1 / 5

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Suite Compromise Date Submitted: 12 March, 2002 Source: Gregg Rasor Company: Motorola Address: 1500 Gateway Blvd., Boynton Beach, Florida 33426

matt
Download Presentation

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Security Suite Compromise Date Submitted: 12 March,2002 Source: Gregg Rasor Company: Motorola Address: 1500 Gateway Blvd., Boynton Beach, Florida 33426 Voice: 561-739-2952, FAX: 561-739-3715, E-Mail: gregg.rasor@motorola.com Re: P802.15.3 Security Suite Selection Abstract: A compromise solution is proposed that implements flexible, scalable security in the 802.15.3 WPAN. Purpose: Detail a flexible, scalable security solution for the 802.15.3 WPAN. Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15.

  2. Security Suite Compromise Gregg Rasor, Distinguished Member of the Technical Staff Motorola Labs

  3. Scalable, Open Security Model Mode Security Effect 0 No security (default) • Access list (no cryptographic security) • Public key cryptosystem security (ANSI X.9.63-2001), no certificates • Public key cryptosystem security (ANSI X9.63-2001), certificates required

  4. Commitments for Completion • Letters of commitment by Walt Davis and Scott Vanstone that the completed draft will be delivered to the Technical Editor by 5 PM April 5, 2002. • Define with precision the elliptic curves necessary for implementation. FIPS Standard. • Must have a completely specified ECC version of 02/231r0.

  5. Certificate Application • In order to support interoperability and scalability, the MAC and MLMEs in all devices shall support the use of certificates, however, authentication of devices using certificates shall not be required, and the type of certificate used shall be selectable by the security suite. • This allows selection of either a manual, challenge and response authentication mode, or an automatic, certificate based authentication mode. Since every device must support these modes, and further, since negotiation shall be required, interoperability is insured.s

More Related