1 / 11

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Support in Heterogeneous Mesh] Date Submitted: [29 May, 2004] Source: [ISHIKAWA Chiaki and OKUMA Yasuyuki] Company [YRP Ubiquitous Networking Laboratory]

anja
Download Presentation

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security Support in Heterogeneous Mesh] Date Submitted: [29 May, 2004] Source: [ISHIKAWA Chiaki and OKUMA Yasuyuki] Company [YRP Ubiquitous Networking Laboratory] Address [2-20-1 Nishigotanda, Shinagawa, Tokyo, 141-0031, Japan] Voice:[+81-3-5437-2270], FAX: [+81-3-5437-2271], E-Mail:[ishikawa@ubin.jp, kuma@ubin.jp] Re: [ n/a ] Abstract: [Supporting multiple security profile is essential for heterogeneous mesh management (i.e., mixed devices. We explain, eTRON, PKI-based secure architecture, and the use of implemented eTRON chip in usch mesh network management and give observation.] Purpose: [To raise issues to be discussed in 802.15.5 (mesh) standardization. ] Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15.

  2. ISHIKAWA, Chiaki OKUMA, Yasuyuki YRP Ubiquitous Networking Laboratory Security Support in Heterogeneous Mesh

  3. Mesh Network • Homogeneous Network • devices with the same profile • Heterogeneous Network • devices with different profiles. • The latter will be the majority in ad-hoc networking (in our view).

  4. Heterogeneous Profiles • Impact on self-organization. • We want to use optimal connection in terms of the security use (and other use for that matter). • Quick Reconfiguration may be impacted. • (Figure: heterogeneous mesh.)

  5. Importance of the Security in Mesh. • Security is important! • It is not too much to stress this point many times over. • It is so even in the case of mesh network. • Make no mistake about it. An advertising kiosk in a public place needs security, too! (note page 92, [2]), • Taking advantage of the best security feature of each node is important.

  6. eTRON Architecture • eTRON stands for entity-TRON. [1] • PKI-based security architecture. • Support cryptographic algorithms in a flexible manner: algorithm-agnostic framework. • (Figure to be added.: eTRON )

  7. Application of eTRON IC chip in mesh environment. • Ubiquitous Communicator (UC) Terminal. • A hand-held device with communication functions for UWB ad-hoc networking (and bluetooth, WCDMA, etc..) • eTRON + UC terminal => an ideal powerful fully-functional device for multi-hop network environment (we offer end-to-end authentication.)

  8. eTRON + UC terminal in mesh • (Figure to be added.) • eTRON chip + UC terminal can • be used for key distribution. • Establish connection and act as coordinator by choosing best security profile available. (eTRON chip and UC terminal can offer all the profiles of 4b.)

  9. Issues • Desirable to have MAC-level profile transfer (read) between devices. • Necessary for quick self &secure configuration.

  10. References. • [1] Ken Sakamura, Noboru Koshizuka, The eTRON Wide-Area Distributed-System Architecture for E-Commerce, IEEE MICRO, Vol. 21, No. 6, Dec. 2001, pp. 7-12. • [2] Jose A. Gutierrez, et al., Low-Rate Wireless Personal Area Networks ... Enabling Wireless Sensors with IEEE 802.1.5.4 • [3] Ken Sakamura, The TRON Intelligent House, IEEE MICRO, Vol. 10, No.2, Apr. 1990, pp.6-7. • http://www.ubin.jp • http://www.uidcenter.org

More Related