EPON Technology Team 2/9/2014 Key Management [802.1af - Issues] 2004. 5. 12 Jee-Sook Eun Electronics and Telecommunications Research Institute.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

802.1 AE/AF Platform considerations
EAP Scenarios and 802.1af Joseph Salowey 1/12/2006.
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
1 Key Exchange Solutions Diffie-Hellman Protocol Needham Schroeder Protocol X.509 Certification.
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Key Management And Key Distribution The essential problems addressed by all cryptosystems is how to safely exchange keys and how to easily manage the.
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
SSL Protocol By Oana Dini. Overview Introduction to SSL SSL Architecture SSL Limitations.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Presented by Fengmei Zou Date: Feb. 10, 2000 The Secure Sockets Layer (SSL) Protocol.
Slides by Kent Seamons and Tim van der Horst Last Updated: Nov 8, 2013.
P Security Survey and Recommendations By: Ryon Coleman October 16, 2003.
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
Doc.: Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Securing the Network.
Public-key based. Public-key Techniques based Protocols –may use either weak or strong passwords –high computation complexity (Slow) –high deployment.
Homework #4 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
802.1x EAP Authentication Protocols
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Wireless LAN Security Framework Backend AAA Infrastructure RADIUS, TACACS+, LDAP, Kerberos TLSLEAPTTLSPEAPMD5 VPN EAP PPP x EAP API.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
IEEE Wireless LAN Standard
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless and Security CSCI 5857: Encoding and Encryption.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
Pretty Good Privacy (PGP) Security for Electronic .
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
EPON Technology Team 12/6/2015 Key Management [802.1af - considerations] Jee-Sook Eun Electronics and Telecommunications Research Institute.
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
1 Chap. 2 Protocol. 2 Communication model Simplified communication model  source node  gather data from sensor or switch using ADC (analog-to-digital.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
Network Access Control
Wireless Network Security CSIS 5857: Encoding and Encryption.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Doc.: IEEE /657r0 Submission August 2003 N. Cam-WingetSlide 1 TGi Draft 5.0 Comments Nancy Cam-Winget, Cisco Systems Inc.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE / wng Submission March 2012 Paul A. Lambert (Marvell)Slide 1 Security Framework Date: Authors:
Key Management and Distribution Anand Seetharam CST 312.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
History and Implementation of the IEEE 802 Security Architecture
The Secure Sockets Layer (SSL) Protocol
History and Implementation of the IEEE 802 Security Architecture
Jee sook, Eun May 2004 Presented in IEEE 802.1af - key management
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
IEEE i Dohwan Kim.
The Secure Sockets Layer (SSL) Protocol
Install AD Certificate Services
Configure a Wireless Router
Configure a Wireless Router
Presentation transcript:

EPON Technology Team 2/9/2014 Key Management [802.1af - Issues] Jee-Sook Eun Electronics and Telecommunications Research Institute

EPON Technology Team EPON Technology Team (.) 2/9/ af This is a project of the MAC Security Task Group. It is not an amendment to IEEE std 802.1X This standard need not extends 802.1X to establish securi ty associations for 802.1ae MAC Security

EPON Technology Team EPON Technology Team (.) 2/9/2014 Authentication problem Link security is between access point and access device Authentication is between access point and access device, too. In order to authenticate access device, we need not use x We can use symmetric key encryption between access point and access device because of many reasonable reason. And, we need symmetric key. Master key generating session keys m ust set before security process. The confirm of Master key is authentication This method is very simple, and low cost.

EPON Technology Team EPON Technology Team (.) 2/9/2014 Problems of 802.1x authentication The use of IEEE Std 802.1X, already widespread and su pported by multiple vendors, in additional applications. This is just assumption. If not so who assure that EAP message is relayed to authentication server? we must implement 802.1x. –This is very complex, and high cost if we develop an low cost switch. –And we need an authentication server in case of absent –Supplicant, Authenticator, Authentication server state machine For example, if there is a bridge, the bridge must have above all thr ee state machines. Because bridge can be supplicant or authenticat or or authentication server. There is two security channel. One is for MAC security, the other is for key security And, Need two configuration protocols for each, too As you know, key security was made for MAC security.

EPON Technology Team EPON Technology Team (.) 2/9/2014 Authentication as the confirm of Master key very simple If encrypted message can be decrypt, the receiver can transmit ac k message encrypted Low cost Need not authentication server Need not KDC Symmetric key is available for access point, access device can get secured channel as only an authentication Key exchange through the secured channel need not get information such as certificate from upper lay er. Link security can be operated independently