draft-ietf-dmm-4283mnids Charlie Perkins

Slides:



Advertisements
Similar presentations
IEEE OmniRAN for Heterogeneous Networks 24 July 2012 Roger Marks Juan Carlos Zuniga Charlie Perkins 1.
Advertisements

Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
Networks Evolving? Justin Champion C208 Ext:3723
Networking Hardware and Components By: Sean Bell.
INTERNET OF THINGS SUBBAIYA VASU UDAYARAJAN UOTTAWA CSI 5169 WIRELESS NETWORKS AND MOBILE COMPUTING SUBMITTED TO: PROFESSOR STOJMENOVIC.
1 The Internet of Things. 2 Agenda IntroductionWhat is the Internet of Things?What are these “things”?What is.
Presenter - Bob Kinicki Internet of Things Fall 2015
Concerns about designating the MAG as a Default Router James Kempf NETLMM Interim Sept. 27, 2006.
GroupWise 6.5 Junk Mail Handling July 28, Configuring Junk Mail Handling Junk Mail Handling enables you to have actions taken automatically on any.
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Multiple Interfaces (MIF) WG IETF 79, Beijing, China Margaret Wasserman Hui Deng
Some use cases and requirements for handover Information Services Greg Daley MIPSHOP Session IETF 64.
6lowpan ND Optimization draft Update Samita Chakrabarti Erik Nordmark IETF 69, 2007 draft-chakrabarti-6lowpan-ipv6-nd-03.txt.
Draft-ietf-fecframe-config-signaling-02 1 FEC framework Configuration Signaling draft-ietf-fecframe-config-signaling-02.txt IETF 76 Rajiv Asati.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Doc.: IEEE /0093r0 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
GEONET Brainstorming Document. Content Purpose of the document Brainstorming process / plan Proposed charter Assumptions Use cases Problem description.
1 3gpp_trans/ / IPv6 Transition Solutions for 3GPP Networks draft-wiljakka-3gpp-ipv6-transition-00.txt Juha Wiljakka,
Virtualized Network Function (VNF) Pool BoF IETF 90 th, Toronto, Canada. BoF Chairs: Ning Zong Melinda Shore
August 2, 2005 IETF 63 – Paris, France Media Independent Handover Services and Interoperability Ajay Rajkumar Chair, IEEE WG.
Doc.: IEEE /0010r1 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
IP Address Location Privacy and Mobile IPv6: Problem Statement draft-irtf-mobopts-location-privacy-PS-00.txt Rajeev Koodli.
1 Wireless Networks Lecture 17 GPRS: General Packet Radio Service (Part I) Dr. Ghalib A. Shah.
Virtual Local Area Networks In Security By Mark Reed.
Relationship between peer link and physical link
Mobile IP Lecture 5.
CLUE WG Interim Meeting San Jose, CA Sept , 2012
Transmission of IP Packets over IEEE 802
ID Tracker States: An Internet Draft’s Path Through the IESG
A brief introduction to IoT gateway
Introduction Wireless devices offering IP connectivity
Booting up on the Home Link
Open issues with PANA Protocol
CSE Retargeting to AE, IPE, and NoDN Hosted Resources
IPv6 for the Network Edge
Mobile IP.
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
Encryption and Network Security
IP-NNI Joint Task Force Status Update
CLUE WG Interim Meeting San Jose, CA Sept , 2012
draft-ietf-l3sm-l3vpn-service-model IETF 94 - Yokohama
THE NEED FOR ADDRESSING
CLUE WG Interim Meeting San Jose, CA Sept , 2012
Part I. Overview of Data Communications and Networking
draft-ietf-simple-message-sessions-00 Ben Campbell
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
Discussions on Heterogeneous Identification Service
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [On IETF LPWAN] Date Submitted: [10 July.
Layered Architectures
with distributed anchor routers
draft-jeyatharan-netext-pmip-partial-handoff-02
The need for better security considerations guidance
Chapter 24: Internet of Things (IoT): Growth, Challenges and Security
NETLMM Applicability Draft (Summary)
IP-NNI Joint Task Force Status Update
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [On IETF LPWAN] Date Submitted: [10 July.
Internet Protocol INTERNET PROTOCOL.
Computer communications
David Noveck IETF99 at Prague July 20, 2017
The OSI 7 Layer Model Ben, Stuart, Charles.
Distributed Mobility Management Working Group
IETF-100, MPTCP WG, November 2017
doc.: IEEE /454r0 Bob Beach Symbol Technologies
Protocol Application TCP/IP Layer Model
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Internet of Things (IoT)
Georgios Karagiannis, Tom Taylor, Kwok Chan, Michael Menth
M. Boucadair, J. Touch, P. Levis and R. Penno
Presentation transcript:

draft-ietf-dmm-4283mnids Charlie Perkins IETF99 Prague 17th July 2017

Issues raised Unclear from draft which MNID types need to be secured (e.g., for privacy) Unclear if all MNID types that are included are really needed Low volume of discussion in the working group is interpreted as a lack of support.

MNID types in the draft IPv6 Address (included for completeness) IMSI, P-TMSI, GUTI (for 3GPP adjunct uses) EUI-48, EUI-64 address (IEEE types) Would be useful for multi-interface IP addresses DUID types RFID types Would be useful For Mobile items tracking Would be useful For Mobile banking payment (Wireless NFC Bank cards) Would be useful For new innovative mobile cloud gaming over unique identification of new gaming elements (e. VR, AR, …etc) Consider adding new other id types in IoT such as proprietary Sig fox ids, or standard LORA ids, …others

Commentary from mailing list (1) Vijay: Ben Campbell wanted us to explicitly identify which of the IDs have to be encrypted, and not just say that some of them may need to encrypted. … Perhaps we could say it depends on the context? Another option is to say message exchanges that carry a MNID, may need to be encrypted over the air interface, for all MNIDs. That might be the safest. Charlie: I am O.K. with MUST be encrypted.

Commentary from mailing list (2) Vijay: I read Stephen Farrell's DISCUSS a number of times. He seems to be saying any ID that privacy concerns needs to be explicitly justified. I can argue that there are privacy concerns with every single MNID. The user can be tracked using the MNID, irrespective of whether it is an IMSI, or DUID or RFID-GID-96. Charlie: This provides additional justification for MUST encrypt, since we are operating at the network layer and cannot know if the applications need privacy. Hakima: … in the case of RFID I believe, related to privacy, in fact if a device with an RFID tag for instance a bank card has to send in clear its numbers as a MNID in a packet then of course there is an issue, but I believe that matching the MNID with the IP address will be also secured inside the packet is it correct?

Commentary from mailing list (3) Charlie: The downside of including them <i.e., more MNIDs> (assuming proper security measures are taken) is so small. Suresh: This is exactly the crux of the problem (what you have in parentheses). By including the types *this document* is expected to include the proper security measures. Charlie: I am O.K. with MUST be encrypted. I believe this to be a proper measure for each type.

Commentary from mailing list (4) Charlie: In fact, uses of such identifiers have been proposed in the past but inhibited by unavailability of the most straightforward identifier formulation. To put an identifier in later is certainly possible, but represents a lot more work in the future -- another multi-month (or year!) review cycle, another learning process to repeat the learning process we have already gone through, and so on. Suresh: The issue is that nobody else is coming forward to say they need most of these types. The lack of enthusiasm in the WG has not reflected well on this draft among the IESG members. Hakima: … remind that Internet to be part of the game of Internet of Things traffic exchange then it has to consider all types of communicating devices, knowing that we are talking in the near future of billions of sensors, actuators, RFID tags talking, then Internet protocols will take care of that and having IDs corresponding to all these types is the way to go to better manage for instance the mobility of those devices as using the device ID as a non changing reference information, and changing the addresses while on move. Other protocols might benefit from this ID information such as service discovery or end to end signaling. I believe the IETF worked years ago on separating the identifier (locator) and the address, this was meant to help mobility management but also securing the sender and receiver mutual authentication with trusted identifiers. Maybe we should think about how to build a secure identifier of each node which will be built upon the original identifier (eg IMSI, RFID, ...etc) and another type of secure information. In that case privacy will be saved as the original identifier is not sent in clear? what do you think?

Commentary from mailing list (5) Hakima, paraphrasing: RFIDs are likely to be an important wireless interface technology choice for IoT. More specifically unique hardware identification for item tracking New applications to be considered with new automatic RFID identification ( Mobile banking, mobile gaming with AR, …etc) Charlie: I agree with this.

Some example work in progress Mobile RFID tagged items using Mobile IPv6 http://www-public.tem-tsp.eu/~chaouchi/TRACKIOTMIP6.pdf Heterogeneous IoT Network: TRACK-IoT Platform http://www-public.tem-tsp.eu/~chaouchi/TrackIoT.pdf

Next Steps Make sure issue resolutions are satisfactory. Straw proposal: make encryption mandatory Under this circumstance, should be O.K. to keep most existing MNID types. Make revisions to draft as determined Finish Last Call