Doc.: IEEE 802.11-01/403r0 Submission July 2001 Albert Young, 3Com, et alSlide 1 Supplementary Functional Requirements for Tgi ESS Networks Submitted to.

Slides:



Advertisements
Similar presentations
1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Advertisements

Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Submission psc Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Integration WPAN.
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 1 Re-authentication when Roaming Dan Harkins.
EAP Channel Bindings Charles Clancy Katrin Hoeper IETF 76 Hiroshima, Japan November 08-13, 2009.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Network Security1 – Chapter 5 (B) – Using IEEE 802.1x Purpose: (a) port authentication (b) access control An IEEE standard
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Wireless and Security CSCI 5857: Encoding and Encryption.
Doc.: IEEE / wng Submission March 2007 Takeshi Nakamura, Trinity Security Systems, Inc.Slide 1 IPN-WLAN: ‘IPN’ enabled Wireless LANs A.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Problem Statement for Authentication Signaling Optimization Date.
Doc.: IEEE xxxxx Submission doc. : IEEE Nov 2012 Slide 1 Project: IEEE P Working Group for Wireless Personal Area.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
Doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 1 TGe Requirements Version r2 8 June 2000.
Doc.: IEEE /033r2 Submission July 1999 Simon Baatz, University of BonnSlide 1 Integration of Bluetooth into LAN Environments Simon Baatz, Matthias.
ProjectIEEE Working Group on Mobile Broadband Wireless Access TitleIEEE MBWA Security Architecture.
Doc.: IEEE /0498r0 Submission April 2008 Eldad Perahia, Intel CorporationSlide 1 Modifications to the 60GHz PAR & 5 C’s Proposal Date:
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
Doc.: IEEE /361r0 Submission November, 00 Boaz Carmeli, IBM HRLSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
Doc.: IEEE Submission November 2012 Sunggeun Jin (ETRI)Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Sec Title: Considerations on use of TLS for MIH protection Date Submitted: January 14, 2010.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
1 Pascal URIEN, IETF 63th Paris, France, 2nd August 2005 “draft-urien-eap-smartcard-type-02.txt” EAP Smart Card Protocol (EAP-SC)
Wireless security Wi–Fi (802.11) Security
SACRED REQUIREMENTS DOCUMENT Stephen Farrell, Baltimore Alfred Arsenault, Diversinet.
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
Doc.: IEEE /109r1 Submission July 2002 J. Edney, H. Haverinen, J-P Honkanen, P. Orava, Nokia Slide 1 Temporary MAC Addresses for Anonymity Jon.
Computer Science and Engineering 1 Mobile Computing and Security.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Wireless Unification Theory William Arbaugh University of Maryland College Park.
Omniran CF00 1 Key Concepts of Authentication and Trust Establishment Date: Authors: NameAffiliationPhone Max RiegelNokia Networks+49.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Doc.: IEEE /0448r0 Submission March, 2007 Srinivas SreemanthulaSlide 1 Joiint TGU : Emergency Identifiers Notice: This document has been.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
Doc.: IEEE xxxxx Submission doc. : IEEE Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: MIH security issues Date Submitted: July, 02, 2007 Presented at.
14 March 2002 doc.: IEEE /152r1 Gregg Rasor, MotorolaSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
14 March 2002 doc.: IEEE /152r2 Gregg Rasor, MotorolaSlide 1Submission Project: IEEE P Working Group for Wireless Personal Area Networks.
Teleconference Agenda
OmniRAN Introduction and Way Forward
– Chapter 5 (B) – Using IEEE 802.1x
doc.: IEEE xxx Bob Beach Symbol Technologies
Maryna Komarova (ENST)
Stephen McCann, Siemens Roke Manor
Stephen McCann, Siemens Roke Manor
OmniRAN Introduction and Way Forward
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
TG1 and System Design Document
Requirements Date: Authors: March 2010 Month Year
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
27 Febraury 2002 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Sub-committee Status Report.
Submission Title: Dallas i/ Liaison Report.
Requirement Motions Date: Authors: July 2005 July 2005
Submission Title: Security Suite Compromise
Presentation transcript:

doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 1 Supplementary Functional Requirements for Tgi ESS Networks Submitted to IEEE TGi July 2001 Albert Young, Dan Nessett, 3Com H. Haverinen, J.P. Edney, Nokia Simon Blake-Wilson, Certicom

doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 2 Reason for this submission May Meeting issued call for “new technical proposals” We need a basis on which to compare technical proposals and also evaluate the existing technical decisions There is confusion over which requirements were adopted previously. Document 00/245r1 has general requirements - but little substantive detail This document adds a number of additional requirements which are felt to be important for the adopted method

doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 3 Structure of requirements It is assumed that one method will be specified as “mandatory to support” Might be different mandatory method for ESS and IBSS. These requirements relate to ESS Requirements presented in three sections: All methods must meet some requirements Mandatory method must meet additional requirements Desirable (but not required) attributes for all methods

doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 4 Requirements for all methods All methods must provide one or more session master key(s) from which other session keys required by packet security methods can be derived. Fast handoff (<?? ms) must be supported, either inherently by the method or via context transfer to be specified in TGf. – Subject to further technical discussion. All methods should conform to current RFC2284 (EAP) & 802.1X All methods must support mutual authentication between supplicant and network authentication server/s (for example upon association and re-association). For re-association context transfer method may be use to inherit previous mutual authentication.

doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 5 1.The mandatory method must be resistant to all known active and passive attacks, including dictionary attacks, man-in- the-middle attacks, replay attacks, and interleaving attacks. 2.The mandatory method shall not require a client certificate 3.The mandatory method must conform to IEEE intellectual property policy 4.The mandatory method should allow deployment using a common authentication database for wireless LAN, wireline LAN and remote network access. Requirements for mandatory method(1)

doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 6 1.The mandatory method must be suitable for a range of deployment scenarios such as: -Mobile device to network in corporate environment -Mobile device to internet gateway in home environment -Mobile device to public infrastructure network 2.The mandatory method must be suitable for implementation in access points and client which have low or moderate computational resources. “Low or moderate” computational resources means a class of device for which the following example is indicative: –On initial association, a 40MIPS access point or mobile terminal with limited RAM must be able to execute the method in 5 seconds or less. Requirements for mandatory method(2)

doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 7 3.The Security capabilities of the mandatory method shall meet or exceed that the required to maintain integrity against both active and passive attacks of 2 80 work factor and probability of successful bogus authentication (in the absence of 2 80 work) of at most The mandatory method must allow the client to roam among access points without advance knowledge of all potential access points available. 5.The protocol used by the mandatory method must be capable of implementation in conjunction with legacy network access databases. Requirements for mandatory method(3)

doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 8 Desirable Attributes (1) 1.A method should be specified for use in IBSS (ad hoc) networks but this method need not necessarily be the same as the mandatory method for ESS networks 2.In the event that two candidates for the mandatory method offer similar security capabilities, the method with lowest computational resources should be chosen. 3.If it is necessary to reference technical specifications or standards which are outside the scope of control of the IEEE802 exec, such references should not include draft versions or "work in progress"

doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 9 Desirable Attributes (2) 4.The method should provide simple disaster recovery in face of various possible compromises including: -compromise of a client's "credentials" -compromise of any access point's credentials -compromise of any authentication server 5.The method should provide anonymity from standpoint of an attacker. In other words the identity of the supplicant should not be available to a third party wireless observer.

doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 10 Conclusion After suitable discussion we propose that additional requirements be adopted by the Tgi group