M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date: 2014-01-27.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
SEC Clarification Group Name: WG4 (SEC-2014-xxxx) Decision  Meeting Date: Discussion  Source: OBERTHUR Technologies Information  Contact:
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: LB1c-handover-issues.ppt Title: MIH Security – What is it? Date Submitted:
© 2003 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Service Layer Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP16 Agenda Item:
Applied Cryptography for Network Security
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Data Security in Local Networks using Distributed Firewalls
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
Cryptography and Network Security
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Mechanism to support establishment of charging policies Group Name: WG2-ARC Source: InterDigital Meeting Date: TP8 Agenda Item:
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Chapter 21 Distributed System Security Copyright © 2008.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
3GPP Rel-13 Interworking discussions
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
(c) Mitsubishi Electric Corp. 1 User Scenarios & Security Considerations in APPAGG part 2/ Nobuhiro Electric.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.
Work Group / Work Item Proposal Slide 1 © 2012 oneM2M Partners oneM2M-TP oneM2M_Work_Group_Work_Item_Proposal Group name: Technical Plenary Source:
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Access Control Status Report Group Name: ARC/SEC Source: Dragan Vujcic, Oberthur Technologies, Meeting Date: 09/12/2013 Agenda Item:
Status Report on Access TP8 Group Name: WG2 Decision  Meeting Date: Discussion  Source: OBERTHUR Technologies Information  Contact:
Lecture 24 Wireless Network Security
Node-Specific Resource Group Name: ARC&MAS Source: LGE, Meeting Date: Agenda Item: Contribution.
Primitive End-to-End Security Requirements Group Name: SEC WG4 Source: Phil Hawkes, Qualcomm, Meeting.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
Web Services Security Patterns Alex Mackman CM Group Ltd
Access Control Status Report Group Name: ARC/SEC Source: Dragan Vujcic, Oberthur Technologies, Meeting Date: 09/12/2013 Agenda Item:
Role Based Access Control In oneM2m
Computer Security: Principles and Practice
M2M Service Session Management (SSM) CSF
Network Security Introduction
Realizing Ms Interface with OMA DM Group Name: MAS WG Source: Seungkyu Park, LG Meeting Date:
August 2, 2005 IETF 63 – Paris, France Media Independent Handover Services and Interoperability Ajay Rajkumar Chair, IEEE WG.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
M2M Service Session Management (SSM) CSF Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP8 Agenda Item:
WG5 - MAS Progress Report at TP #8 Group Name: WG5 MAS (Management, Abstraction & Semantics) Source: Yongjing Zhang, Chair, Meeting.
Draft way Forward on Access Control Model and associated Terminology Group Name: SEC Source: Dragan Vujcic, Oberthur Technologies,
DM Collaboration – OMA & BBF: Deployment Scenarios Group Name: WG5 - MAS Source: Tim Carey, ALU, Meeting Date:
Database System Implementation CSE 507
End-to-End Security for Primitives
Building Distributed Educational Applications using P2P
WPM ad-hoc group report TP#25
Module 8: Securing Network Traffic by Using IPSec and Certificates
BY GAWARE S.R. DEPT.OF COMP.SCI
Service Layer Dynamic Authorization [SLDA]
Seraphim : A Security Architecture for Active Networks
* Essential Network Security Book Slides.
Security Protection Goals
Maryna Komarova (ENST)
Securing the CASP Protocol
Data Security in Local Networks using Distributed Firewalls
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
Module 8: Securing Network Traffic by Using IPSec and Certificates
Security in SDR & cognitive radio
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Presentation transcript:

M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date: Agenda Item: Adhoc

Collaboration Sessions oneM2M Deployment Scenarios - Completed Translation Approach for Requests and Notifications – Wed, Jan 8 th 13:00 UTC Session Management between the Service Layer and DM Servers – Wed Jan 15 th 13:00 UTC Security establishment between the Service Layer and DM Servers – Mon Jan 27 th 13:00 UTC Extra: Mon, Mar 24 th 13:00 UTC 2

Agenda 1.M2M Service Session/Link Security 2.Request Access Management 3

oneM2M Functional Architecture 4

Management Architecture 5

Disclaimer Warning: The oneM2M Security Functions are still a work in progress and are volatile at this stage of development. Member organizations should not use these requirements in this contribution until they have been aligned with a completed draft of the TS

What has to be Secured? The “ms interface” – M2M Service Session/Link Security The command and notification (request) where identification and authorization is based on the oneM2M originator of the request. 7

M2M Service Session/Link Security When we look at the session, link security requirements of the “ms interface” we can refer to the BBF TR-131 for this: – The NBI MUST provide support for standards-based security. This includes authentication of both Server and Client, authorization, link security so that it can be verified that the content has been sent from the appropriate sender and was not modified while in transit. Information should also be confidential (encryption). 8

M2M Service Session/Link Security In oneM2M, requirements exist that are applicable to link/session security: – SER-001: The M2M System shall incorporate protection against threats to its availability such as Denial of Service attacks. – SER-002: The M2M System shall be able to ensure the confidentiality of data. – SER-003: The M2M System shall be able to ensure the integrity of data. – SER-009: The M2M System shall be able to support mutual authentication for interaction with Underlying Networks, M2M Services and M2M Application Services. – SER-012: The M2M System shall be able to support countermeasures against Impersonation attacks and Replay attacks. – SER-016: The M2M System shall be able to support non repudiation within the M2M service layer and in its authorized interactions with the network and application layers. – SER-024: The M2M System shall enable M2M Applications to use different and segregated security environments. 9

M2M Service Session/Link Security Requirements The DM Server shall be able to ensure the confidentiality of data. The DM Server shall be able to ensure the integrity of data. The DM Server shall be able to support mutual authentication for interaction with the M2M Service Layer. The DM Server shall be able to support countermeasures against Impersonation attacks and Replay attacks. The DM Server shall be able to support non repudiation with authorized interactions with the M2M Service Layer. This last requirement requires additional discussion and clarification: The DM Server shall be capable of using different and segregated security environments. 10

Request Access Management Requests between Application Entities and CSEs are authenticated and authorized by Security CSF within the CSE using 3 components – Access Control – Authorization – Authentication (not shown; TBD) While these components currently only consider Application and CSE interactions – the Security Functions are expected to be extended across the Underlying Network Service Entity (DM Server). 11

Extending Access Management to the DM Server Once a request has performed an Access Decision by the M2M Service Layer to allow the request, the M2M Service Layer must select the appropriate DM Server along with elements the DM Server would need to implement access management within the DM Server: – Identity of the subject (oneM2M Originator) of the request: This is needed in scenarios where the original issuer of the request is needed to be known – this could be done by correlating principals (e.g., Roles, Accounts) used by the M2M Service Layer and DM Server. 12

Access Management Requirements The DM Server shall be capable of providing a mechanism for the M2M Service Layer to discover the Access Management elements used to authorize and authenticate access to resources controlled by the DM Server. The M2M Service Layer shall be capable of correlating Access Management elements provided by the DM Server to Access Management elements used by the M2M Service Layer. The M2M Service Layer shall be capable of providing secured storage of Access Management elements within the M2M Service Layer. 13

Terms Access Decision: Authorization reached when an entity’s Privileges, as well as other Access Control Attributes, are evaluated. Privilege: Qualification given to an entity that allows a specific operation (e.g. Read/Update) on a specific resource (e.g.: an entry in ACL specifies a privilege, not an Access Decision). – Note: In addition to being granted a Privilege, the entity must also satisfy any conditions of the Access Control Attributes. Access Control Attributes: Set of parameters of the originator, target resource, and environment against which there could be rules evaluated to control access. – Note: An example of Access Control Attributes of Originator is a role. Examples of Access Control Attributes of Environment are time, day and IP address. An example of Access Control Attributes of targeted resource is creation time. Alignment of the RBAC model Terminology with the existing oneM2M Terminology – (RBAC) User => (oneM2M) Originator – (RBAC) operations, objects => oneM2M (Hosting CSE resources) – Support for ACL and ABAC (Role as an attribute of ABAC) 14