Doc.: IEEE 802.11-09/0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 1 A vendor specific plan for centralized security Date: 2009-01-19 Authors:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE /1326r1 Submission November 2008 Donald Eastlake 3rd, MotorolaSlide 1 TGs Process, November Date: Author:
Doc.: IEEE /1259r0 Submission Nov 2009 Michael Bahr, Siemens AGSlide 1 RFI Tüddelkram Date: Authors:
Doc.: IEEE /0623r1 Submission May 2009 Jon Rosdahl, CSRSlide 1 Proposal for P&P Change - # Date: Authors:
Doc.: IEEE /0413r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 A Study Group for Enhanced Security Date: Authors:
Doc.: IEEE /1392r0 Submission November 12, 2008 De Vegt (Qualcomm)Slide 1 Inputs for a VHT Selection Procedure Date: Authors:
Doc.: IEEE /1263r0 Submission November 2008 Dan Harkins, Aruba NetworksSlide 1 A Modest Proposal…. Date: Authors:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec Title: IEEE r Fast BSS Transition – A Study Date Submitted: September 21, 2009 Present.
Doc.: IEEE /1120r2 Submission September 2008 Guido R. Hiertz et al., PhilipsSlide 1 Terminology changes in a nutshell … Date: Authors:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec Title: Initiate An Exercise for Generating a 21a Document Date Submitted: September 21, 2009.
Doc.: IEEE /0237r0 Submission February 12, 2009 Rolf de Vegt (Qualcomm)Slide 1 Inputs for a ac Spec Framework Methodology Date:
Doc.: IEEE /147March 2000 TGe SecuritySlide 1 The Status of TGe S Draft Text Jesse Walker Intel Corporation (503)
Doc.: IEEE /2079r0 Submission July 2007 Terry Cole, AMDSlide 1 WG Technical Editors Opening Report (July) Date: Authors:
Doc.: IEEE /0559r0 Submission May 2008 Terry L Cole, AMDSlide 1 WG Technical Editors Opening Report (May) Date: Authors:
Doc.: IEEE /2389r0 Submission Sept 2007 Terry Cole, AMDSlide 1 WG Technical Editors Opening Report (September) Date: Authors:
Doc.: IEEE /0445r0 Submission May 2009 Adrian Stephens, Intel CorporationSlide TGn Editor Report May 2009 Date: Authors:
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Doc.: VC1_ _EC_P&P_Update-opening_r0.ppt Submission EC Update on LMSC Governance Date: November 16 th, 2009 Author: Matthew Sherman 1 st Vice Chair,
Doc.: IEEE /1226r0 Submission September 2013 Osama Aboul-Magd (Huawei Technologies)Slide 1 TGac September 2013 Closing Report Date:
Doc.: IEEE g TG4g - SUN November 2009 Phil Beecher, Beecher Communications Consultants Ltd Slide 1 Project: IEEE P Working Group.
Doc.: IEEE /1177 Submission September 2013 Giwon Park, LG ElectronicsSlide 1 Clarification of the Link Setup Bursty parameter (CID 2547, 3214)
Doc.: IEEE /141r0 Submission July 2012 Tuncer Baykas, NICTSlide TG 1 July Session Closing Report Notice: This document has been prepared.
Doc.: IEEE /0032r0 Submission March 2011 Gabor Bajko, NokiaSlide 1 Protocol to access WS database Authors:
Doc.: IEEE /0115r0 Submissions January 2008 Gabor Bajko, NokiaSlide 1 Support for un-authenticated Emergency Services Date: Authors:
Doc.: IEEE /1160 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA
Doc.: IEEE /1465r0 Submission September 2006 K. Kim et al.Slide 1 RA-OLSR Text Updates Notice: This document has been prepared to assist IEEE.
Doc.: IEEE /2547r2 Submission September 2007 Slide 1 Reconsidering RA-OLSR Date: Authors: J. Jetcheva, Firetide, et al.
Doc.: IEEE /1125r0 Submission September 2010 Marc Emmelmann, Fraunhofer FOKUSSlide 1 How does the (new) Fast Initial Link Set- Up PAR address.
Doc.: IEEE /0117r0 Submission January 2010 Michael Bahr, Siemens AGSlide 1 TBTT Announce in DTIM Beacons Date: Authors:
Doc.: IEEE /0578r0 Submission 2008 May Jarkko Kneckt, NokiaSlide 1 Forwarding in mesh containing MPs in power save Date: Authors:
Doc.: IEEE /0674r0 Submission June 2009 Bruce Kraemer, Marvell; Adrian Stephens, Intel Corporation Slide 1 P802.11n report to EC on request for.
Doc.: IEEE /0877r0 Submission June WG Slide 1 TGs response to CN NB comments Date: Authors:
Doc.: IEEE r6 Submission July 2008 Charles Fan,Amy Zhang, HuaweiSlide 1 Authentication and Key Management of MP with multiple radios Date:
Doc.: IEEE /1167r0 Submission November 2009 Osama Aboul-Magd (Samsung)Slide 1 TGac Ad Hoc Group Operation and Chair Selection Procedure Date:
Doc.: IEEE /0283r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 Suggested Changes to the Abbreviated Handshake Date: Authors:
Doc.: IEEE /108r0 Submission January 2003 Adrian Stephens, IntelSlide 1 Some proposed motions for HT SG Adrian P Stephens
1 IEEE m-09/ Work Plan for IEEE m Standard & IMT-Advanced Submission.
Doc.: IEEE /0300r1 Submission May 2007 Guenael Strutt, MotorolaSlide 1 LB93 Unresolved RFI Comments Notice: This document has been prepared to.
Doc.: IEEE /130r0 Submission January 2006 Donald Eastlake 3rd, MotorolaSlide 1 TGs Process Notice: This document has been prepared to assist IEEE.
Doc.: IEEE /0024r0 Submission February 2010 Päivi Ruuska, NokiaSlide 1 Process Considerations Notice: This document has been prepared to assist.
Doc.: IEEE P /187r1 Submission January 2009 Donald Eastlake 3rd, MotorolaSlide 1 TGs Los Angeles Closing Report Date: Authors:
Doc.: IEEE /0358r0 Submission March 2007 Zhao and Walker, Intel CorpSlide 1 Thoughts on Peer Capacity Date: Authors: Notice: This document.
Doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 1 Refining the Security Architecture Date: Authors:
Doc.: IEEE /840r2 Submission June 2006 Donald Eastlake 3rd, MotorolaSlide 1 TGs Process, June Notice: This document has been prepared to assist.
Doc.: IEEE /1445r1 Submission TGad November 2011 Closing Report November 2011 Eldad Perahia, Intel CorporationSlide 1 Date: Authors:
Doc.: IEEE /1386r0 Submission September 2006 Donald Eastlake 3rd, MotorolaSlide 1 TGs Process, September Notice: This document has been prepared.
Doc.: IEEE /0147r0 Submission January 2012 Rolf de Vegt (Qualcomm)) Slide ai Spec Development Process Update Proposal Date:
Doc.: IEEE /054r0 Submission January 2003 Dr. John R. Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: IEEE /0247r1 Submission March 2010 Sudheer Grandhi, InterDigital Communications, LLCSlide 1 AP Connection Period in TDLS Date:
Protocol Coexistence Issue in MSA Subsequent Authentication
Doc.: IEEE /1583r1 Submission November 2011 Osama Aboul-Magd (Huawei Technologies)Slide 1 TGac November 2011 Closing Report Date: Authors:
Doc.: IEEE /2539r0 Submission September 2007 Tony Braskich, MotorolaSlide 1 Overview of an abbreviated handshake with sequential and simultaneous.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
Comment Resolution Plan
Overview of Key Holder Security Association Teardown Mechanism
Reconsidering RA-OLSR
Comment Resolution Plan
Comment Resolution Plan
Summary of Updates to Abbreviated Handshake
Overview of Changes to Key Holder Frame Formats
RA-OLSR Comment Resolution
RA-OLSR Comment Resolution
Overview of Improvements to Key Holder Protocols
TGs Process, March Date: Author: March 2009 March 2009
doc.: IEEE <doc#>
Overview of Improvements to Key Holder Protocols
RA-OLSR Comment Resolution
TGs Taipei Closing Report
General discovery comment resolution overview
TGax November 2017 Closing Report
Presentation transcript:

doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 1 A vendor specific plan for centralized security Date: Authors:

doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 2 Abstract The complexity of the centralized security architecture defined in s is considered in the context of the pace of the task group. A proposal is introduced that could greatly simplify the s draft, permitting rapid progress toward sponsor ballot and task group completion. The proposal provides a framework for vendor-specific centralized security architectures in place of a standards-specified architecture (MSA).

doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 3 Security and the Pace of TGs Progress The lack of progress in TGs is drawing attention The most contentious element within s today is centralized security Attempts to manage complexity in the security architecture have not achieved technical consensus. TotalOpenClosedPercent Closed General % MAC % Security % RFI %

doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 4 Security Complexity Centralized security adds complexity regardless of the architecture chosen –MSA introduces new components to , namely a mesh key distributor (MKD) that creates keys for nodes in the mesh. –Mesh STAs must maintain a path to the MKD –New protocols are needed for transporting the keys between the MKD and mesh STAs. –Additional complexity is introduced due to: The interaction of link security with these key transport protocols The use of 802.1X (client-server) authentication with peer-to-peer link security The security architecture is also topology-dependent, which is a challenge for standardization –There were several comments on multiple MKDs during the previous LB, perhaps due to conflicting requirements –Questions about deploying MKDs may remain after MSA is upgraded Consensus resolution of issues will cause s to miss market window

doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 5 Overview of Proposal A proposal modifying the TGs draft is available in 11-09/0112r /0112r0 It makes centralized security a vendor-specific option. An identifier of the authentication protocol is defined as part of the mesh profile. –It allows SAE or a vendor-specific protocol to be chosen. –Carried within the mesh configuration element The mesh key hierarchy is removed (§8). –Security association definitions are updated to reflect the keys that are created via the selected authentication protocol & via Abbreviated HS MSA establishment procedure & MSA key holder communication protocols are removed (§11B.5) –New overview section is provided (§11B.5.1) –Abbreviated HS & Mesh Group Key HS sections remain

doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 6 Decision Procedure for Link Setup Abbrev HS Succeeds? Session Do I share PMK with Peer? Did SAE succeed? Yes Peer Discovery Yes Null No SAE No Active Authentication Protocol PLM succeeds? No Yes A vendor-specific authentication protocol may also be selected.

doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 7 Comments resolved & Draft complexity The proposal, if adopted, would resolve at least 75 comments (63% of open security comments). –Security subgroup progress would move to 90% (381/425). It would likely simplify the resolution of many of the remaining 44 comments, such as those commenting on Abbreviated HS. TGs Draft: Security clauses are reduced from occupying ~89 pages to ~40 pages, eliminating nearly 50 pages from the TGs draft.

doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 8 Summary With this proposal, TGs can focus on continuing to improve protocols that have undergone a letter ballot (SAE, Abbr. HS). Further, it will allow TGs to pass letter ballot more quickly, shorten the cycle between letter ballots, and allow us to reach our goal of producing a quality, relevant standard.

doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 9 References T. Braskich et al, 11-09/0112r0, A vendor specific framework for centralized security, Jan /0112r0 T. Braskich, 11-09/0113r0, Comment Resolution for vendor specific centralized security, Jan /0113r0 D. Harkins and M. Audeh, 11-08/1263r0, A Modest Proposal…, Nov /1263r0 J. Walker et al, 11-08/1296r0, Key Distribution for Mesh Link Security, Nov /1296r0 S. Emeott and T. Braskich, 11-08/1361r0, Upgrades to MSA to support multiple MKD, Nov (Also /1364.)11-08/1361r /1364