Doc.: IEEE 802.11-08/0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 1 Refining the Security Architecture Date: 2008-05-13 Authors:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 1 A vendor specific plan for centralized security Date: Authors:
Advertisements

Doc.: IEEE /1263r0 Submission November 2008 Dan Harkins, Aruba NetworksSlide 1 A Modest Proposal…. Date: Authors:
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Generalized Multiprotocol Label Switching: An Overview of Signaling Enhancements and Recovery Techniques IEEE Communications Magazine July 2001.
Doc.: IEEE /0578r0 Submission 2008 May Jarkko Kneckt, NokiaSlide 1 Forwarding in mesh containing MPs in power save Date: Authors:
Doc.: IEEE r6 Submission July 2008 Charles Fan,Amy Zhang, HuaweiSlide 1 Authentication and Key Management of MP with multiple radios Date:
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
Resource Management §A resource can be a logical, such as a shared file, or physical, such as a CPU (a node of the distributed system). One of the functions.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Internet Networking Spring 2002 Tutorial 13 Web Caching Protocols ICP, CARP.
Submission doc.: IEEE /1063r0 September 2012 Yasuhiko Inoue (NTT)Slide 1 Requirements on WLAN Cellular Offload Date: Authors:
Network Topologies.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Common Devices Used In Computer Networks
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Doc.: IEEE 802 ec-12/0006r0 Submission Liaison presentation to SC6 regarding Internet Security Date: 2012-February-13 Authors: IEEE 802 LiaisonSlide 1.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Chapter 21 Topologies Chapter 2. 2 Chapter Objectives Explain the different topologies Explain the structure of various topologies Compare different topologies.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
Doc.: IEEE /0358r0 Submission March 2007 Zhao and Walker, Intel CorpSlide 1 Thoughts on Peer Capacity Date: Authors: Notice: This document.
Guidelines for Cryptographic Algorithm Agility Russ Housley IETF 89 - SAAG Session.
SDN Management Layer DESIGN REQUIREMENTS AND FUTURE DIRECTION NO OF SLIDES : 26 1.
Submission doc.: IEEE 11-12/0553r4 May 2012 Jarkko Kneckt, NokiaSlide 1 Response Criteria of Probe Request Date: Authors:
Doc.: IEEE /2161r1 Submission July 2007 Slide 1 July 2007 Donald Eastlake 3rd, MotorolaSlide 1 Segregated Data Services in Date:
Doc.: r Submission March 2006 AllSlide 1 A method to refresh the keys hierarchy periodically Notice: This document has been prepared to.
Introduction to Active Directory
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Doc.: IEEE /0xxxr0 Submission March, 2007 Gabor/SriniSlide 1 Joint TGu : Location Configuration for Emergency Services Notice: This document.
Doc.: IEEE /0371r0 Submission May 2005 S. McCann & E. Hepworth, Siemens Roke ManorSlide 1 IEEE 802 Architecture Issues Notice: This document has.
Doc.: IEEE /0147r0 Submission January 2012 Rolf de Vegt (Qualcomm)) Slide ai Spec Development Process Update Proposal Date:
Doc.: IEEE /1143r0 Submission November 2009 Kazuyuki Sakoda, Sony CorporationSlide 1 Potential confusion in D3.04 Date: Authors:
Doc.: IEEE /0448r0 Submission March, 2007 Srinivas SreemanthulaSlide 1 Joiint TGU : Emergency Identifiers Notice: This document has been.
Doc.: IEEE r1 Submission March 2008 Charles Fan,Amy Zhang, HuaweiSlide 1 Authentication and Key Management of MP with multiple radios Date:
Protocol Coexistence Issue in MSA Subsequent Authentication
Doc.: IEEE /0085r1 Submission June 2010 Tuncer Baykas, NICTSlide TG1 and System Design Document Notice: This document has been prepared.
PERFORMANCE MANAGEMENT IMPROVING PERFORMANCE TECHNIQUES Network management system 1.
Doc.: IEEE /0537r0 Submission May 2010 Kazuyuki Sakoda, Sony CorporationSlide 1 General frame format comment resolution overview Date:
Doc.: IEEE /2539r0 Submission September 2007 Tony Braskich, MotorolaSlide 1 Overview of an abbreviated handshake with sequential and simultaneous.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
Relationship between peer link and physical link
P802.11aq Waiver request regarding IEEE RAC comments
Internet Networking recitation #12
Overview of Key Holder Security Association Teardown Mechanism
Overview of Changes to Key Holder Frame Formats
May 2007 MSA Comment Resolution Overview
Authentication and Key Management of MP with multiple radios
LB93 Unresolved RFI Comments
Different MKD domain MPs communication method
Setting of DTIM Interval for MCCA
MAC beaconing sync comment resolution overview
Relationship between peer link and physical link
Synchronization related comment resolution
P802.11aq Waiver request regarding IEEE RAC comments
Overview of Improvements to Key Holder Protocols
MAC beaconing sync comment resolution
PLE Comment Resolution Update
Overview of Improvements to Key Holder Protocols
Setting of DTIM Interval for MCCA
Congestion Control Comments Resolution
BPSec: AD Review Comments and Responses
Overview of an MSA Security Proof
General discovery comment resolution overview
Presentation transcript:

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 1 Refining the Security Architecture Date: Authors:

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 2 Abstract This presentation provides a brief overview of some security issues being discussed during the LB 126 comment resolution process.

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 3 Overview TGs Draft 2.0 contains several new components that have been considered during the recent letter ballot. –Compared to Draft 1.0, the current TGs draft has new features and many refinements of previously-existing features. –We can now discuss the synthesis of the security architecture, since the necessary components can now be found in the draft. We can identify areas where further refinement is needed to ensure the components work together.

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 4 Topics to discuss Introduction to security, and making the security topics more accessible. Providing security goals Key Hierarchies and management Multiple MKDs

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 5 Introduction to Security Security sections are split (§8, §11B.2, §11B.5). It can be difficult for readers not already familiar with the architecture to understand how security is achieved. Protocol names should be improved to provide additional information to new readers –For example, rename MSA Authentication as “Link Security Establishment.” –Rename Initial MSA Authentication as “Mesh Authentication.” Introduce SAE along with other security components. Explain to unfamiliar readers how SAE may be used in contrast to other authentication techniques. –MSA specifies centralized authentication (e.g., MKD-based). This can be “Mesh Authentication.” –Alternatively, SAE permits “peer authentication,” between two MPs, without a centralized point of control.

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 6 Security Goals Security goals would help the reader understand the purpose for the mechanisms defined in the specification. The following goals, addressing the entire architecture for mesh security, should be considered for inclusion: –Mutual authentication of MPs before communicating –Per-hop Confidentiality (from those outside the mesh) of data traffic –Per-hop Integrity of data traffic –Authorization to send traffic on the mesh –Management functions limited to “member” MPs (i.e., outsiders cannot influence mesh functions, such as routing) –Provable security (i.e., the design should permit analysis and development of a proof).

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 7 Key Hierarchies & their management MSA utilizes a mesh key hierarchy to derive keys for use in securing links with candidate peer MPs. –Top of the hierarchy created when an MP authenticates to an MKD. This creates fixed-size state information, an MKD security association. –Also defines keys to protect key holder communication. With a key hierarchy, an MP computes the keys it needs for new candidate peer MPs on-demand. –For example, a mobile MP may derive PMK-MAs as it discovers peers. –Session keys (e.g., a PTK) are established from the PMK-MAs. Comment spreadsheet includes suggestions for clarifying some details of the key hierarchy. For example, the following additions would be helpful: –Definitions of created state (i.e., security associations) –Policies for deleting security associations –Explanation of the process of reauthenticating

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 8 Key Hierarchy Benefits Only one of two peer MPs needs to obtain a PMK-MA from the MKD. –This reduces the required information transfer between devices that is needed before establishing a peer link. –This may help reduce error situations, such as by avoiding extra protocols. The amount of state related to the key hierarchy that an MP must maintain is flexible. –PMK-MAs for use with other MPs can be computed on-demand, such as before establishing a secure peer link. –Because the MP can always re-create the PMK-MA from the MKDSA, these may be deleted to free memory. –On the other hand, some MPs may choose to pre-compute and cache keys, especially if memory is cheap. A revised KDF accelerates the key derivation procedure for PMK-MAs. –(A partial computation applicable to all PMK-MAs can be performed and stored.) For any link, one of two PMK-MAs may be selected to secure it. This provides redundancy in the event that one MP cannot reach an MKD.

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 9 Multiple MKDs: Why? Multiple MKDs may be present in a mesh. Why might a mesh deploy multiple MKDs? 1.Avoid single point of failure. –A single MKD must be reachable by an MA whenever the MA is establishing a peer link with a new neighbor. –Failure of the MKD will prevent new link establishment in the mesh. Multiple MKDs would increase the probability of availability. 2.Merging & faster startup. –Mesh links must be built out from the MKD. Multiple MKDs provide several “seeds” to begin growing the mesh, rather than from a single node. (Example, next slide.) 3.Distribution of load, for the purpose of reducing key pull delays. –At the MKD: in a large mesh, the MKD might become too busy handling requests for key distributions and handling authentications. With multiple MKDs, the load may be distributed. –On mesh paths: Path to the MKD may be congested, of poor quality, etc., but is needed whenever new peer links are established. Multiple MKDs would increase the number of mesh paths that can be used to obtain a PMK-MA.

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 10 Merging meshes example AS MKD AMKD B MP wired network Authentication through MKD B Multiple MKDs have been configured identically, with the same AS. Two disjoint meshes begin forming, with different MKDs. When the meshes merge, one MP must authenticate through the other MKD. But, the mesh is unified. Two MKDs allowed the mesh to grow more quickly than with just 1 MKD.

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 11 Multiple MKDs: improvements The draft could be improved to give implementers a better guide for managing multiple MKDs. An MA and an MKD use the key holder security association (KHSA) to secure communications. Additional work is needed on managing KHSAs with multiple MKDs. The comment spreadsheet includes some suggestions for improvement: –Remove the restriction of an MP having a single KHSA. –The concept of an MKD domain causes confusion and is not needed. The text can be made more applicable to a mesh with multiple MKDs. –Improve the MSA authentication mechanism for better accommodation of multiple MKDs

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 12 Conclusions Tying together the security sections and providing security goals will help readers and implementers understand the purpose of our security components. A key hierarchy has benefits for use in a mesh. –For example, an MP uses local information to compute keys, and has flexibility in maintaining key hierarchy state information. –The draft should provide more information on managing the key hierarchy. Multiple MKDs also provide important features, such as fault tolerance and load distribution. –Protocol improvements could allow better utilization of the features provided by multiple MKDs.

doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 13 Questions?