Download presentation
Presentation is loading. Please wait.
Published byCameron Atkins Modified over 9 years ago
1
1 Security Drafting Group Session #62 Report IEEE 802.16 Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16m-09/1650 Date Submitted: 2009-07-16 Source: Jicheol Lee Samsung ElectronicsE-mail:jicheol.lee@samsung.com Security DG Chair Venue: San Francisco, CA, USA Base Contribution: None Purpose: For discussion in TGm Notice: This document does not represent the agreed views of the IEEE 802.16 Working Group or any of its subgroups. It represents only the views of the participants listed in the “Source(s)” field above. It is offered as a basis for discussion. It is not binding on the contributor(s), who reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.16. Patent Policy: The contributor is familiar with the IEEE-SA Patent Policy and Procedures: and.http://standards.ieee.org/guides/bylaws/sect6-7.html#6http://standards.ieee.org/guides/opman/sect6.html#6.3 Further information is located at and.http://standards.ieee.org/board/pat/pat-material.htmlhttp://standards.ieee.org/board/pat
2
Security DG (Executive Summary) Meeting General – Place: TGm-C, Hyatt Regency SFO, USA – Date: July 14 th 2009, Time: 1:30 PM ~ 6:20PM – Chaired by Jicheol Lee (jicheol.lee@samsung.com) Executive Summary – The group reviewed the 6 contributions for security issues including AMS security, Key Agreement and TEK Usage. – The group agreed with the 4 contributions (C80216m-09_1559r1 as is and C80216m-09_1559r1, C80216m-09_1355, and C80216m-09_1234 with modifications). 2 contributions are superseded by the accepted ones. Recommendation – Accept the AWD Comment #73 (C80216m-09_1234r1)
3
Detailed Group reviewed Agenda – Announced Security DG Group Activities is going through e-mail reflector 16m-security@googlegroups.com – Result of Security DG Contribution: C80216m-09_1234 Group reviewed and discussed the following contributions – C80216m-09_1557r2 Resolution: accepted as is for the section 15.2.4.4.2 Control Plane Signaling Protection – C80216m-09_1559r1 Resolution: Accepted as modified (rev2) for the section 15.2.4.4.1 AMS Privacy (Attachment 1)
4
Detailed - Cont Group reviewed and discussed the following contributions – C80216m-09_1262r1 Superseded by 1559r1 with note that specific key derivation method also need to be provided. – C80216m-09_1355 Issue when to send MSID* to BS – Option 1. sending MSID* during ranging procedure – Option 2: sending MSID* during key agreement – Straw poll: Option 1 (1), Option 2 (7) – Group decided to go with option 2. Accepted as modified (r1)
5
Detailed - Cont Group reviewed and discussed the following contributions – C80216m-09_1602r2 Group reviewed the contribution For Key Generation part, the mechanism for generating MSID* has security issue since it is derived from MSK. For TEK Usage part, there are corner cases when re-authentication. Chair recommended to bring another contribution after solving the problem Group Resolution: Superseded by 1335 r1 – C80216m-09_1234 to see if there are any other issues A few blanket has been removed All the empty section have been removed. 1234 r1 will be used as baseline to be merged with accepted document today.
6
Detailed - Cont Group reviewed and discussed the following contributions – Action Items DG Chair will merge the documents accepted today. DG Chair will provide the merged document and submit it. Note that Security DG will be welcome to discuss contributions which are controversial during this meeting.
7
Annex: 16m Security Contributions Resolution Contribution NumberAuthorsSection # (Topics)Resolution C80216m-09_1557r2Gene Beck Hahn, Ki Seon Ryu and Ronny Yong Ho Kim LG Electronics 15.2.4.4.2 Control Plane Signaling Protection Accepted as is. C80216m-09_1559r1Gene Beck Hahn, Ki Seon Ryu and Ronny Yong Ho Kim LG Electronics 15.2.4.4.1 AMS PrivacyAccepted as modified (R2) C80216m-09_1262r1Chengyan Feng ZTE 15.2.4.4.1 AMS PrivacySuperseded by 1559r1 Note that specific key derivation method also need to be provided. C80216m-09_1355Shraga Avishay Xiangying Yang Intel Corporation 15.2.4.2.1 Key management 15.2.4.4 MS privacy Accepted as modified (r1) C80216m-09_1602r2Gene Beck Hahn, Ki Seon Ryu and Ronny Yong Ho Kim LG Electronics 15.2.4.2.1 Key Management Superseded by 1335 r1 C80216m-09_1234Security DGRevised and accepted as r1)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.