotorolaSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
14 March 2002 doc.: IEEE /152r2 Gregg Rasor, MotorolaSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
Device Security in Cognitive Radio
Teleconference Agenda
November 2017 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [AES-256 for ] Date Submitted:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Proposal on system description, reference model and draft outline
Reference Model Proposal
November 2008 doc.: IEEE November 2008
doc.: IEEE <doc#>
P System Architecture Date: Authors: March 2010
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Secure RF Ranging] Date Submitted: [5 March,
<May,2009> doc.: IEEE <doc .....> <July 2009>
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Resolution of CID 139] Date Submitted:
July Tutorial – Possible Solutions
doc.: IEEE <doc#>
doc.: IEEE <doc#>
TG1 Introduction and Status
FCC rules and design Date: Authors: October 2010
P System Architecture Date: Authors: March 2010
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IMS Emergency Call Requirements & Emergency Call number support
doc.: IEEE <doc#>
Concept of Operation Date: Authors: July 2010
TG1 and System Design Document
Examples of deployment scenarios
July Tutorial – Possible Solutions
doc.: IEEE <doc#>
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Requirements Date: Authors: March 2010 Month Year
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Authenticated Validity for M2M devices
May 19 doc.: IEEE /424r1 September 2005
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
P System Architecture Date: Authors: March 2010
P System Architecture Date: Authors: March 2010
IMS Emergency Call Requirements & Emergency Call number support
Comments to IEEE /68 Date: Authors: September 2009
Submission Title: Security Suite Compromise
Presentation transcript:

doc.: IEEE /0152r0 Submission November 2010 Alex Reznik, et. al. (InterDigital)Slide 1 Device Security Standards Overview Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Date: Authors:

doc.: IEEE /0152r0 Submission Abstract Follow-up to presentation at the last meeting Provide an overview of what other SDOs are doing in this area Propose a way for to proceed on this topic Alex Reznik, et. al. (InterDigital)Slide 2 November 2010

doc.: IEEE /0152r0 Submission General Standardization Approach Early ‘solution’ specifications are emerging –Trusted Computing Group (TCG) Recognized leader SDO in defining device security solutions (for all of the computing market, not just the mobile market) –Trusted Mobile Phone (MPWG) Specs –Trusted Network Connect (TNC) Specs. –3GPP Rel-9 Technical Report (TR ) and Rel-10 Technical Spec (TS33.320) on H(e)NB Security 3GPP Rel-8 Technical Report (TR ) on M2M Remote Subscription Management. –OMTP (Open Mobile Terminal Platform) Industry-leading SDO defining specification for secure mobile terminals (but not interoperability) Trusted Environment: TR 0 (approved 2008) –Requirements for Debug-port protection, Mobile Device ID, SIMLock and ME personalization, DRM requirements, Secure Boot requirements, Secure binding (between USIM and ME), Secure FLASH update mechanisms Advanced Trusted Environment: TR1 Recommendations (approved 2010) –Identifies 7 “threat groups”: HW modules used for accessing memories, threats on displaying memories and displayed data, Bypassing of security by removal of battery power or external memory card, Attack by replacement of Flash when power is off (pre-boot), Extract secret by bus monitoring (HW probes), Mod chip attacks on data in external RAM, attack by replacement of FLASH when power is on (post-boot) –New, requirements Secure storage, Flexible Secure Boot, Generic Bootstrap Architecture, Runtime Integrity Checking (RTIC), Secure access to User Input/Output, Secure interaction between UICC and ME However, device security is proprietary in implementation and new from a standardization requirements perspective –Most existing SDO focus on ‘platform requirements’ rather than specific solutions –Minimal interoperability requirements are captured Support existing solutions Make sure the standard can evolve in the future –Manufacturers can implement proprietary solutions as long as they can Prove to users/operators that their solutions meet the standardized platform requirements Support the standardized interoperability protocols, including device security support November 2010 Alex Reznik, et. al. (InterDigital)Slide 3

doc.: IEEE /0152r0 Submission Example Device-Security Requirements - Adopted 3GPP Home(e)NB Security spec TS (approved 2009) –Specified device-security requirements –Section 5.1: Secure storage and execution; 5.1.2: Trusted Environment (TrE) The Trusted Environment (TrE) shall be a logical entity which provides a trustworthy environment for the execution of sensitive functions and the storage of sensitive data. All data produced through execution of functions within the TrE shall be unknowable to unauthorized external entities –Section 5.2: Device Mutual Authentication Device mutual authentication shall be performed using certificates. The H(e)NB’s credentials and critical security functions for device authentication shall be protected inside a TrE... –Section 6.1: (Boot-time) Device Integrity Check The H(e)NB and TrE shall perform a device integrity check upon booting and before connecting to the core network and/or to the H(e)MS. The device integrity check shall be based on one or more trusted reference value(s) and the TrE... –Section 7.1: (Implicit) Device Validation The H(e)NB shall support a device validation method where the device implicitly indicates its validity to the SeGW or H(e)MS by successful execution of device authentication..... If the device integrity check according to clause 6.1 failed, the TrE shall not give access to the sensitive functions using the private key needed for H(e)NB device authentication with the SeGW. November 2010 Alex Reznik, et. al. (InterDigital)Slide 4

doc.: IEEE /0152r0 Submission Example Device-Security Requirements –Adopted IEEE Draft 5.0 (… ok – almost adopted) –Enables the use of device security to enhance operation –Specifies how device security is to be used –Section 10: Configuration Tamper-proof mechanisms shall be implemented to prevent unauthorized modification to firmware and/or functionalities (e.g., MAC address, SM/SSA functionality, database service communication, RF sensing, DFS, TPC, tuning) that would allow device or network operation to violate either the specifications of the standard or the requirements of the local regulations. Any attempt to load unapproved firmware into an device shall render it inoperable. Measures for both local and remote attestation of authorized and approved hardware and software running on an device shall be implemented. Implementation of the Trusting Computing Group's Trusted Platform Module (TPM) Main Specification Level 2 Version 1.2 (Revision 103) [see TPM references in clause 2] shall be used to bind the hardware and software running on devices to a cryptographic key. –Annex F: Network Security Aspects –F.3: Authorization Only the authorized parties shall be allowed to configure the spectrum manager at the BS and the 1 spectrum automaton at the CPE Configuration information shall be identified and protected November 2010 Alex Reznik, et. al. (InterDigital)Slide 5

doc.: IEEE /0152r0 Submission Examples Device-Security Requirements – Studied 3GPP M2M remote subscription management TR (2009) –Device-security solutions Section 5.1: Candidate solution Alternative 1A using TRE-based remote subscription provisioning and change –5.1.2: Trusted Environment (TrE) – : Platform Validation Authority (PVA) – : (Network Interactions for MCIM provisioning in case of 3GPP access) Steps 12/13. platform validation of M2M equipment by PVA. –The PVA locally validates the authenticity and integrity of the M2ME, according to the requirements of the SHO… 3GPP H(e)NB security tech. report TR (approved 2009) –Studied device-security solutions Section 7.2.2: Trusted Environment Section 7.5: Device Integrity Check –7.5.2: H(e)NB Validation : Autonomous Validation : Remote Validation : Semi-autonomous Validation Section 7.12: H(e)NB Distress Indication The H(e)NB should be equipped with a distress communication function, the principal purpose of which is to facilitate transmission of a distress indication message to the network, in case the H(e)NB fails device integrity verification... November 2010 Alex Reznik, et. al. (InterDigital)Slide 6

doc.: IEEE /0152r0 Submission What Should Consider? Consistent with other SDOs, take a minimal approach –Platform requirements Out of scope for May consider an appendix stating potential/recommended secure platform requirements for CM/CE platforms –Minimal interoperability support In scope for Potential interoperability support –Device security capability Indicated as part of CE subscription with CM –Device Integrity Check result Explicit via signaling Implicit in certain operations (e.g. successful integrity check allows authentication to proceed) –Command compliance certification Explicit via signaling of certificates or tokens Implicit in the command acknowledgement whenever device is “device security capable” November 2010 Alex Reznik, et. al. (InterDigital)Slide 7