Smart Object Security Workshop 23 rd March 2012, Paris.

Slides:



Advertisements
Similar presentations
MPTCP – MULTIPATH TCP WG meeting #7 27 th July 2011 Quebec, IETF-81 Yoshifumi Nishida Philip Eardley.
Advertisements

1 ISMS WG 79th IETF Beijing November 10, 2010 Goal:Creating a security model for SNMPv3 that will meet the security and operational needs of network administrators.
MPTCP – MULTIPATH TCP WG meeting #6 31 st March 2011 Prague, ietf-80 Yoshifumi Nishida Philip Eardley.
WELCOME! Multipath TCP Implementors Workshop Saturday 24 th July Maastricht Philip Eardley MPTCP WG Co-chair.
CRA-W Career Mentoring Workshop. What is networking? Making professional connections and using them wisely.
The Entrepreneur’s Roundtable (Not to be confused with any type of sales event…the only thing “for sale” here is:) Face-to-face time for entrepreneurs.
Exec Handover Training Chairing Skills
Interconnecting Smart Objects with the Internet Workshop Hannes Tschofenig.
Hannes Tschofenig, Blaine Cook (IETF#79, Beijing).
Small(er) Footprint for TLS Implementations Hannes Tschofenig Smart Object Security workshop, March 2012, Paris.
H2 Learning Webinars – what are they about? Dr. Michael Hallissy.
OAuth/UMA for ACE 24 th March 2015 draft-maler-ace-oauth-uma-00.txt Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig.
OAuth 2.0 Security IETF OAuth WG Conference Call, 14th December 2012.
The Problem Definition How to prevent Cullen from p0wning all the lightbulbs in the city?
US NITRD LSN-MAGIC Coordinating Team – Organization and Goals Richard Carlson NGNS Program Manager, Research Division, Office of Advanced Scientific Computing.
UniSA - a strategies workshop. Today’s program: (if of course, we have time for it all!!) Developing good tutor skills Tutorial dynamics Continuing.
The TBL framework. The pre-task phase introduces the class to the topic and the task activating topic related words and phrases. Pre-task phase.
ACE BOF, IETF-89 London Authentication and Authorization for Constrained Environments (ACE) BOF Wed 09:00-11:30, Balmoral BOF Chairs: Kepeng Li, Hannes.
Report from the “Smart Object Security Workshop 23 rd March 2012, Paris” Presenter: Hannes Tschofenig.
1 IPv4 – IPv6 Co-Existence Interim Meeting October 1 st – 2 nd, 2008 Montreal, Canada.
Workforce Planning Model Workshop December 2007 WELCOME.
Workshop Outputs and Goals Hannes Tschofenig Internet Privacy Workshop, December 2010.
Emergency Context Resolution with Internet Technologies (ecrit) IETF 81 – Quebec City, QC Canada July 25, 2011 Marc Linsner Richard Barnes Roger Marshall.
Diameter Maintenance and Extensions (DIME) John Loughney, Hannes Tschofenig IETF 66, Montreal, June 2006.
CLUE WG IETF-91 Paul Kyzivat (WG co-chair) Mary Barnes (WG co-chair)
OCTOBER 18-21, 2009 RED ROCK HOTEL LAS VEGAS, NEVADA Creating Your Best Experience at The Market Research Event.
KICK-OFF MEETING AGENDA Paris, April 13-14, 2005.
Multi6 interim meeting agenda Chairs: Brian Carpenter, Kurt Lindqvist 1.IPR reminder, logistics, agenda bashing 2.Charter review 3.draft-lear-multi6-things-to-think-about-03.txt.
ECRIT Virtual Interim Meeting 3rd June 2009, 1PM EDT (New York) Marc Linsner Hannes Tschofenig.
YOUTH FORUM ORIENTATION Sunday March 7 th h to 18 h.
Automated Certificate Management ACME + Let’s Encrypt Richard
March 17, 2003 IETF #56, SAN FRANCISCO1 Compound Authentication Binding Problem (EAP Binding Draft) Jose Puthenkulam Intel Corporation (
“Interconnecting Smart Objects with the Internet” Tutorial Hannes Tschofenig.
Web Authorization Protocol (oauth) IETF 90, Toronto Chairs: Hannes Tschofenig, Derek Atkins Responsible AD: Kathleen Moriarty Mailing List:
Web Authorization Protocol (oauth) Hannes Tschofenig.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt DNA wg IETF71.
Methods and Materials in Reading/Lit Week 9 Betsy Brown SUNY Geneseo
Diameter Maintenance and Extensions (dime) IETF 68, March 2007, Prague David Frascone, Hannes Tschofenig.
Mary Barnes (WG co-chair) Cullen Jennings (WG co-chair) DISPATCH WG IETF 90.
Sesame Business Network Ethiopia Mekelle, March 21 st 2015 Towards action points for 4 subjects.
Authentication and Authorization for Constrained Environment (ACE) WG Chairs: Kepeng Li, Hannes
W3C Workshop on Languages for Privacy Policy Negotiation and Semantics- Driven Enforcement Report Hannes Tschofenig IETF 67, San Diego, November 2006.
March 2008IETF KMART BoF1 KMART BOF Key Management for Routing Co-Chairs: Acee Lindem Donald Eastlake 3rd
Transport Layer Security (TLS) IETF-84 Chairs: Eric Rescorla Joe Salowey.
IETF #81 - NETCONF WG session 1 NETCONF WG IETF 81, Quebec City, Canada MONDAY, July 25, Bert Wijnen Mehmet Ersue.
DICE BOF, IETF-87 Berlin DTLS In Constrained Environments (DICE) BOF Wed 15:10-16:10, Potsdam 3 BOF Chairs: Zach Shelby, Carsten Bormann Responsible AD:
ELA Grade 11/12 Cohort Common Core Transition Training SY March 7, 2014 Professional Development Center (PDC) Judy Henderson, Emily Jimenez, Elizabeth.
Network Slicing (netslicing) BoF
IETF 97, November Seoul, Korea
WG Chairs Forum Wednesday 29 March 2017.
Authentication and Authorization for Constrained Environment (ACE)
Agenda OAuth WG IETF 87 July, 2013.
IETF101 London Web Authorization Protocol (OAuth)
Lines of Inquiry in our PPA
Exercise Professionals Hub Study Day Scroll down for the agenda
Supporting Schools and District Improvement in Massachusetts
Welcome to Workshop on Network-I/O Convergence: Experience, Lessons, Implications NICELI SIGCOMM August 27, 2003.
Wednesday, 9:30-12:00 Morning session I, Van Horne
Tuesday , 9:30-12:00 Morning session I, Buckingham
Web Authorization Protocol (oauth)
Web Authorization Protocol (oauth)
Economic Development Forum, Florence March
Agenda IETF 82 Taipei November 14, 2011
Stakeholder Mapping.
Web Authorization Protocol (OAuth) WG Chairs: Hannes Tschofenig, Rifaat Shekh-Yusef, Security AD: Roman.
Web Authorization Protocol (OAuth) WG Chairs: Hannes Tschofenig, Rifaat Shekh-Yusef, Security AD: Roman.
Web Authorization Protocol (OAuth) WG Chairs: Hannes Tschofenig, Rifaat Shekh-Yusef, Security AD: Roman.
Marc Linsner Richard Barnes Roger Marshall
Scott Bradner & Martin Thomson
Web Authorization Protocol (OAuth)
Presentation transcript:

Smart Object Security Workshop 23 rd March 2012, Paris

Organizers Hannes Tschofenig – Nokia Siemens Networks, IAB member Jari Arkko – Ericsson, IETF Internet Area Director, upcoming IAB member Carsten Bormann – University of Bremen, IETF CoRE and 6LoWPAN WG co-chair Peter Friess – European Commission Cullen Jennings – Cisco, IETF CoRE WG co-chair Antonio Skarmeta – University of Murcia, IoT6 FP7 Project Zach Shelby – Sensinode, Smart Object IETF Specification Author Thomas Heide Clausen – Ecole Polytechnique, our host

Note Well

Info Webpage: artObjectSecurity/ artObjectSecurity/ Papers and slides will be copied to this website after the meeting. Currently, the 35 papers are here: papers/PositionPapers.htm papers/PositionPapers.htm

A few words from Alex "Sandy" Pentland (MIT)Alex "Sandy" Pentland Data shows that great teams: – Communicate frequently. In a typical project team a dozen or so communication exchanges per working hour may turn out to be optimum; but more or less than that and team performance can decline. – Talk and listen in equal measure, equally among members. Lower performing teams have dominant members, teams within teams, and members who talk or listen but don't do both. – Engage in frequent informal communication. The best teams spend about half their time communicating outside of formal meetings or as "asides" during team meetings, and increasing opportunities for informal communication tends to increase team performance. – Explore for ideas and information outside the group. The best teams periodically connect with many different outside sources and bring what they learn back to the team.

Mailing List security-i1b.org security-i1b.org – Used for workshop preparation and discussion of the papers. – Will be deleted at the end of the workshop.

Results of the workshop Conclusions from discussions will be captured in a slide set at the end of the workshop. Notes / Minutes from the day: – Etherpad: Twitter hashtag: #sosw

Pictures & Audio Recording I will take pictures – and try to upload them to the webpage – OK? We will do an audio recording – Turned out to be useful if we missed some discussions. – Audio will not be shared with anyone. – OK?

Agenda 08: :00: Arrival of Participants and Coffee 09: :30: Opening Remarks Thomas Clausen, Ecole Polytechnique: Welcome and logistics (15 min) Hannes Tschofenig, NSN & Jari Arkko, Ericsson: Agenda (5 min) 09: :30: Requirements and Use Cases Paul Chilton, NXP: Security challenges in the lighting use case (10 min) Rudolf van der Berg, OECD: Open interfaces, identifier spaces, and economic challenges (10 min) Discussion: What are the core security requirements? What has the industry already deployed, and what are they struggling with? How to design for choice considering economics, and competition for smart object security? 10: :40: Break

Agenda, cont. 10: :30: Implementation experience Carsten Bormann, Universitaet Bremen: Light-weight COAP & DTLS implementations (10 min) Hannes Tschofenig, Nokia Siemens Networks: TLS and Raw Public Keys Implementation (5 min) Mohit Sethi, Ericsson/Aalto: Public Key Crypto Implementation Experience (5 min) Discussion: What is our experience with implementing some of these protocols? What worked and what didn't? What advice can be given? Where is further research, standardization, and implementation work needed? 12: :30: Lunch Break

Agenda, cont. 13: :30: Authorization and Role-based Access Control Richard Barnes, BBN: Beyond COMSEC (10 min) Jan Janak, Columbia University: On Access Control (10 min) Discussion: What is the interaction between business processes (such as installation, change of ownership; including non-business processes such as home admin), the roles we have to manage in the system as a result of that, and the crypto we can do to implement those roles? 15: :00: Coffee Break

Agenda, cont. 16: :30: Provisioning Johannes Gilger, RTWH Aachen: Secure pairing (10 min) Cullen Jennings, Cisco: A deployment model (10 min) Discussion: What are practical deployment models, and corresponding protocols? 17: :30: Summary Evening: Dinner for those who want (self-organized)