Presentation is loading. Please wait.

Presentation is loading. Please wait.

doc.: IEEE <doc#>

Similar presentations

Presentation on theme: "doc.: IEEE <doc#>"— Presentation transcript:

1 doc.: IEEE 802.15-<doc#>
<month year> doc.: IEEE <doc#> <Sept 2010> Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Integration WPAN with Operator’s Network] Date Submitted: [11 March, 2010] Source: [Cao Zhen, Liu Dapeng] Company [China Mobile Communications Corporation] Address [28 Xuanwumenxi Ave. Beijing, China] Voice:[ ], FAX: [ ], Abstract: [Mobile Terminals enable many new services and opportunities for the WPAN. It is desirable to integrate the WPAN with operator’s network in order to provide more precise and secure services.] Purpose: [For information and discussion, considering including the requirements into the PSC PAR] Notice: This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P <author>, <company>

2 doc.: IEEE 802.15-<doc#>
<month year> doc.: IEEE <doc#> <Sept 2010> Integrating WPANs with Operator’s Network Zhen Cao, Dapeng Liu September 10, 2010 <author>, <company>

3 <Sept 2010> Background: Mobile Terminals enable many opportunities for new WPAN services WPAN/PSC Operator Networks ……. Operator Services or Internet Services WPAN devices

4 Scenario: Integration WPAN to Operator’s Network
<Sept 2010> Scenario: Integration WPAN to Operator’s Network Home Network UMTS Operator Core Network Operator Services or Internet Services Home sensor sends the information via 3G fixed terminal and service platform to mobile users, or vise versa Without authentication and authorization, malicious nodes can Inject false data into the network, misleading decision makers; FFD RFD

5 Requirements Authentication Manageability
<Sept 2010> Requirements Authentication Operator can authenticate both the cellular device and the peer devices within the PAN (directedly or indirectedly) Manageability Keep track of the status of peer devices, either to schedule attendance or to track the behavior

6 Gap Analysis What’s been done What’s not been done Manageability
<Sept 2010> What’s been done What’s not been done Authentication Can authenticate the cellular devices Confidentiality Keys available to encrypt the data between cellular devices and the mobile core network Envelope available to encapsulate encrypted data between peer devices Authentication Authenticate the peer devices Account the peer devices Confidentiality No key management No secure association protocols No group key association Manageability No manageability functionality

7 Possible Directions of WPAN Authentication
<Sept 2010> Possible Directions of WPAN Authentication Open system Admits any devices through the coordinator to access the operator network Shared key authentication Admits devices to demonstrate their knowledge of a shared secret Extensible authentication Asymmetric authentication using Public key cryptography More extensible ways based on 802.1X and EAP

8 Authentication & Secure Association
<Sept 2010> Authentication & Secure Association SGSN HLR Coordinator Peer Authentication Authentication Secure Association Protocol Authentication to the operator’s core network Secure association protocol

9 doc.: IEEE 802.15-<doc#>
<month year> doc.: IEEE <doc#> <Sept 2010> Summary Background and scenario for authentication the WPAN nodes to the operator’s network Requirements and gap analysis Possible directions for the WPAN authentication/manageability framework <author>, <company>

10 <Sept 2010> Questions? Thank You!

Download ppt "doc.: IEEE <doc#>"

Similar presentations

Ads by Google