March 2009 Richard Paine, SelfSlide 1 sg-whitespace-09-0061-00-0000-Secure-Datastore-Architecture-Concepts Submission Project IEEE 802 Executive Committee.

Slides:



Advertisements
Similar presentations
Project IEEE 802 Executive Committee Study Group on TV White Spaces – ADHOC USE CASE SUB-GROUP TitleECSG ADHOC USE CASE SLIDE DECK Date Submitted xx.
Advertisements

Project IEEE 802 Executive Committee Study Group on TV White Spaces – ADHOC USE CASE SUB-GROUP TitleECSG ADHOC USE CASE SLIDE DECK Date Submitted xx.
11 IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec Title: Summary of Proposed Security Solutions Date Submitted: March 12, 2010 Present at.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Proposal of new SID in IEEE c Date Submitted: Presented at IEEE c TG Authors or Source(s):
Sg-whitespace-09/0026r04 Submission January 2009 Slide 1 Security Ad-Hoc Report Draft Date: Authors: Alex Reznik, InterDigital; Ranga Reddy,
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIIS and Its Higher Layer Transport Requirements: Ad hoc Update and Discussion on.
Doc.: IEEE /0045r0 Submission July 2009 Fanny Mlinarsky, Mimi TamSlide 1 Need for Coexistence Certification Testing? Notice: This document has.
Doc.: IEEE /90r0 Submission Nov., 2012 NICTSlide b NICT Proposal IEEE P Wireless RANs Date: Authors: Notice: This document.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Reference Model and Use-Cases for Information Service Date.
Doc.: IEEE /02r0 Submission January 2013 Ranga Reddy, SelfSlide 1 January 2013 TGa Review IEEE P Wireless RANs Date: Authors:
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
Sg-whitespace-09/0026r05 Submission February 2009 Slide 1 Security Ad-Hoc Report Draft Date: Authors: Alex Reznik, InterDigital; Ranga Reddy,
Doc.: IEEE /0907r0 Submission September 2005 Peter Ecclesine, Cisco SystemsSlide 1 dot1AM management plane Notice: This document has been prepared.
Text Proposals of HR-MS Forwarding in 16n Network IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE S802.16n-11/0074 Date Submitted:
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Analysis on Identifiers Date Submitted: January 9, 2006 Presented.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Sec Title: Considerations on use of TLS for MIH protection Date Submitted: January 14, 2010.
IEEE MEDIA INDEPENDENT HANDOVER DCN: REVP-Proposal-on-the-security-of Title: Proposal on the security of Date Submitted:
MuGM IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Use of certificates as a base security level for securing PoS/MN multicast communication.
IEEE Emergency Services DCN: Title: 802 Location Report Date Submitted: May 06, 2011 Presented at IEEE
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Message Flow Date Submitted: March 1, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
Submission doc.:IEEE /0257r6 June 2007 Kyutae Lim, GEDC, Georgia Tech Slide 1 MAC-SM-SSF Interface IEEE P Wireless RANs Date:
Doc.: IEEE b Submission Nov., 2012 NICTSlide 1 Investigation on meeting the TVWS Spectrum Mask IEEE P Wireless RANs Date:
Doc.: IEEE /0310r0 Submission Sept 2007 Srinivas Sreemanthula Slide 1 IEEE MEDIA INDEPENDENT HANDOVER DCN: MIH-Security-Options.ppt.
Sg-whitespace-09/0029r1 Submission February 2009 Steve Shellhammer, QualcommSlide 1 Coexistence Scenarios Date: Authors: Notice: This document.
IEEE MEDIA INDEPENDENT HANDOVER DCN: draft_invariants Title: Invariants in Proposed Drafts Date Submitted:
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IEs related Issues Date Submitted: March 2007 Presented at IEEE session.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Reference Model and Use-Cases for Information Service Date.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IETF Pre-authentication Activity Date Submitted: February 26, 2006.
Doc.: IEEE /0460r1 Submission March 2006 Fujio Watanabe, DoCoMo USA LabsSlide 1 Japanese Emergency Call Regulation Notice: This document has been.
March 2009 Richard Paine, SelfSlide 1 doc.: /0337r0 Submission Project IEEE 802 Executive Committee Study Group on TV White Spaces – End-to-End.
IEEE MEDIA INDEPENDENT HANDOVER DCN: hwnm Title: Thoughts on IEEE relation with IEEE Date Submitted: May 13, 2010.
Doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 1 11k LB73 Security Resolutions Notice: This document has been prepared to assist.
Project Planning Committee (PPC): Session #70 WG Opening Plenary Report IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE.
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Coexistence Scenarios
November 2005 Liaison Report from P1901
Media Independent Coexistence
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
TV White Space Coexistence Plan
Reference Model Date: Authors: September 2010
IEEE MEDIA INDEPENDENT HANDOVER DCN:
R0KH-R1KH protocol requirements
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Matthew Sherman, BAE Systems
Addressing White Spaces Across all of IEEE 802
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Security Tutorial Material
Security Tutorial Material
IEEE White Space Radio Draft ToC
Matthew Sherman, BAE Systems
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Security Ad-Hoc Report Draft
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER
IEEE MEDIA INDEPENDENT HANDOVER DCN:
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Media Independent Handover
Media Independent Coexistence
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
July 2013 Opening Report Date: Authors: July 2013
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

March 2009 Richard Paine, SelfSlide 1 sg-whitespace Secure-Datastore-Architecture-Concepts Submission Project IEEE 802 Executive Committee Study Group on TV White Spaces – Secure Datastore /End-to-End Security Architecture Concepts TitleECSG WS Study Group Date Submitted Source(s)Contributor: Richard Paine, Affiliation Self Voice: , AbstractIEEE 802 ECSG on White Space slide deck to capture 802 and TVWS USE CASE Security Issues PurposeTo provide input to the ECSG and others on possible use cases that will help clarify how the TVWS spectrum might be secured and how these uses might possibly be addressed by IEEE 802 work. ReleaseThe contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE ’ s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE ’ s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802. Patent Policy and Procedures The contributor is familiar with the IEEE-SA Patent Policy and Procedures: and. Further information is located at and.

March 2009 Richard Paine, SelfSlide 2 sg-whitespace Secure-Datastore-Architecture-Concepts Submission 802 End-to-End Security

March 2009 Richard Paine, SelfSlide 3 sg-whitespace Secure-Datastore-Architecture-Concepts Submission OSI-TCP/IP Stack Comparison 12/13/2015

March 2009 Richard Paine, SelfSlide 4 sg-whitespace Secure-Datastore-Architecture-Concepts Submission Platform and Security Layers 802.1x, etc. Modem OS-Internetworking OS-Session Application Modem OS-Internetworking OS-Session Application Application-Secured Payload SSL, TLS, etc. IPSec, HIP, etc. Physical Medium Media 802.1x, etc. Each platform abstraction layer supports its own communications security –Note: Media security is generally platform-to-network, not platform-to-platform Implementation of each platform abstraction should be secured –Certification of regulatory/standards compliance –Real-time attestation of implementation (“tamper-proof”) –Ability to secure sensitive data –This is not shown, but implied

March 2009 Richard Paine, SelfSlide 5 sg-whitespace Secure-Datastore-Architecture-Concepts Submission Modem 802 Interface to the “Outside World” 12/13/ x, etc. OS-Internetworking IPSec, HIP, etc. Physical Medium Media 802.1x, etc. Discontinuity between IEEE 802 and IETF

March 2009 Richard Paine, SelfSlide 6 sg-whitespace Secure-Datastore-Architecture-Concepts Submission End Device Stack 802 PHY 802 MAC Network Equipment 802 IF To Upper Layers 802 IF To Network Device Layers Data Link 12/13/2015 Physical Medium

March 2009 Richard Paine, SelfSlide 7 sg-whitespace Secure-Datastore-Architecture-Concepts Submission Lightweight Host Identity Protocol Example TCP/UDP HIP IPSEC IP Authentication Layer ESP Payload: not encrypted, not authenticated Authenticated Control Messages Authentication Interaction Unauthenticated Control Messages Gurtov; Host Identity Protocol (HIP); Wiley, 2008; pg 131.

March 2009 Richard Paine, SelfSlide 8 sg-whitespace Secure-Datastore-Architecture-Concepts Submission Secure Network Equipment IF To Upper Layers The End-to-End LHIP Security Stack 12/13/2015 Secure Network Equipment IF To Upper Layers Physical Medium

March 2009 Richard Paine, SelfSlide 9 sg-whitespace Secure-Datastore-Architecture-Concepts Submission The End-to-End HIP/SMA Security Stack 802 PHY 802 MAC Secure Network Equipment IF To Upper Layers Data Link 802 IF To Upper Layers FCC WS DB and Schema SMA Secure DataStore And Schema SMA PKI Datastore People/Machines TNC Secure DataStore and Schema 12/13/2015 Adding HIP, TNC, and the FCC WS Work 802 IF To Device Layers IETF’s Secure DataStore and Schema (MAP) Physical Medium

March 2009 Richard Paine, SelfSlide 10 sg-whitespace Secure-Datastore-Architecture-Concepts Submission 12/13/ x, etc. Modem OS-Internetworking Modem OS-Internetworking IPSec, HIP, SMA, etc. Physical Medium Media 802.1x, etc. TCG’s TNC Secure DataStore and Schema (IF-MAP) IETF’s Secure DataStore and Schema (MAP) TCG’s TNC Secure DataStore and Schema (IF-MAP) IETF’s Secure DataStore and Schema (MAP) OS-Session Application OS-Session Application Application-Secured Payload SSL, TLS, etc. FCC Secure WS DataStore FCC Secure WS DataStore TOG’s SMA Secure Datastore and Schema SMA PKI Datastore People/Machines SMA PKI Datastore People/Machines Summary Data 802 Interface to the “Outside World”

March 2009 Richard Paine, SelfSlide 11 sg-whitespace Secure-Datastore-Architecture-Concepts Submission 12/13/2015 Ideal End-to-End Security Modem OS-Internetworking Modem OS-Internetworking IP Infrastructure Media OS-Session Application OS-Session Application SSL, TLS, etc. App.-Secured Payload IPSec, HIP, SMA, etc. Trusted Policy Engine Trusted component used to verify compliance and prevent policy violation IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP) Trusted Policy Engine IETF/TCG/TOG/IEEE Secure DataStore and Schema (MAP)

March 2009 Richard Paine, SelfSlide 12 sg-whitespace Secure-Datastore-Architecture-Concepts Submission Secure Datastore Commonalities Datastores/Schema all have similarities (FCC, SMA, LHIP, & TNC) – Location information and measurement Geolocation, sensor measurements – Host information: Identity, name, address, etc. – Network IDs: MAC, IP address, etc. – Local policy databases Spectrum policy information Security policies database Co-existence policies – Remote database information DNS, Spectrum Servers, Certificate Authorities, Sensitive SW Sources (e.g. McAfee), etc. – Trust certificates – Identities of trusted third party connections IF should/could be standardized

March 2009 Richard Paine, SelfSlide 13 sg-whitespace Secure-Datastore-Architecture-Concepts Submission Interfaces Need to be Defined k SME MIB “Zero Config”-like Access – Object IDs for the MIB Entries SME MIB Clients MIB Clients MIB Clients SMA Interface [SLDAP (Secure Lightweight Directory Access Protocol)] DNS TCG’s TNC [IF-MAP (InterFace-Metadata Access Point)] FCC WS – interface undefined, but required fields similar

March 2009 Richard Paine, SelfSlide 14 sg-whitespace Secure-Datastore-Architecture-Concepts Submission End-to-End Projects Identified Joint IEEE-IETF Task Force on end-to-end security protocols and definitions – Passing of SMA/cryptographic identity/security information from PHY to upper layers (schema?) IEEE/ project for security handoff between disparate systems (schema?) Joint IEEE-TCG Task Force on device security at lower layers – Attesting to lower layers – Compliance with regulatory/standards policies, e.g. FCC White Spaces regulations Interface definitions for all interfaces in 802

March 2009 Richard Paine, SelfSlide 15 sg-whitespace Secure-Datastore-Architecture-Concepts Submission Resolutions? HIP SMA Datastore [Secure LDAP (SLDAP)] DNS Resource Records (Not Secure) TCG’s TNC Datastore Access (SLDAP?) All schema (should be common)