A Security and Trust Framework for a Wireless World: A Cross Issue ...

10 downloads 1403 Views 423KB Size Report
Budapest University Of Technology ... Wireless. World. Initiative. Cross Issue Team. Mobilife. New Radio. End to end. Reconfig- ... Hide history to protect privacy ...
A Security and Trust Framework for a Wireless World: A Cross Issue Approach to

Stewart Kowalski Ph.D Communication Security Lab IP Networks Ericsson Research Ericsson AB [email protected] 1

Outline •

”European ” Consensus Research in Telecom Security – Ambient Networks – WWI – The Cross Issue Security Team Security Matrix • Security Objectives • Security Continuum • Mapping Requirements





Trust Model –

Definition Model



Privacy Identify Bootstrapping



Actors and Trust Matrix

Conclusion/Questions 2

•”European ” Consensus Research in Telecom Security

Project Consortium • EU 6th Framework Integrated Project (the main mobile networks one) • Partners – – – – – –

9 Manufacturers 10 Operators 11 Universities 4 R&D Centres 1 SME EU member states, associated candidate countries, Non EU

• Phase I, started Jan 2004 – “Establishing the Ambient Networks Concept and its Feasibility” – 2000 person months over 2 years • Phase II - Detailed Specification, Technical Development, Performance • Phase III - Optimisation for Performance and Deployment; Market Dissemination 3

”European ” Consensus Research in Telecom Security Partners in Ambient Networks

• • • • • • • • •

• • •

• •

Ericsson AB (project co-ordinator), Sweden Alcatel SEL AG, Germany British Telecommunications plc, UK Budapest University Of Technology And Economics, Hungary Concordia University, Canada Consorzio Ferrara Ricercha, Italy Critical Software S.A., Portugal DaimlerChrysler AG, Germany DoCoMo Communications Laboratories Europe GmbH, Germany Elisa Corporation, Finland Ericsson Eurolab Deutschland GmbH, Germany Ericsson Magyarorszag Kommunikacios Renszerek K.F.T., Hungary France Telecom SA, France Fraunhofer Gesellschaft Zur Foerderung Der Angewandten Forschung e. V., Germany



• • • • • • • • • •

• •

Instituto De Engenharia De Sistemas E Computadores Do Porto, Portugal Kungliga Tekniska Högskolan, Sweden Lucent Technologies Network Systems GmbH, Germany Lucent Technologies Network Systems UK Limited, UK Motorola Japan, Japan National ICT Australia (University Of New South Wales), Australia NEC Europe ltd, UK Nokia Corporation, Finland Oy LM Ericsson AB, Finland Panasonic European Laboratories GmbH, Germany Rheinisch-Westfaelische Technische Hochschule Aachen, Germany Siemens AG, Germany Siemens AG Oesterreich, Austria

4

• • • • • • • • •

• • • • •

Siemens Mobile Communications SPA, Italy Swedish Institute Of Computer Science AB, Sweden Technical Research Centre Of Finland, Finland Technische Universitaet Berlin, Germany Telecom Italia SPA, Italy Telefonica Investigacion Y Desarrollo SA Unipersonal, Spain Telenor Communication AS, Norway TeliaSonera AB, Sweden TNO - Netherlands Organisation For Applied Scientific Research, Netherlands University Of Surrey, UK Universidad De Cantabria, Spain University College London, UK University Of Ottawa, Canada Vodafone Group Services Limited, UK

Cross Issue Team

http://www.ambient-networks.org/ Mobilife

Ambient Networks

WP7 XI-ST

End to end Reconfigurability

Wireless World Initiative

New Radio

http://www.wireless-world-initiative.org/ 5

Actors in WWI Spectrum manager Regulator Trusted 3rd Party/ Security Entity

Certification Entity Content provider

Reconfiguratio n Manager

Pilot Channel Provider Service Aggregator

Software provider

Access User/ Subscriber Network Value Added Service Equipmentprovider (VASP)

Network Operator Manufacturer

6

Access Network

User/ Subscriber

Outline •

Cross Issue Security Team



Security Matrix







Security Objectives



Security Continuum/security value chain



Mapping Requirements

Trust Model –

Definition Model



Privacy Identify Bootstrapping



Trust Matrix

Conclusion/Questions

7

Security Objectives

• • • • • •

Availability Integrity Confiedntiality Accountablity Assurance Privacy 8

Security Continuum

• • • • •

Deter Protect/Control Detect/Monitor Respond Recover Deter

Protect

Detect

Respond Recover 9

Different Mental Security Spending Models

Deter

Protect

Detect

Total Security Spending $

10

Respond Recover

Value Based Risk Analysis For Deterrence of a Stolen Handsets

Ericsson

SonyEricsson

End User

Operator X

End Abuser

1.00 1.30

1.60

3.20

1.60

1.50 1.80

2.60

4.60

1.70

1.80 2.50

3.80

7.60

4.60

11

Security Requirment Matrix Deter

Protect

Availability

ANAN-R177

Integrity

W-R130 E2RE2R-R3

Detect

ANAN-R175

ANAN-R175

ML3

Confidentiality Accountablity

ANAN-R176

Assurance Privacy

ML-1

ML-2

Respond

ML1

12

Recover

Outline •

Cross Issue Security Team



Security Matrix







Security Objectives



Security Continuum



Mapping Requirements

Trust Model –

Definition Model



Privacy Identify Bootstrapping



Trust Matrix

Conclusion/Questions

13

What is a Trust Model? – Quantitative view: • A trust computation model used by each entity to manage trusts relevant to itself

– Qualitative View: • A global view of trust relations between pairs of entities

14

Four foundations of Trust – Blind trust • Personal judgement or instinct (e.g. I trust a friend)

– Trust based on reputation • Well known brand, recommendation of others

– Trust based on Control and Punishment – Trust based on Policy Enforcement • e.g. contractual agreement for business

– We should consider all of these within the WWI

15

Aspects of Trust (1): Privacy – Privacy important as WWI infrastructure is pervasive, invisible, and recording actions of user – Trade-off between privacy and trust: Assess trustworthiness from history

Hide history to protect privacy

– Possible solution: • Use of third parties to vouch for user without revealing identity

16

Aspects of Trust (2): Identity – How can you trust someone if you don’t know who they are? – Identity frameworks e.g. digital certificates • Hierarchical PKI e.g. X.509 • Peer-to-peer e.g. PGP web of trust

– Certificates don’t say what you can do – Punishment mechanisms may not work if new identity can be created easily – Relevant work: • Cryptographically generated addresses: generate an address by computing a hash from a public key and other parameters • Helps prevent spoofing of addresses 17

Aspects of Trust (3): Bootstrapping – User wants to establish a communications channel – User needs information on trustworthiness BEFORE establishing the connection

User

Unknown Network

– Possible solutions • Some kind of “PILOT” channel

• Schemes which do not require external trust information • User has public key of trusted party. Information is signed. 18

Some WWI Trust Requirements – R.Trust1 Users should be able to choose a trusted entity for charging, privacy management, etc (e.g. trusted brand) – R.Trust 2 Dynamic trust establishment should be possible – R.Trust 3 Use of networks possible with no prior trust relationship – R.Trust 4 Network context information should contain information enabling its trustworthiness to be evaluated – R.Trust 5 Authentication via trusted third party should be possible – R.Trust 6 Anonymity of users should be supported where appropriate – R.Trust 7 Certification processes should exist so that users know whether services are approved by trusted entities – R. Trust 9 Audit and lawful interception should be possible

19

Trust Chain (Action Concepts)

• Design • Base • Present • Establish • Maintain • Recover 20

Trust Matrix 1 (Actor)

Design

Base

Piolt Channel

Present

Establish

Maintain

W-R130 E2RE2R-R3

Network Operators Services aggregator

W-R130 E2RE2R-R3

ANAN-R175

W-R130 E2RE2R-R3

Access Network VASP

MLML-1

Manufactor

21

Recover

Actor and Trust Matrix 1 Spectrum manager Regulator Trusted 3rd Party/ Security Entity

Content provider

Reconfiguratio n Manager

(Actor)

Software provider Design

Bas e

Piolt Channel

User/ Subscriber

Network Operators Services aggregator Access Network VASP

Certification Entity

Presen t

Establis h

Maintain

W -R130 E2RE2R-R3

W -R130 E2RE2R-R3

ANAN-R175 W -R130 E2RE2R-R3

MLML-1

Manufactor

22

Recover

User/ Subscriber

Conclusion • By working with a framework with fixed objectives and highlevel abstract security and trust functions we are hoping to be able to reach consensus and ”anchor” security requirements into the next generation mobile networks

23

Suggest Documents