SUPL 2.0 Overview Introducing new features with a special focus

Slides:



Advertisements
Similar presentations
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Lemonade and Mobile e- mail Stéphane H. Maes – Lemonade Intermediate meeting Vancouver, BC October 2004.
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Location Services Overview Larry A. Young Chairman, OMA Location Working Group SDO Emergency Services Coordination Workshop 5 th and 6 th October, 2006.
Page 1 Non-Trusted User Plane Roaming LBS Roaming Meeting, San Francisco November 28, 2006 Non-Trusted User Plane Roaming LBS Roaming Meeting, San Francisco.
Secure Socket Layer.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Page 1 IEEE Emergency Services Working Group DCN: SUPL-Tutorial.ppt Title: SUPL Tutorial Date Submitted: January 17, 2011 Presented.
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
5th Emergency Service Coordination Workshop 3GPP ETWS Update (Material primarily provided by Itsuma Tanaka of DoCoMo) Deb Barclay Alcatel-Lucent October.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
What we will cover… Home Networking: Network Address Translation (NAT) Mobile Routing.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Lectured By: Vivek Dimri Assistant Professor, CSE Dept. SET, Sharda University, Gr. Noida.
1 © NOKIA 1999 FILENAMs.PPT/ DATE / NN SIP Service Architecture Markus Isomäki Nokia Research Center.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
Lemonade Requirements for Server to Client Notifications
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Lemonade Requirements for Server to Client Notifications draft-ietf-lemonade-server-to-client-notifications-00.txt S. H. Maes C. Wilson Lemonade Intermediate.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
The University of Oklahoma Virtual Private Network How it works.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
© 2005 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
INTRODUCTION. 1.1 Why the Internet Protocol Multimedia Subsystem 1.2 Where did it come from?
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
“Secure” migration to host identity based networks Kristian Slavov, Patrik Salmela Ericsson Research, NomadicLab NordicHIP
3GPP2 Vision: System Release 6 & 7 Jane Brownley Chair, Vision Ad Hoc 1.
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Feature Interaction: An Industrial Perspective Greg Utas May
September 28, 2006 Page 1 3GPP2 MMD Status for IMS Workshop Jack Nasielski
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
1 3GPP2 GBA Overview Adrian Escott Chair, TSG-S WG4 24 May 2006.
3GPP GBA Overview Adrian Escott.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
KERBEROS SYSTEM Kumar Madugula.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Network security Presentation AFZAAL AHMAD ABDUL RAZAQ AHMAD SHAKIR MUHAMMD ADNAN WEB SECURITY, THREADS & SSL.
Radius, LDAP, Radius used in Authenticating Users
EMV® 3-D Secure - High Level Overview
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
* Essential Network Security Book Slides.
OMA – SUPL Security SUPL 1.0 has reliable security for H-SLP non-emergency location of a SET 3GPP solution 1: GBA (Generic Bootstrap Architecture) support.
Lemonade Requirements for Server to Client Notifications
Introduction to Network Security
Presentation transcript:

SUPL 2.0 Overview Introducing new features with a special focus on Emergency support SDO Emergency Services Workshop | 23 October 2008 Khiem Tran, LOC Working Group, Open Mobile Alliance SDO Emergency Services Workshop, Khiem Tran www.openmobilealliance.org SDO Emergency Services Workshop 23 October 2008

Agenda SUPL Introduction and SUPL 1.0 functionality SUPL2.0 New Feature Overview SUPL2.0 Features In Detail SUPL2.0 from an Emergency Services Perspective SDO Emergency Services Workshop 23 October 2008

Agenda SUPL Introduction and SUPL 1.0 functionality SUPL2.0 New Feature Overview SUPL2.0 Features In Detail SUPL2.0 from an Emergency Services Perspective SDO Emergency Services Workshop 23 October 2008

What is SUPL? A user plane location protocol Based around a trust relationship between a terminal (SET) and its “Home” location server (H-SLP) SDO Emergency Services Workshop 23 October 2008

Why SUPL? Overlay location architecture almost independent of access [1] Simpler model compared with control plane SDO Emergency Services Workshop 23 October 2008

SLP network relationship SET always talks only to H-SLP, regardless of access network H-SLP has responsibility for finding and enlisting other resources to locate SET SDO Emergency Services Workshop 23 October 2008

What SUPL covers Lup, the interface between the H-SLP and the SET ULP, the protocol used on the Lup interface The behaviour of the SET and H-SLP in their interactions between each other The interactions between the H-SLP and other SLPs involved in locating the SET Logical architecture of SLP, consisting of an SLC (SUPL Location Center) and an SPC (SUPL Positioning Center) SDO Emergency Services Workshop 23 October 2008

High level characteristics Utilises secure userplane pipe between SET and SLP Requires explicit support for each bearer network Trust relationship between SET and H-SLP Trusted zone extends to SET SDO Emergency Services Workshop 23 October 2008

ULP Transport Most ULP messages are transported via a secure TLS session SLP authentication SET only ever uses stored FQDN to address H-SLP Shared secrets utilising control plane mechanisms OR root certificate SET authentication Shared secrets utilising control plane mechanisms OR IP verification (requires control plane interaction) TLS session only ever initiated by SET For SUPL sessions initiated by H-SLP, we need… SDO Emergency Services Workshop 23 October 2008

SUPL INIT Support SUPL INIT messages can be sent via WAP or SMS After receiving message, SET opens secure session to H-SLP WAP and SMS delivery both insecure Mechanisms in ULP validate if SUPL INIT was authentic once secure session established SDO Emergency Services Workshop 23 October 2008

Proxy Mode vs Non-Proxy Mode Two modes of operation. In Proxy Mode, SET connects with H-SLP via SLC component. In Non-Proxy Mode, it connects to both SLC and SPC components. SDO Emergency Services Workshop 23 October 2008

What can SUPL1.0 do? Immediate Location Requests SET can ask for its own location - “SET Initiated” H-SLP can initiate a location request on behalf of a SUPL Agent - “Network Initiated” SET can send measurements to SLP ULP can transport positioning protocols such as RRLP, RRC and IS-801 Location Technologies Primarily A-GPS and Cell ID, but support for other SET based measurements such as EOTD Call flows built around a low accuracy method requiring one set of measurements (Cell ID) and a high accuracy method requiring an exchange of messages using an encapsulated control plane positioning protocol (A-GPS) Different mechanisms for Roaming H-SLP can ask visited SLP to help with positioning H-SLP can ask visited SLP to translate a coarse position H-SLP can do everything itself SDO Emergency Services Workshop 23 October 2008

SUPL 1.0 Scope SDO Emergency Services Workshop 23 October 2008

Agenda SUPL Introduction and SUPL 1.0 functionality SUPL2.0 New Feature Overview SUPL2.0 Features In Detail SUPL2.0 from an Emergency Services Perspective SDO Emergency Services Workshop 23 October 2008

SUPL2.0 Additional Features Triggered Positioning and Delayed Reporting Other GNSSs besides GPS New positioning procedures Notification and Verification based on current location Version negotiation between SUPL versions Enhanced ULP messaging Size of SUPL2.0 vs SUPL1.0 (in pages) SDO Emergency Services Workshop 23 October 2008

SUPL 2.0 Five new bearer networks Two new mechanisms for SUPL INIT delivery Concept of Emergency SLP (E-SLP) SDO Emergency Services Workshop 23 October 2008

Agenda SUPL Introduction and SUPL 1.0 functionality SUPL2.0 New Feature Overview SUPL2.0 Features In Detail SUPL2.0 from an Emergency Services Perspective SDO Emergency Services Workshop 23 October 2008

SUPL INIT Delivery Mechanisms SIP Push Utilizes existing secure connection to SET UDP/IP Push UDP datagram to IP address of SET Requires IP address to be known Neither mandatory for any bearer SDO Emergency Services Workshop 23 October 2008

New Bearer Networks New bearers supported: LTE HRPD UMB I-WLAN WiMAX I-WiMAX New security mechanism (SEK) defined for WiMAX Requires interaction with WiMAX AAA server ACA method not supported for WiMAX, but new subset of ACA called “E-SLC only” supported for emergency calls SEK= SUPL Encryption Key GBA = Generic Bootstrap Algorithm ACA = Alternate Client Authentication SDO Emergency Services Workshop 23 October 2008

A-GNSS Support SUPL2.0 supports: Galileo Modernized GPS QZSS GLONASS SBAS SET can indicate support for multiple GNSSs SLP can allow SET to use multiple GNSSs for A-GNSS or Autonomous GNSS Note: “GNSS” refers to all Global Navigation Satellite Systems, “GANSS” refers to all GNSSs including Modernized GPS, but not the original GPS SDO Emergency Services Workshop 23 October 2008

Triggered Positioning and Delayed Reporting SUPL2.0 introduces triggered positioning Includes Area Event triggering and Periodic triggering Both Network Initiated and SET initiated Controlling logic for triggering is all on the SET SUPL2.0 also introduces Reporting Mode For batch mode, SET can store periodic reports (positions or measurements) and deliver them to the SLP as a batch For quasi-realtime mode, SET can store periodic reports if it wasn’t able to send them at the intended time (i.e. if there was no coverage) SLP can allow “intermediate” reports if SET runs out of memory SLP can instruct SET to discard oldest or newest data first if intermediate reports not allowed/supported. SDO Emergency Services Workshop 23 October 2008

Triggered Positioning – Area Event Triggering Area event triggering can be based on geographic target areas, serving areas of a combination of both When combined, serving areas can be used to tell the SET when it doesn’t need to do any positioning (i.e. to save battery life) Apart from this, it is up to the SET how often to check its position against the geographic target area In the illustrations, opposite, the dotted box is a geographic target area, the hexagons are serving areas SDO Emergency Services Workshop 23 October 2008

Triggered Positioning – Area Event Triggering II Four trigger types supported Entering Within Leaving Outside Distinction between Entering and Within, Leaving and Outside, happens when combined with repeated reporting Leaving trigger with Repeated Reporting Report each time SET leaves the area Outside trigger with Repeated Reporting Report periodically WHILE SET is outside the area Likewise for Entering/Inside SDO Emergency Services Workshop 23 October 2008

Triggered Positioning – Periodic Triggering For Periodic Triggering, SET initiates position attempts on a periodic basis SUPL Session can remain open, or can be restarted as needed It is up to the SET to keep track of when the next position is due Can be combined with batch reporting Can be initiated by the SET or the SLP Saves messaging, especially when combined with batch reporting SLP can provide the same functionality for SUPL1.0 SETs by taking on responsibility of polling SETs at proper interval SDO Emergency Services Workshop 23 October 2008

New Positioning Procedures Delivery of location to third party Allows SET to specify a third party to deliver location to for SI queries Delivery mechanism outside of scope of SUPL SET initiated location retrieval of another SET Allows SET to request the location of another SET via the SLP Positioning procedure undefined Retrieval of historical positions Allows SLP to request SET to send it stored historical positions No mechanism to tell the SET when to store positions in the first place (could interwork with batch reporting) SDO Emergency Services Workshop 23 October 2008

Llp Interface Standardized interface between SLC and SPC Uses ILP (Internal Location Protocol) SDO Emergency Services Workshop 23 October 2008

Notification and Verification based on current location SUPL1.0 allows SLP to instruct SET to “notify” user of the location request “verify” that the location is permitted (ie. by asking for a user response) neither notify or verify leave no trace at all (i.e. for lawful intercept, still requires SET cooperation) In SUPL2.0, notification and verification request can be sent to SET based on current location If user is inside/outside a certain zone, send/don’t send a notification Requires slightly different callflow Requires H-SLP to maintain privacy profiles for SET Defining and managing zones is out of scope for SUPL2.0. Out of scope – how user updates privacy profiles Similar functionality could also be achieved on SET itself without this feature SDO Emergency Services Workshop 23 October 2008

Agenda SUPL Introduction and SUPL 1.0 functionality SUPL2.0 New Feature Overview SUPL2.0 Features In Detail SUPL2.0 from an Emergency Services Perspective SDO Emergency Services Workshop 23 October 2008

Emergency Services Network Initiated Only Intended for NI Immediate only too SET must now respond to E-SLPs as well as its H-SLP Priority given to Emergency requests During an Emergency Call, SET SHALL terminate non-emergency SUPL sessions and ignore non-emergency SUPL INITs Note that this means SUPL 1.0 SUPL INITs will be ignored OUT OF SCOPE: conditions on when SET will accept Emergency SUPL INITs (may be determined by local regulatory requirements) Note that this may include a period of time after an Emergency call. SDO Emergency Services Workshop 23 October 2008

Emergency Services Emergency requests are NI-LR Not covered: The E-SLP initiates the emergency location procedure Not covered: How the query gets to the E-SLP in the first place How the device is identified as a SET How the E-SLP determines which SUPL INIT delivery mechanism to use SDO Emergency Services Workshop 23 October 2008

Emergency Services Basic call flow (Proxy mode) SDO Emergency Services Workshop 23 October 2008

Emergency Services Basic call flow (Non-proxy mode) SDO Emergency Services Workshop 23 October 2008

Emergency Services E-SLP enlisting V-SLP to help locate SET (V-SPC Positioning) SDO Emergency Services Workshop 23 October 2008

Emergency Services Compatible with 3GPP TS 23.167 (IMS Emergency Sessions) UE-initiated with SUPL must use H-SLP SDO Emergency Services Workshop 23 October 2008

Emergency Services SET must accept Emergency SUPL INITs from any E-SLP SET must have root certificate or shared secret for E-SLP Whitelist to prioritize known E-SLPs over unknown ones No explicit way to know for sure that E-SLP is in serving network SUPL INITs via secure channels (ie. SIP Push) get processed immediately, ignoring whitelist

Emergency Services Reduced security requirements for Emergency requests No SET-based integrity verification and message origin authentication of SUPL INIT messages No end-to-end protection of SUPL INIT messages Mutual authentication MAY be supported between SLP and SET For emergency calls initiated in circuit mode, SET IP address may not be known to E-SLP, hence IP address may not be verified If alteration of SUPL INIT is detected, SUPL INIT is resent (instead of terminating the session) Emergency Queries given priority SET must ignore non-emergency SUPL INITs when in emergency mode SET must devote all resources to emergency session Note that this has implications for attempts to use SUPL1.0 for emergency requests SDO Emergency Services Workshop 23 October 2008

Emergency Services Unregistered SETs Trust Model Unregistered SETs may respond to SUPL INITs from E-SLP without any authentication of SET Support for SIMless emergency requests Trust Model SET is implicitly trusted as part of positioning process Visited SLPs also implicitly trusted

SIP Push and Emergency IMS Core SIP Push for SUPL INIT delivery supported via Emergency IMS Core Takes advantage of secure session already open between SET and IMS Core More likely to get through to SET in Emergency mode More likely to get past firewalls for cross-network delivery Requires collaborative coupling between E-SLP and SIP server Note: The E-SLP receives the emergency location request from the Emergency IMS Core over 3GPP Ml interface or from the PSAP over the Le interface. The emergency location request contains the SIP URI or TEL URI of the SET initiated the IMS emergency call. The Emergency IMS Core uses the Request URI to correlate the SIP MESSAGE with the IMS emergency call and routes the SIP MESSAGE to the SET via the signaling path of the IMS emergency call. The specifics of 3GPP Ml interface and Le interface are considered outside scope of SUPL. SDO Emergency Services Workshop 23 October 2008

SIP Push and Emergency IMS Core SDO Emergency Services Workshop 23 October 2008