IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-07-0446-00-0000 Title: Security SG Report Date Submitted: November 20, 2007 Authors or Source(s): Yoshihiro Ohba Abstract: Report of Security SG.

Download Report

Transcript IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-07-0446-00-0000 Title: Security SG Report Date Submitted: November 20, 2007 Authors or Source(s): Yoshihiro Ohba Abstract: Report of Security SG.

IEEE 802.21 MEDIA INDEPENDENT HANDOVER
DCN: 21-07-0446-00-0000
Title: Security SG Report
Date Submitted: November 20, 2007
Authors or Source(s):
Yoshihiro Ohba
Abstract: Report of Security SG meeting at IEEE 802.21 session
23 in Atlanta
21-07-0446-00-0000
1
IEEE 802.21 presentation release statements
This document has been prepared to assist the IEEE 802.21 Working Group. It is
offered as a basis for discussion and is not binding on the contributing
individual(s) or organization(s). The material in this document is subject to
change in form and content after further study. The contributor(s) reserve(s)
the right to add, amend or withdraw material contained herein.
The contributor grants a free, irrevocable license to the IEEE to incorporate
material contained in this contribution, and any modifications thereof, in the
creation of an IEEE Standards publication; to copyright in the IEEE’s name
any IEEE Standards publication even though it may include portions of this
contribution; and at the IEEE’s sole discretion to permit others to reproduce in
whole or in part the resulting IEEE Standards publication. The contributor also
acknowledges and accepts that this contribution may be made public by IEEE
802.21.
The contributor is familiar with IEEE patent policy, as stated
outlined
in in
Section
Section
6 of
6.3the
of
the IEEE-SA
IEEE-SA
Standards
Standards
Board
Board
bylaws
Operations Manual
<http://standards.ieee.org/guides/opman/sect6.html#6.3> and
<http://standards.ieee.org/guides/bylaws/sect6-7.html#6>
and in
in
Understanding Patent Issues During IEEE Standards Development
http://standards.ieee.org/board/pat/guide.html>
http://standards.ieee.org/board/pat/faq.pdf>
21-07-0446-00-0000
2
Outline
• Two meeting slots: Nov. 17 (Mon) AM2, Nov. 15 (Thu) PM2
• 4 TR (Technical Report) contributions
• All contributions address Security Signaling Optimization
during Handover (SSOH)
• One contribution also addresses MIH-level Security
Mechanism (MIHS)
• One contribution for performance evaluation on SSOH
• One contribution for combining security signaling and QoS
resource reservation
• Discussed PAR and 5C issues
• There will be 2nd call for TR contributions before January 2007
meeting
21-07-0446-00-0000
3
TR contribution on re-authentication
• TR contribution: http://www.ieee802.org/21/doctree/Security_SG/21-070402-02-0000-MIH_Key_Hierarchy.doc
• Presented slides: http://www.ieee802.org/21/doctree/Security_SG/21-070402-03-0000-MIH%20key-hierarchy%20approaches.ppt
• The contribution addresses inter-technology handover between EAP-based
technologies using HOKEY re-authentication
• Re-authentication may be performed proactively via the serving network, or
reactively via the target network
• Proactive re-authentication may require a new work in 802.21
• In reactive re-authentication, native EAP transport defined in each link-layer
such as 802.1X may be used with or without modification
• Need for a new work in 802.21 is smaller than proactive reauthentication
• In both proactive and reactive re-authentication, candidate authenticator
discovery mechanism is needed
21-07-0446-00-0000
4
TR contribution on
inter-domain handover w/ pre-authentication
• TR contribution:
http://www.ieee802.org/21/doctree/Security_SG/21-07-038700-0000-%20security_signaling_inter-domain.doc
• Presented slides:
http://www.ieee802.org/21/doctree/Security_SG/21-07-038701-0000-%20security_signaling_inter-domain.ppt
• The contribution addresses inter-domain handover where a
direct or indirect trust relationship exists between the serving
and target network
• Pre-authentication is identified as the potential approach
• In the case of indirect trust relationship, pre-authentication
signaling needs be performed along the chain of trust
• “Proxy authenticator” is introduced to support preauthentication across domains with indirect trust relationship
21-07-0446-00-0000
5
TR contribution on
inter-technology handover w/ preauthentication (1/2)
• TR contribution:
http://www.ieee802.org/21/doctree/Security_SG/21-07-040300-0000-Security%20SG%20Use%20Case.doc
• Presented slides:
http://www.ieee802.org/21/doctree/Security_SG/21-07-040301-0000%20-Use%20Case.ppt
• The contribution addresses inter-technology handover between
specific technologies: 802.111 and 802.16
• Pre-authentication is identified as the potential approach
• The same approach is generally applicable to other technologies
as long as the target network supports EAP
21-07-0446-00-0000
6
TR contribution on
inter-technology handover w/ preauthentication (2/2)
• TR contribution:
http://www.ieee802.org/21/doctree/Security_SG/21-07-0390-000000-MIH_Security_TR_Use_Case_Scenarios.doc
• Presented slides:
http://www.ieee802.org/21/doctree/Security_SG/21-07-0391-000000-Use_Case_Scenario.ppt
• The contribution addresses inter-technology handover to a
specific set of technologies that support EAP
•Inter-domain handover is also supported
•Handover to Non-EAP technologies are not supported
21-07-0446-00-0000
7
Performance evaluation on SSOH
• http://www.ieee802.org/21/doctree/Security_SG/21-07-040101-0000Authentication%20Signaling%20Performance%20in%20MIH.p
pt
• NS-2 simulation results are shown on security signaling
performance for full authentication, re-authentication and preauthentication for handover between 802.11 and 802.16
• Full authentication is based on EAP-TTLS w/MD5
• Re-authentication is based on HOKEY ERX
• Three performance metrics: EAP latency, post-handover
security signaling latency and transmission latency
• Some issues with simulation conditions
• AAA latency is underestimated
• Simulation runs unnecessarily EAP during 802.11r FT
• Additional evaluation is encouraged
21-07-0446-00-0000
8
Combining security signaling and QoS
resource reservation
• http://www.ieee802.org/21/doctree/Security_SG/21-07-043500-0000-secure_Handover_with_QoS.ppt
• The purpose is to provide seamless mobility with QoS
• Proactive QoS signaling for resource reservations at IP layer
using QoS NSLP where anticipation of movement is feasible
• The proposed approach is to combine network access
authentication and QoS signaling
• Even the two types of signaling are combined, network access
authentication needs to complete before QoS reservation
21-07-0446-00-0000
9
Discussion on PAR and 5C
• PAR-related material:
http://www.ieee802.org/21/doctree/Security_SG/21-07-039400-0000-SSG_Scope_Issues.ppt
• 5C-related material: Annex A of 21-07-0402-02
• Support for Non-EAP authentication was discussed heavily
• Straw poll was taken
• Support for handover with EAP: Yes(20)/No(0)
• Support for handover with Non-EAP: Yes(10)/ No(7)
• Support for inter-technology handover: Yes(21)/No(0)
• Open issues
• Definition of “administrative domain” needs to be revised to
cover a scenario where multiple ESS’es are served by a
single AAA server
• Clarification on relationship with 802.1 Linksec is needed
21-07-0446-00-0000
10
Security SG Milestones
• November 2007
• All contributions intended to be included in the TR need
to be submitted before the meeting
• Detailed submission guidelines will be posted to the
reflector
• PAR/5C discussion
• January 2008
• All major studies are expected to be done
• PAR/5C discussion
• February 2008
• Submit PAR/5C to IEEE 802 EC to create a TG
• March 2008
• Completion of TR
• Discuss feedback on PAR/5C
• Joint Meeting with 802.1 Link Security Task Group
21-07-0446-00-0000
11
Next Steps
Submission
Deadline:
Jan. 7, 2008
Nov. 2007
Meeting
4 TR Contributions
1 TR Contribution
On SSOH
Jan. 2008
Meeting
Mar. 2008
Meeting
Baseline TR
TR Contributions
on MIHS, etc.
TR
Presentation of PAR to
general 802 membership
PAR/5C
Coordination w/ other WGs
Approval by WG
Approval by EC
PAR/5C Submission to EC
(by Feb 14, 2008)
PAR Submission to
IEEE-SA Standards Board
SSOH: Security Signaling Optimization during Handover
MIHS: MIH-level Security mechanism
21-07-0446-00-0000
12