Presentation is loading. Please wait.

Presentation is loading. Please wait.

IEEE MEDIA INDEPENDENT HANDOVER

Similar presentations


Presentation on theme: "IEEE MEDIA INDEPENDENT HANDOVER"— Presentation transcript:

1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER
DCN: sec Title: Use Cases for MIH Services and MIH Protocol Threats Date Submitted: April 02, 2008 Presented at Security Study Group Teleconference on April 02, 2008 Authors or Source(s):   Shubhranshu Singh (Samsung) Marc Meylemans (Intel), Subir Das (Telcordia Technologies) Abstract: This document provides some deployment scenarios of MIH services and discusses the common security threats of MIH Protocol

2 IEEE 802.21 presentation release statements
This document has been prepared to assist the IEEE Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE The contributor is familiar with IEEE patent policy, as stated in Section 6 of the IEEE-SA Standards Board bylaws < and in Understanding Patent Issues During IEEE Standards Development

3 Deployment Scenarios (1/4)
Scenario 1: MN is in the home network and the MIH services (e.g., IS, ES, CS) are provided by the home network. hPoS Core Network PoA Home Network Access Network Note: This and the following scenarios assumes PoA and PoS are separate entities however in some specific cases they might be co-located. We’ll address issues involved in such cases separately. Mobile Node

4 Deployment Scenarios (2/4)
Scenario2: MN is in the visited network and MIH services are provided by the home network hPoS Home Network PoA Visited Network Mobile Node

5 Deployment Scenarios (3/4)
Scenario3: MN is in the visited network and MIH services are also provided by the visited network. There is a relationship between home and visited networks hPoS Home Network vPoS PoA Visited Network Mobile Node

6 Deployment Scenarios (4/4)
Scenario4: MN is in the visited or Home network and MIH services are provided by 3rd Party network. PoS 3rd Party Network PoA Home or Visited Network Mobile Node

7 What are the Issues? How to secure MIH Protocol message exchange?
How to secure the access to MIH services? How to secure discovery of MIHF network entity?

8 What are the Common Threats?
Message Modification Message Hijacking/Replay False Identity of MIHF Denial of Service No MIH Service Access Control False Network MIHF Entity Information

9 Message Modification Issues
Some intermediate node may be capable of snooping, altering and forwarding the MIH packets IE in Information services could be altered in Request or Response messages MIH events can be modified e.g., to change threshold values or even event ids and parameters Commands such as, Handover-candidate response or Handover-commit from MN or network could be modified to affect handover (packets buffered/rerouted) Having means for data protection (integrity and encryption) between source and target MIHFs at underlying layer can mitigate this security threat

10 Hijacking/Replay Issues
An ongoing session with one MIHF can be hijacked while providing the response or future packets from a different MIHF node A certain event or command can be stored from one session and replayed later to the same node Having means to verify the authenticity of the peer MIHF’s packet can mitigate this security threat

11 False Identity of MIHF Any node can provide an MIHF ID to gain access to the network MIHF entity Service Request or Response messages can be generated with any known/expired MIHF ID for which the service is not authorized or allowed MIH events can be send to change threshold values or other parameters MIH Commands such as, Handover-candidate response or Handover-commit can be send to affect handover Having means for data origin authentication from the source MIHF can mitigate this security threat

12 Denial of Service Issues
MIH events or commands can be originated by spoofing the MIHF ID Spoofing can be done as either a mobile node or a network entity that has the MIHF Any event or command can be triggered falsely to affect the network selection and handover e.g., Link-Going-Down, Link-Down and Handover-commit Having means to verify the authenticity of the MN MIHF ID or network entity that has the MIHF can mitigate this security threat

13 MIH Access Control Issues
MIH access control is what MIH services the users can receive Operator may apply subscription profile to the user for customization (e.g, may be linked with MIHF ID) User can only use certain access technologies or can only query about certain access technologies Various roaming plans or information may be available depending on subscription profile Having means for authenticating MIHF ID can mitigate this security threat

14 False Network MIHF Entity Information
This is a discovery issue IEEE defines MIH Function discovery at layer 2 and IETF defines at higher layers Discovery without proper security may lead to finding MIHF that may not be trustworthy L2 broadcast discovery is a good example, any entity can respond that it is MIH Function capable Our scope should be limited to L2 discovery We can not work on something that we have not defined Having means to protect information at lower layer can mitigate this security threat. If it uses management plane before association (e.g ) nothing much we can do

15 What is Available/Recommended
In all scenarios: Either Media Specific transport (e.g. L2) or Media independent transport (e.g., L3 and above) Media Specific Transport (e.g., MN  PoA) Security is provided by the link layers (except management plane, e.g., ) Media Independent Transport (e.g., MN  PoA or PoA  PoS) Use IPsec, TLS, DTLS

16 Next Steps? Update TR to reflect the agreed upon deployment scenarios
Perform threat analysis for the agreed upon deployment scenarios and capture them in the TR In particular, capture the threats and assumptions specific to deployment scenarios Based on the threat analysis, discuss/decide what is already available and what is specific to MIH Protocol


Download ppt "IEEE MEDIA INDEPENDENT HANDOVER"

Similar presentations


Ads by Google