Presentation is loading. Please wait.

Presentation is loading. Please wait.

IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx

Similar presentations


Presentation on theme: "IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx"— Presentation transcript:

1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-08-0xxx-00-0000
Title: MIH Security – Use Case Outline Date Submitted: June 2, 2008 Presented: June 5, 2008, Teleconference Authors or Source(s): Lily Chen (NIST) Abstract: Outline some use cases to be discussed in SSG. 12/3/2018

2 IEEE 802.21 presentation release statements
This document has been prepared to assist the IEEE Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE The contributor is familiar with IEEE patent policy, as outlined in Section 6.3 of the IEEE-SA Standards Board Operations Manual < and in Understanding Patent Issues During IEEE Standards Development 12/3/2018

3 Outline This contribution outlines the use cases to be considered in TR; Each use case is represented in the flow chart with the colored flow. Discuss questions Whether these are valid use cases? Any other cases we shall include? For ES and CS, do we need to separate them from IS? Shall we go ahead to write text for each use case outlined? 12/3/2018

4 Use Case 1.1 MIH Access control? MIH specific auth?
no MIH Access control? MIH specific auth? no yes yes Access Authentication (maybe mutual through access controller, e.g. service provider) Mutual Authentication (through a Trusted Third Party, e.g. PKI) MIH specific protection? no yes Transport Authenticity/integrity and confidentiality Key establishment (MN and PoS) MIH Authenticity/integrity and confidentiality The transport protections may or may not in the place 12/3/2018

5 Use Case 1.2 MIH Access control? MIH specific auth?
no MIH Access control? MIH specific auth? no yes yes Access Authentication (maybe mutual through access controller, e.g. service provider) Mutual Authentication (through a Trusted Third Party, e.g. PKI) MIH specific protection? no yes Transport Authenticity/integrity and confidentiality Key establishment (MN and PoS) MIH Authenticity/integrity and confidentiality The transport protections may or may not in the place 12/3/2018

6 Use Case 2.1 MIH Access control? MIH specific auth?
no MIH Access control? MIH specific auth? no yes yes Access Authentication (maybe mutual through access controller, e.g. service provider) Mutual Authentication (through a Trusted Third Party, e.g. PKI) MIH specific protection? no yes Transport Authenticity/integrity and confidentiality Key establishment (MN and PoS) MIH Authenticity/integrity and confidentiality The transport protections may or may not in the place 12/3/2018

7 Use Case 2.2 MIH Access control? MIH specific auth?
no MIH Access control? MIH specific auth? no yes yes Access Authentication (maybe mutual through access controller, e.g. service provider) Mutual Authentication (through a Trusted Third Party, e.g. PKI) MIH specific protection? no yes Transport Authenticity/integrity and confidentiality Key establishment (MN and PoS) MIH Authenticity/integrity and confidentiality The transport protections may or may not in the place 12/3/2018

8 Use Case 3.1 – Same security policy
Home Visited 1.1 1.2 1.1 1.2 2.1 2.1 2.2 2.2 12/3/2018

9 Use Case 3.2 – Different security policies
Home Visited 1.1 1.2 1.1 1.2 2.1 2.1 2.2 2.2 12/3/2018


Download ppt "IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx"

Similar presentations


Ads by Google