IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-07-0344-00-0000 Title: Security SG Report Date Submitted: September 20, 2007 Presented at IEEE 802.21 session #22 in Hawaii Authors.

Download Report

Transcript IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-07-0344-00-0000 Title: Security SG Report Date Submitted: September 20, 2007 Presented at IEEE 802.21 session #22 in Hawaii Authors.

IEEE 802.21 MEDIA INDEPENDENT HANDOVER
DCN: 21-07-0344-00-0000
Title: Security SG Report
Date Submitted: September 20, 2007
Presented at IEEE 802.21 session #22 in Hawaii
Authors or Source(s):
Yoshihiro Ohba
Abstract: Security SG Report of Session #22
21-07-0344-00-0000
1
IEEE 802.21 presentation release statements
This document has been prepared to assist the IEEE 802.21 Working Group. It is
offered as a basis for discussion and is not binding on the contributing
individual(s) or organization(s). The material in this document is subject to
change in form and content after further study. The contributor(s) reserve(s)
the right to add, amend or withdraw material contained herein.
The contributor grants a free, irrevocable license to the IEEE to incorporate
material contained in this contribution, and any modifications thereof, in the
creation of an IEEE Standards publication; to copyright in the IEEE’s name
any IEEE Standards publication even though it may include portions of this
contribution; and at the IEEE’s sole discretion to permit others to reproduce in
whole or in part the resulting IEEE Standards publication. The contributor also
acknowledges and accepts that this contribution may be made public by IEEE
802.21.
The contributor is familiar with IEEE patent policy, as stated
outlined
in in
Section
Section
6 of
6.3the
of
the IEEE-SA
IEEE-SA
Standards
Standards
Board
Board
bylaws
Operations Manual
<http://standards.ieee.org/guides/opman/sect6.html#6.3> and
<http://standards.ieee.org/guides/bylaws/sect6-7.html#6>
and in
in
Understanding Patent Issues During IEEE Standards Development
http://standards.ieee.org/board/pat/guide.html>
http://standards.ieee.org/board/pat/faq.pdf>
21-07-0344-00-0000
2
Outlines
• Three meeting slots: Sep. 17 (Mon) PM2, Sep. 19 (Wed) PM1 and PM2
• Officers
• Chair Election: A SG Roll Call vote was taken
•
•
•
•
Voting result: Yoshihiro Ohba:36, Srinivas Sreemanthula:15, Clint Chaplin:6
The election result was affirmed by the WG unanimous
Editor: Marc Meylemans (appointed by Chair)
Looking for Secretary
• 7 technical contributions, all falling within the two problems:
• Problem 1: Security Signaling Optimization during Handover
• Problem 2: MIH-level Security Mechanism
• Agreement on Table of Contents of TR (Technical Report) document
• Agreement on Milestones
21-07-0344-00-0000
3
Problem 1: Security Signaling
Optimization during Handover
• The purpose is to minimize handover signaling latency
related to network access authentication and key
management
• Support for inter-technology handover and inter-domain
handover
• Three types of handovers in terms of security signaling:
• Authentication-based handovers
• Key Hierarchy based handovers
• Ticket-based handovers
• Clear work separation from IETF HOKEY WG is needed
21-07-0344-00-0000
4
Problem 2: MIH-Level Security
Mechanism
• The purpose is to define a mechanism to secure MIH
protocol signaling within MIH protocol in order to
eventually realize flexible access control for MIH services
in a secure manner
• One typical use case is to provide different pieces of
information on neighboring networks depending on the
subscription policies of the user
• All MIH Services (i.e., Event Service, Command Service
and Information Service) are part of the Problem
21-07-0344-00-0000
5
Summary on the Technical Contributions
•
http://www.ieee802.org/21/doctree/Security_SG/21-07-0297-02-0000-MIH%20security%20approaches.ppt
• Detailed explanation on the two Problems
•
http://www.ieee802.org/21/doctree/Security_SG/21-07-0291-00-0000-hokey-preauth-ps.ppt
• Explanation on IETF HOKEY EAP pre-authentication problem statement draft
•
http://www.ieee802.org/21/doctree/Security_SG/21-07-0301-00-0000-Security_Architecture.ppt
• Focused on authentication-based handovers for Problem 1
• Mapping to existing 802.21 communication model is described
• Needs study on technical feasibility study on non-EAP authentication
• Needs study on the potential impact on existing link-layer technologies
•
http://www.ieee802.org/21/doctree/Security_SG/21-07-0299-00-0000-Security-SG-Scenarios.ppt
• One Use Case for utilizing existing SA across multiple PoAs for Problem 1
• One Use Case relating to Multi-Radio Power Management work is identified for Problem 2
•
http://www.ieee802.org/21/doctree/Security_SG/21-07-0299-00-0000-Fast_re-Authentication_Protocol.ppt
• Proposal on ticket-based handovers for inter-domain handovers for Problem 1
•
http://www.ieee802.org/21/doctree/Security_SG/21-07-0310-00-0000-MIH-Security-Options.ppt
• Solid Use Cases on Problem 2
• Some Use Case requires server-only authentication while others do mutual authentication
• Some Use Case is tightly coupled with network access authentication while others are independent of
network access authentication
•
http://www.ieee802.org/21/doctree/Security_SG/21-07-0302-01-0000MIH_Security_Technical_Requirements_Skeleton.doc
• Agreement on Table of Contents of TR
• Agreement on the need for SG agreement on Use Cases for any contribution to get included in TR
21-07-0344-00-0000
6
Security SG Milestones
• November 2007
•
•
All contributions intended to be included in the TR need to be submitted before the
meeting
• Detailed submission guidelines will be posted to the reflector
PAR/5C discussion
• January 2008
•
•
All major studies are expected to be done
PAR/5C discussion
• February 2008
•
Submit PAR/5C to IEEE 802 EC to create a TG
• March 2008
•
•
Completion of TR
Discuss feedback on PAR/5C
21-07-0344-00-0000
7