Jan 2008 Richard Paine, BoeingSlide 1 doc.: IEEE 802.11-08/0120r1 Submission Next Generation Security for 802.11 What is 21 st Century Security? 802.11.

Slides:



Advertisements
Similar presentations
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Advertisements

Doc.: IEEE /688r0 Submission September 2003 Stephen McCann, Siemens Roke ManorSlide 1 Interworking Update II Stephen McCann, Siemens Roke Manor.
Doc.: IEEE /0357r0 Submission March 2011 Marc Emmelmann, Fraunhofer FOKUSSlide 1 A focused path torwards TGai D1.0 Date: Authors:
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
IPv6 Multihoming Support in the Mobile Internet Presented by Paul Swenson CMSC 681, Fall 2007 Article by M. Bagnulo et. al. and published in the October.
Omniran GPP Trusted WLAN Access to EPC Use Case Analysis Date: Authors: NameAffiliationPhone Max RiegelNSN
WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
Doc.: IEEE /533r0 Submission July 2003 Clint Chaplin, Symbol TechnologiesSlide 1 Proposal for Fast Roam Fast Handoff Study Group Clint Chaplin,
6 The IP Multimedia Subsystem Selected Topics in Information Security – Bazara Barry.
Wireless Design for Voice Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Richard Paine, BoeingSlide 1 doc.: IEEE /757r0 Submission May 2007 Secure Mobile Architecture SMA – Secure Multi-Net Handoff May 2007 SMA Demo.
Doc.: IEEE /0407r0 Submission Andrew Myers, BT Slide 1 March 2004 WLAN Backend System Security and WLAN Interworking Security Andrew Myers British.
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
VoIP over Wireless Networks Router Access Point (AP) AP INTERNET.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
IEEE Wireless LAN Standard
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Issues of HIP in an Operators Network Nick Papadoglou Thomas Dietz.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
January 2001 Richard Paine, BoeingSlide 1 doc.: IEEE /050 Submission Boeing Enterprise User Scenario Wireless VOIP Mobile Nets DEN Richard Paine.
7 IPv6: transition and security challenges Selected Topics in Information Security – Bazara Barry.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Richard Paine, BoeingSlide 1 doc.: Submission May 2007 Secure Mobile Architecture SMA Basics for IEEE May 2007 SMA Demo Team.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Doc.: IEEE /462r0 IEEE / San Francisco / July 2003 July 2003 Jean-Michel Lauriol, AlcatelSlide 1 TIA TR-41 VoIP over WLAN projects.
Internet Goes Mobile Alper Yegin KIOW 2003 at APNIC 16 August 19th, Seoul, Korea.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Phantom Works Mathematics & Computing Technology September 1999 Richard Paine, BoeingSlide 1 doc.: IEEE /198 Submission Requirements for an IAPP.
Presented by: Dr. Munam Ali Shah
Secure Mobile Architecture Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
PRESENTATION ON WI-FI TECHNOLOGY
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
October 4-7, 2004 Los Angeles, CA VoWLAN Trends and Opportunities Kamal Anand Vice President Marketing Meru Networks
Doc.: mes Submission 7 May 2004 Tricci SoSlide 1 Need Clarification on The Definition of ESS Mesh Prepared by Tricci So.
1 Presentation_ID © 1999, Cisco Systems, Inc. Cisco All-IP Mobile Wireless Network Reference Model Presentation_ID.
Enterprise-Class Telephony on Wireless LANs Tom Alexander CTO VeriWave, Inc.
1 A VPN based approach to secure WLAN access John Floroiu
Lecture 24 Wireless Network Security
Doc.: IEEE /209r0 Submission 1 March GPP SA2Slide 1 3GPP System – WLAN Interworking Principles and Status From 3GPP SA2 Presented.
Doc.: IEEE 11-04/0319r0 Submission March 2004 W. Steven Conner, Intel Corporation Slide 1 Architectural Considerations and Requirements for ESS.
Requirements For Handover Information Services MIPSHOP – IETF #65 Srinivas Sreemanthula (Ed.)
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
January 2003 Richard Paine, Boeing Slide 1 doc.: IEEE /087r0 Submission Slide 1 Richard Paine, Boeing Voice Over IP Scenario For IEEE k.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Michael G. Williams, Jeremey Barrett 1 Intro to Mobi-D Host based mobility.
Omniran OmniRAN SaMOG Use Case Date: Authors: NameAffiliationPhone Max RiegelNSN
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
Doc.: wng0> Submission Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Using Host.
SHIP: Performance Reference: “SHIP mobility management hybrid SIP-HIP scheme” So, J.Y.H.; Jidong Wang; Jones, D.; Sixth International Conference on
INTRODUCTION WIRELESS GATEWAY.  A device that allows a computer and other Internet-enabled devices to access the Internet connection.  Functioned as.
Doc.: IEEE /492r00 Submission Orange Labs Date: Collaboration between 2.4/5 and 60 GHz May 2010 Slide 1 Authors:
Next Generation Security for
2002 IPv6 技術巡迴研討會 IPv6 Mobility
Next Generation Networking
Presentation transcript:

Jan 2008 Richard Paine, BoeingSlide 1 doc.: IEEE /0120r1 Submission Next Generation Security for What is 21 st Century Security? Responsibilities VOIP/VoWLAN Reality Identity Solutions Architecture

Jan 2008 Richard Paine, BoeingSlide 2 doc.: IEEE /0120r1 Submission Security comes from certainty about "Who, What, Where, When, How and Why". Whatever adds to that certainty increases security, and whatever obscures that certainty decreases security. Certainty is about knowing the neighborhood, including identity, the regulatory domains, location, and surrounding equipment. What is Security?

Jan 2008 Richard Paine, BoeingSlide 3 doc.: IEEE /0120r1 Submission Today’s Wireless Security Tomorrow’s Security (for P2P VOIP) Fear Knowledge Low Quality Insecure on WLAN High Quality Secure on WLAN X X X Low Quality Insecure on WLAN Insecure on non High Quality Secure on WLAN Secure on non Near Future Wireless Security (w 11k, 11n, 11r, 11s, 11u, 11w, 11y, 11z) X X X X X Insecure on non Secure on non Low Quality Insecure on WLAN Insecure on non High Quality Secure on WLAN Secure on non X

Jan 2008 Richard Paine, BoeingSlide 4 doc.: IEEE /0120r1 Submission 21 st Century Security Shared medium (all wireless in regulatory domains) Identity Assurance Location Privacy Transition from Fear to Safety Assurance From Spoofing to Identity Protection Uncertainty Protection and Minor Risk Acceptance Weapons of Internet Offense and Defense Reliability Assurance (protection from DOS attacks)

Jan 2008 Richard Paine, BoeingSlide 5 doc.: IEEE /0120r1 Submission How Fits in 21 st Century Security Leading network standard (11ma, 11k,11n,11r, 11s, 11T, 11u, 11v, 11w, 11y, and 11z) Should be primary to deliver mobility/identity/location privacy/identity protection/uncertainty protection/independent from and the Internet Reliability assurance during handoffs (11k and 11r)

Jan 2008 Richard Paine, BoeingSlide 6 doc.: IEEE /0120r1 Submission Responsibilities leadership in an unwired world Independence from previous wired thought VoWLAN – issues (QoS, DOS, etc) Transition from ESS to P2P Enabling seamless secure wireless to wired (P2P as in VoWLAN) Enabling identity-based security wireless to wired (P2P as in VoWLAN)

Jan 2008 Richard Paine, BoeingSlide 7 doc.: IEEE /0120r1 Submission Leadership secure wireless (WPA and RSN) Transition to the wired network insecure AP is the source of the transition to the wired

Jan 2008 Richard Paine, BoeingSlide 8 doc.: IEEE /0120r1 Submission Previous Thought Security for wireless enough Applications must handle their own security Not the responsibility of the wireless realm in prime position to solve the problem

Jan 2008 Richard Paine, BoeingSlide 9 doc.: IEEE /0120r1 Submission Future Thinking Security end-to-end will require IEEE protocols (mobility and identity) VoWLAN will change the world IETF security not enough (HIP part of SMA) Transition to new thinking about Internet security (P2P) should step up to new thinking

Jan 2008 Richard Paine, BoeingSlide 10 doc.: IEEE /0120r1 Submission VoWLAN Issues 11u VoWLAN projects – ENUM – ECRIT 11e/WMM discrepancies – Not adequate for widespread VoWLAN – Failure of the QSE proposed work security only addresses ESS Must address wireless to wired security

Jan 2008 Richard Paine, BoeingSlide 11 doc.: IEEE /0120r1 Submission VOIP Reality VOIP will operate over both wired and wireless SIP reality is over both wired and wireless Secure communications is BSS/ESS and VPN (not secure past the VPN server) VOIP to demand secure voice comm IETF working on securing P2P (P2PSIP)

Jan 2008 Richard Paine, BoeingSlide 12 doc.: IEEE /0120r1 Submission VoWLAN Reality VoWLAN entering the BSS and ESS via wire VOIP requiring peer-to-peer or end-to-end secure voice communications must have an end-to-end and peer-to-peer transition and handoff solution

Jan 2008 Richard Paine, BoeingSlide 13 doc.: IEEE /0120r1 Submission End-to-End/Peer-to-Peer Tunnels SSL SIP/HIP (Host Identity Protocol)

Jan 2008 Richard Paine, BoeingSlide 14 doc.: IEEE /0120r1 Submission Transition from ESS to P2P Naming and Addressing –IP Addresses vulnerable –MAC addresses vulnerable –PKI Identity-based security associations OK IETF Middlebox Capabilities Potential Solution: AP must have middlebox features –HIP Middlebox possibilities or SSL Tunnel Handoffs

Jan 2008 Richard Paine, BoeingSlide 15 doc.: IEEE /0120r1 Submission Enabling Secure P2P – Wired and Wireless Possible Solutions –HIP –Secure Tunnels Security Solutions –IPv6/MIPv6 –Identity Based HIP 802.1x

Jan 2008 Richard Paine, BoeingSlide 16 doc.: IEEE /0120r1 Submission Identity-Based P2P HIP –Cryptographic Names/Identifiers –Security Associations –HIP-enabled communications Parity –Need ongoing parity –Overlap in BSS –Changing keys by symbol

Jan 2008 Richard Paine, BoeingSlide 17 doc.: IEEE /0120r1 Submission SMA Big Picture VPN WiMAXCellular Intranet Plane SCADAnet Plane Overlay Network Cell Subnet WiMAX Subnet HTTP PROXY Internet Plane VPN Subnet A Subnet B HIP MB AP Middlebox

Jan 2008 Richard Paine, BoeingSlide 18 doc.: IEEE /0120r1 Submission Boeing 2007 SMA/HIP Implementation smamobiles Boeing Intranet AAA Server DNS Namespace: mobile.tl.boeing.com Router AP … smaX Msg Brkr Directory DNS WiFi Switch TempCert RA Location Server LPDD HIP SA AP … SMAx VOIP Msg Brkr Directory DNS WiFi Switch TempCert RA Location Server LPDD Smamobiles VOIP HIP SA Boeing PKI Cellular Smamobile HIP SA Internet Robot Controller Robots HIP SA

Jan 2008 Richard Paine, BoeingSlide 19 doc.: IEEE /0120r1 Submission AP Middlebox –HIP Names/Identifiers Security Associations HIP-enabled communications Rendezvous Server –Tunnels +

Jan 2008 Richard Paine, BoeingSlide 20 doc.: IEEE /0120r1 Submission Possibilities Do Nothing Concede an P2P enhancement SG on P2P enhancements SG on NG security 11u address P2P in amendment 11u address VoWLAN in E911 Combination of and

Nov 2007 Richard Paine, BoeingSlide 21 doc.: IEEE /2787r1 Submission Q&A