Download presentation
Presentation is loading. Please wait.
1
IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-09-0086-00-0sec
Title: Security TG Closing Note Date Submitted: May 13, 2009 Presented at IEEE session #32 in Montreal Authors or Source(s): Yoshihiro Ohba (Toshiba) Abstract: Security TG Closing Report for session #32 sec
2
IEEE 802.21 presentation release statements
This document has been prepared to assist the IEEE Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE The contributor is familiar with IEEE patent policy, as stated in Section 6 of the IEEE-SA Standards Board bylaws < and in Understanding Patent Issues During IEEE Standards Development sec
3
Progress in May 2009 Meeting
Completed Proposal Presentation I Work items #1 and #2 are covered by seven proposals (59,60,62,63,64,65,66) Method-specific re-auth with standalone authenticator (EAP-FRM) Security related events and commands Security-related Information Elements Packet-Level authentication Use of hash trees for E2E IS protection Proactive auth with media-independent authenticator architecture MIH-level protection w/TLS handshake over MIH for key establishment Pre-authentication root key with ERP over MIH and MIH_SEC_SAP Relatively major specific issues ERP vs. method-specific re-auth with standalone authenticator in terms of implementation easiness and required standardization work Message authentication with short-term cert vs. message authentication with SA establishment Trust model with MIH intermediary for e2e IS protection Media-independent authenticator (MIA) architecture MIH_SEC_SAP vs. MIHF w/integrated security module Context binding details Editor’s presentation of summary, observations on the current proposals and next steps expected for the next revisions of proposals ( ) sec
4
Next Steps Proposal Presentation II (July 2009)
Detailed text is needed New proposals are still accepted according to CFP (cf ) New proposal is a proposal that is either extension of presentation in Proposal Presentation I , or is addressing (part of) work item not yet already covered or presented in proposal presentation I but described in TR document Proposals must be submitted to Document Repository ( Group: Security Document Title: TGa_Proposal_Firstname_Lastname (e.g.,TGa_Proposal_Yoshihiro_Ohba) Submission deadline for proposals: July 5th, 2009 end of day AOE (Anywhere On Earth) After the submission deadline, no new revision of proposal is allowed until the end of July meeting Comments on proposals may be submitted as a contribution for discussion in July meeting Submission deadline for comments: July 12th, 2009 end of day AOE It is recommended to consider harmonization among overlapping proposals sec
5
Teleconferences June 10 (Wed) 10am-noon Eastern Time
Main topic: discussion on identified issues on the proposals sec
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.