1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-10-00xx-00-sec Title: Fragmentation and Security Protection Date Submitted: March 8, 2011 Present at IEEE.

Slides:



Advertisements
Similar presentations
IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM Title: Multicast Group Management TG Closing Note Date Submitted: May 15, 2012 Presented.
Advertisements

1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: ERP proposal Date Submitted: October 11, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: On padding method of AES-CBC Date Submitted: January, 17th, 2013 Presented at IEEE.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Instructions to get a Free IEEE Web Account Date Submitted: January.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Message Flow Date Submitted: March 1, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-ECDSA Title: Discussion on introducing ECDSA to d for group management Date Submitted: July.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Problem Scenario Date Submitted: September, 2007 Presented at.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: FMCA MIH Work Item Date Submitted: March, 2009 Presented at IEEE.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Handover Initiation Strategy Consistency Date Submitted: November,
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Comments Date Submitted: Jan, 06, 2006 Presented at IEEE
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IEs related Issues Date Submitted: March 2007 Presented at IEEE session.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Optimize MIIS Get Information Message Date Submitted: February.
IEEE MEDIA INDEPENDENT HANDOVER DCN: 100 Title: Cross Domain Trigger and Handover Talking Points Date Submitted: July 13, 2004.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Multiple MIH User Issues Date Submitted: November, 12-16, 2007.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: ERP proposal Date Submitted: October 13, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
IEEE DCN: SAUC Title: TG Closing Note Date Submitted: November 14, 2013 Presented at IEEE session #59 in Dallas, Texas,
MuGM IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM Title: Suggested remedy for i-115 Date Submitted: Oct, 10, 2014 Presented.
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: bcast
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE DCN: Title: TG Opening Note Date Submitted: Mar 09, 2015
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: REVP Title: m Session #70 Opening Notes Date Submitted: September 14, 2015 IEEE
IEEE MEDIA INDEPENDENT HANDOVER DCN: bcast
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Your Title Here
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: mugm
Presentation transcript:

1 IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec Title: Fragmentation and Security Protection Date Submitted: March 8, 2011 Present at IEEE March meeting Authors: Lily Chen and David Cypher (NIST) Abstract: This document proposes two options to resolve comment #191 in letter ballot 5a to incorporate data expansion due to security protections to fragmentation xx-00-sec

xx-00-sec2 IEEE presentation release statements This document has been prepared to assist the IEEE Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE The contributor is familiar with IEEE patent policy, as stated in Section 6 of the IEEE-SA Standards Board bylaws and in Understanding Patent Issues During IEEE Standards Development Section 6 of the IEEE-SA Standards Board bylawshttp://standards.ieee.org/guides/bylaws/sect6-7.html#6http://standards.ieee.org/board/pat/faq.pdf

What are the issues? In D02, no changes on the fragmentation are included. However The security protections will bring about data expansion. Fragmentation needs to consider the data expansion. Otherwise the message length may exceed the MTU after applying security protections. Currently, the inner header has identical data fields as the security header, except the security related bits (P bit and S bit). The inner header is protected with the selected ciphersuite, which may not be needed, since the plaintext header must be sent.

Data Expansion due to Applying Security Protections Ciphersuite CodeEncryptionIntegrity protectionExpansion AES-CBCHMAC-SHA (IV)+96(MIC)+127 (Padding)* = 351 bits NullHMAC-SHA (MIC) bits NullCMAC-AES96 (MIC) bits AES_CCM80 (SN) + 96 (MIC) = 176 bits * Here it is assumed that cipher stealing is not used. The ciphertext needs to carry the padding bits. If originally an aFragmentationThreshold is set (by link layer or by default), then when security protections are applied, then in order to make sure that the security protected message does not exceed MTU, the aFragmentationThreshold will be reduced to aFragmentationThreshold -d. Based on the supported ciphersuites, the maximum expansion is 352 bits (or 44 octets). We select d = 44 octets

Which options do we have? 1.Integrate fragmentation with security protections; 2.Add a security protection triggered fragmentation on the top of the old fragmentation.

Option 1: Integrated solution Fragment with a new aFragmentationThreshold, which considers data expansion d. Apply protection on the fragmented message; Include the fragmentation information in the MIH security header; No inner header is needed. The fragmentation and security protections are applied in one pass.

Option 1: Illustration Assume aFragmentationThreshold = 5 units and data expansion d = 2 units. Security header has 1 unit. Assume that the data to be protected are A, B, C, and D each of which represent 1 unit. ABC D SS 2 units security data HsHs 1 unit Security header.Data to be protected ABSSHsHs CDSSHsHs M =1, FN = 1M =0, FN = 2 Security protection and fragmentation

Option 2: Security triggered Obtain a (maybe fragmented) message with a header which includes the fragmentation information. If after applying security protection, the length exceeds aFragmentationThreshold, then fragment before applying protections. The new fragmentation information is carried in the MIH security header. At the receiver end, reassembly is done base on the security header before passing to the original reassembly function. The inner header is still needed for the original reassembly function to use.

Option 2: Illustration Assume aFragmentationThreshold = 5 units and data expansion d = 2 units. Original MIH Header and MIH security header both has 1 unit. Assume that the data to be protected are A, B, C, and D each of which represent 1 unit. SSHsHs BCSS HsHs M =1, FN = 1 M =1, FN = 2 A DHOHO HsHs SS M =0, FN = 3 ABCD SS 2 units security data HsHs 1 unit MIH Security header. Data to be protected HOHO 1 unit Original MIH header. HOHO M = 0, FN = 1 ABCD Fragmentation without considering security Fragmentation when applying security protection

Discussion Option 1 is the optimized solution. It will conduct fragmentation and security protection in one pass. It only needs to carry one header (security header). The impact to the current document is to change subclause to include security data expansion. That is, to change aFragmentationThreshold to consider d = 44 octets brought about by security protections. Option 2 requires two fragmentation functions. It can leave the original fragmentation unchanged. However, if the original fragmentation is not implemented yet, then this reason cannot be counted. The impact to the current document is to include a new subclause in Clause 9 for security triggered fragmentation and reassembly.

Proposal Adopt option 1. Add a modification to subclause