Presentation is loading. Please wait.

Presentation is loading. Please wait.

IEEE IETF Liaison Report

Similar presentations


Presentation on theme: "IEEE IETF Liaison Report"— Presentation transcript:

1 IEEE 802.11-IETF Liaison Report
January 2005 doc.: IEEE yy/xxxxr0 March 2010 IEEE IETF Liaison Report Date: Authors: Dorothy Stanley, Aruba Networks Dorothy Stanley, Agere Systems

2 January 2005 doc.: IEEE yy/xxxxr0 March 2010 Abstract This presentation contains the IEEE – IETF liaison report for March 2010. Dorothy Stanley, Aruba Networks Dorothy Stanley, Agere Systems

3 IETF Geographic Location and Privacy (Geopriv) WG
January 2005 doc.: IEEE yy/xxxxr0 March 2010 IETF Geographic Location and Privacy (Geopriv) WG See Specific reference to WLANs: Carrying Location Objects in RADIUS, see Documents referenced in (TGv) Geopriv Requirements, see Civic Address definitions, see July 2009 Liaison to IETF GEOPRIV See November 2009 Contributions See and and March 2010 Contributions and Dorothy Stanley, Aruba Networks Dorothy Stanley, Agere Systems

4 Update: CAPWAP WG Control And Provisioning of Wireless Access Points
January 2005 doc.: IEEE yy/xxxxr0 March 2010 Update: CAPWAP WG Control And Provisioning of Wireless Access Points WG Website: RFC documents have been published RFC 5415, Control And Provisioning of Wireless Access Points (CAPWAP) Protocol Specification RFC 5416, Control and Provisioning of Wireless Access Points (CAPWAP) Protocol Binding for IEEE RFC 5417, Control And Provisioning of Wireless Access Points (CAPWAP) Access Controller DHCP Option RFC 5418, Control And Provisioning of Wireless Access Points (CAPWAP) Threat Analysis for IEEE Deployments [March 2010]Remaining MIB documents to be published shortly Dorothy Stanley, Aruba Networks Dorothy Stanley, Agere Systems

5 Handover Keying (HOKEY)
January 2005 doc.: IEEE yy/xxxxr0 March 2010 Handover Keying (HOKEY) Hokey Charter available at Extensions to current EAP key framework to facilitate inter-authenticator handover and roaming. Published RFCs: Handover Key Management and Re-authentication Problem Statement, see Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK), see EAP Extensions for EAP Re-authentication Protocol (ERP), see Current work items: Distribution of EAP based keys for handover and re-authentication , see [published March 2010] Extensible Authentication Protocol (EAP) Early Authentication Problem Statement, see . Dorothy Stanley, Aruba Networks Dorothy Stanley, Agere Systems

6 Update: EAP Method Update (EMU)
January 2005 doc.: IEEE yy/xxxxr0 March 2010 Update: EAP Method Update (EMU) Working Group website: EAP Authentication based on the EKE protocol [March 2010] EAP Authentication Using Only A Password [March 2010] IEEE liaison request Requirements are documented in u-emergency-services-eap-requirements Response received from IETF EMU, see . Response under consideration in TGu Dorothy Stanley, Aruba Networks Dorothy Stanley, Agere Systems

7 Emergency Context Resolution with Internet Technologies (ECRIT)
January 2005 doc.: IEEE yy/xxxxr0 March 2010 Emergency Context Resolution with Internet Technologies (ECRIT) Working Group website: Emergency Services Framework for Emergency Calling using Internet Multimedia, see Unauthenticated access being discussed, see Describing boundaries for Civic Addresses, see Dorothy Stanley, Aruba Networks Dorothy Stanley, Agere Systems

8 IETF Meetings Meetings: http://www.ietf.org March 21-26, 2010, Anaheim
January 2005 doc.: IEEE yy/xxxxr0 March 2010 IETF Meetings Meetings: March 21-26, 2010, Anaheim July 25-30, 2010, Maastricht November 7-12, 2010, Beijing Dorothy Stanley, Aruba Networks Dorothy Stanley, Agere Systems

9 References RFC 4017 - IEEE 802.11 Requirements on EAP Methods
January 2005 doc.: IEEE yy/xxxxr0 March 2010 References RFC IEEE Requirements on EAP Methods Dorothy Stanley, Aruba Networks Dorothy Stanley, Agere Systems


Download ppt "IEEE IETF Liaison Report"

Similar presentations


Ads by Google