1 6/3/2003 IEEE 802.1 Link Security Study Group, June 2003, Ottawa, Canada Secure Frame Format PAR: 5 Criteria.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /661r1 Submission November 2002 Ziv Belsky, WavionSlide 1 Proposal for the 5 criteria for the HT SG.
Advertisements

Doc.: IEEE /661r0 Submission November 2002 Ziv Belsky, WavionSlide 1 Proposal for the 5 criteria for the HT SG.
Overview of the SDE Protocol Presented by Ken Alonge Chair,
ECMP for 802.1Qxx Proposal for PAR and 5 Criteria Version 2 16 people from ECMP ad-hoc committee.
Extended Service Set (ESS) Mesh Network Daniela Maniezzo.
Submission doc.: IEEE Comment #1 from WG Comment: In Section 5.2.b two examples of spectrum resource measurements are given: PER and.
1 Force10 Networks, Inc. - Confidential and Proprietary, For Internal Use Only 1 Higher Speed Ethernet Update Greg Hankins APNIC IX SIG APRICOT /02/28.
CSD for P802.1AS-REV WG Wednesday, 05 November 2014.
CSCI 465 D ata Communications and Networks Lecture 20 Martin van Bommel CSCI 465 Data Communications & Networks 1.
IEEE 802.1ABrev Extension for Auto Attach Nigel Bragg Dan Romascanu Paul Unbehagen.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
21-08-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: mrpm Title: Comments on PAR/5C of MRPM SG Date Submitted: September 7, 2008.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
IEEE Qbv DRAFT 5C’s for Time Aware Shaper enhancement to 802.1Q
Documenting Network Design
Doc.: IEEE /252 Submission November M. Hoeben - No Wires Needed Load Balancing PAR Criteria Maarten Hoeben.
LAN Overview (part 2) CSE 3213 Fall April 2017.
Doc.: IEEE /0981r1 TGs Reference Architecture Considerations September 6, 2004 Tricci So & W. Steven Conner.Slide 1 TGs ESS Mesh System Reference.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
IEEE SCC41 PARs Dr. Rashid A. Saeed. 2 SCC41 Standards Project Acceptance Criteria 1. Broad market application  Each SCC41 (P1900 series) standard shall.
Doc.: IEEE 802 ec-12/0006r0 Submission Liaison presentation to SC6 regarding Internet Security Date: 2012-February-13 Authors: IEEE 802 LiaisonSlide 1.
PAR and CSD for P802.1Qxx WG January PAR (1) 1.1 Project Number: P802.1Qxx 1.2 Type of Document: Standard 1.3 Life Cycle: Full Use 2.1 Title:
Doc.: IEEE /0130r0 Submission January 2008 Gal Basson (Wilocity)Slide 1 VHT PAR Direction Date: Authors:
Standardization of Mobile Wireless Small Cell Backhaul (SCB) Document Number: IEEE r Date Submitted: Source: Junhyeong.
Doc.: IEEE /0498r0 Submission April 2008 Eldad Perahia, Intel CorporationSlide 1 Modifications to the 60GHz PAR & 5 C’s Proposal Date:
Page 1 IEEE Ethernet Working Group - CSD Version 2.3 Items required by the IEEE 802 CSD are shown in Black text, supplementary items required by.
1 Chapter 3: Multiprotocol Network Design Designs That Include Multiple Protocols IPX Design Concepts AppleTalk Design Concepts SNA Design Concepts.
Consolidated comments on LASG 802c PAR and CSD Stephen Haddock March 11,
CSD for P802.1Qcj WG January Project process requirements Managed objects – Describe the plan for developing a definition of managed objects.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
1 Recommendations Now that 40 GbE has been adopted as part of the 802.3ba Task Force, there is a need to consider inter-switch links applications at 40.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Doc.: IEEE /0542r0 SubmissionSimone Merlin, QualcommSlide 1 HEW Scenarios and Goals Date: Authors: May 2013.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Doc.: IEEE xxxx-00-0psc Submission Slide1 PicoCast Forum Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
1 IEEE interim, Orlando, Florida, March, 2008new-nfinn-fast-chains-rings-par5c-0308-v1 Fast Recovery for Chains and Rings Proposal for PAR and 5.
Doc.: IEEE sru Submission 11 November 2013 M Ariyoshi, S Kitazawa (ATR)Slide 1 Project: IEEE P Working Group for Wireless Personal.
1 3/13/ :25 Chapter 5Protocol Architecture1 Rivier College CS575: Advanced LANs Chapter 5: Protocol Architecture.
Doc.: IEEE /0860r0 Submission July 2010 Jon Rosdahl, CSRSlide 1 Comments for p New PAR – July 2010 Date: Authors:
Doc.: IEEE ulp Submission Slide 1 May 2012 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
IEEE Std Proposed Revision Purpose, Scope & 5 Criteria.
Contents of this presentation ● PAR material (Title, Scope, Purpose) ● Material as developed at previous meetings ● Provision for new/revised material.
Contents of this presentation ● PAR material (Title, Scope, Purpose) ● Material as developed at previous meetings ● Provision for new/revised material.
November 99 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposal for WPAN High Rate Study Group]
Below 6GHz 11vht PAR&5C's proposal
IEEE P criteria responses
Comments on HT PAR & 5 Criteria
doc.: IEEE <doc#>
P802.1CS Link-local Registration Protocol
Review of March 2013 Proposed Pars
VHT SG PAR Feedback from Individuals
VHT PAR Direction Date: Authors: January 2008 July 2007
Submission Title: [Proposal on PAR and 5C draft for BAN]
<month year> Denver, March 2006
Privacy Recommendation PAR Proposal
Submission Title: [Proposal on PAR and 5C draft for BAN]
doc.: IEEE <doc#1>
Below 6GHz 11vht PAR&5C's proposal
900 MHz ISM Band Date: Authors: January 2010 Month Year
<month year> Denver, March 2006
comments on Pending 802 PARs – July 2011
Comments for p New PAR – July 2010
IEEE Comments on aq PAR and 5C
IEEE Comments on aq PAR and 5C
Submission Title: BAN closing report for San Diego, CA
Interest for HDR extension to a
Presentation transcript:

1 6/3/2003 IEEE Link Security Study Group, June 2003, Ottawa, Canada Secure Frame Format PAR: 5 Criteria

2 6/3/2003 IEEE Link Security Study Group, June 2003, Ottawa, Canada Distinct Identity a) Substantially different from other IEEE 802 standards. b) One unique solution per problem (not two solutions to a problem). c) Easy for the document reader to select the relevant specification. 1. Existing standards that are applicable to all MACs specify end to end security. There is no general specification that allows individual LANs or parts of a Bridged Local Area Network to be secured. 2. The existing standards that protect individual LANs or segments are MAC specific, and do not apply to the bulk of the application space (802.3) 3. Higher layer security protocols, e.g. IPSEC, do not protect against intrusion at the MAC layer and thus do not adequately separate users of publicly accessible networks based on 802 LAN/MAN technology. 4. There is user traffic which is unlikely to be subject to IPSEC or other higher layer security mechanisms that will be protected by this standard.

3 6/3/2003 IEEE Link Security Study Group, June 2003, Ottawa, Canada Broad Market Potential a) Broad sets of applicability b) Multiple vendors and numerous users c) Balanced costs (LAN versus attached stations) 1. Public networks for residential and business applications represent a new and very broad application space for IEEE802 wireline technologies. LAN/MAN security is a key requirement for the deployment of 802.3, EFM, RPR and other 802 technologies in subscriber and metro access networks. 2. The proposed standard will allow vulnerable parts of networks to be transparently secured without incurring modifications or costs for attached stations or burdening network applications. This is expected to facilitate rapid deployment of solutions based on this standard. 3. At the Call for Interest on November 2002, 32 individuals from 18 companies representing both vendors and users expressed their support for the project individuals from more than 30 companies have attended the study group sessions.

4 6/3/2003 IEEE Link Security Study Group, June 2003, Ottawa, Canada Compatibility a) Conformance with 802.1D, 802.1Q, 802.1f b) Compatible managed object definitions c) Conformance with 802 Overview and Architecture As a supplement to IEEE Std 802.1, the proposed project will remain in conformance with the 802 Overview and Architecture. As a supplement to IEEE Std 802.1, the proposed project will remain in conformance with 802.1D, 802.1Q, 802.1f. Managed objects will be defined consistent with existing policies and practices for standards.

5 6/3/2003 IEEE Link Security Study Group, June 2003, Ottawa, Canada Technical Feasibility a) Demonstrated system feasibility. b) Proven technology, reasonable testing. c) Confidence in reliability. 1. Commercially available implementations of encryption/decryption products currently provide data integrity and confidentiality at Gigabit speeds, demonstrating feasibility. 2. There are widely deployed key management and secure association technologies that demonstrate that technical support will be available for this standard.

6 6/3/2003 IEEE Link Security Study Group, June 2003, Ottawa, Canada Economic Feasibility a) Known cost factors, reliable data. b) Reasonable cost for performance. c) Consideration of installation costs. 1. Similar technologies have been implemented in and IPsec and both have been proven to be cost effective solutions. 2. Link security mechanisms are incorporated to other link mechanisms at a reasonable cost increment. Initial studies show that encryption at the Gbps rate is also possible with a similar relative low network cost increment. 3. The security mechanism will add modest cost relative to the installation cost of public access network technology.