Top Banner
© 2005, it - instituto de telecomunicações. Todos os direitos reservados. Embedding Identity in Mobile Environments Mobiarch 2007 - Kyoto, August 27 th , 2007 Alfredo Matos <[email protected]> Susana Sargento <[email protected]> Rui L. Aguiar <[email protected]>
18

Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

Jul 03, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

© 2005, it - instituto de telecomunicações. Todos os direitos reservados.

Embedding Identity in Mobile Environments

Mobiarch 2007 - Kyoto, August 27th, 2007

Alfredo Matos <[email protected]>

Susana Sargento <[email protected]>

Rui L. Aguiar <[email protected]>

Page 2: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

2 Mobiarch ’07 - Kyoto

Overview

• Motivation

• Architecture

• Identity Referral and Bindings

• Terminal and Network Support

• Detailed Operations

• Bootstrap and Handover

• Identity Based Mobility

• Privacy and Multiple Identities

• Benefits and Drawbacks

• Conclusion and Future Work

Page 3: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

3 Mobiarch ’07 - Kyoto

Motivation

• Next Generation Networks

• Complexity

• Multiple protocols and services

• Mobility

• Security

• “talks of” User-Centric Architectures

• But lack of user oriented approaches

• Identity has been….

• a second class citizen (up until now)

• but taking strong steroids by web 2.0

• and thus facing growth problems (passwords, identity theft, etc.)

THIS IS NOT ENOUGH

Page 4: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

4 Mobiarch ’07 - Kyoto

IPv6 Networks (“Internet”)

Service Pool

Administrative Domain A

Core

Router

A4CIdentity

Manager

Bandwith

Broker

File

Server

Email

Server

Multimedia

Server

VoIP

Server

Location

Server

Application

Server

Access

Router

Wimax

Access

Router

UMTS

Access

Router

WiFi

Administrative

Domain B

Core

Router

Access

Router

Wimax

Access

Router

DVB

Access

Router

WiFi

SIP

Proxy

Mobility

Anchor

NGN Identity-biased Architecture

• Several Administrative domains

• Different Access Technologies

• WiFi, UMTS, DVB

• Mobility

• MIPv6, HIP, SIP

• A4C

• Restricted and controlled environments

• Bandwidth Brokers

• Restricted QoS environments

• Identity Managers

• Operator power and user driven identity

• Services

• Multiple user oriented services: VoIP, Location, Multimedia, File, Mail...

Page 5: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

5 Mobiarch ’07 - Kyoto

Identity Referral – the Glue

• Identity Manager

• Identity Information

• User oriented policies

• Identity Namespace

• Identity Manager and different protocols

• Bringing Identity to the network level

• Implicit identity referral

• Compatibility

• ID-Pointer

• 64 bit public Identifier

• Realm – the Identity Manager Domain

• Index – information index on the Identity Manager Database

• Easily resolvable

Realm Index

0 16 64

Page 6: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

6 Mobiarch ’07 - Kyoto

Identity Bindings (I)

• Implicit

• Embedded ID-Pointer

• Explicit

• Identifier mapping to an ID-Pointer on a database

• Network Bindings

• Link Layer

• 802.21 MN_ID or PANA ID

• Network Layer

• ID-Pointer in the IP Address

• MIPv6 CoA

• Transport Layer

• ID-Pointer in the MIPv6 HoA

• Application Layer

• URI mapped to ID-Pointer

Network Prefix ID-Pointer

0 64 128

Page 7: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

7 Mobiarch ’07 - Kyoto

Identity Bindings (II)

Network Control Plane

Mobile

Node

Point of

Access

Access

Router

Home

Agent

SIP

Proxy

Service

802.21 MN_ID

Care-of Address

Home Address

ID-Pointer URL

Home Address/ID-Pointer URL

A4C Identity

Manager

Bandwidth

Broker

ID-P

oin

ter

ID-P

oin

ter

ID-P

oin

ter

ID-P

oin

ter

ID-P

oin

ter

Page 8: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

8 Mobiarch ’07 - Kyoto

Networks: Support

• Identity Oriented Network Distributed Database

• Distributed Information

• Common access methods

• ID-Pointer

• Common storage index

• ID-Pointer

• Distributed User View

• Sum of all distributed information bits

• Reachable with an ID-Pointer and the right permission

• Strong access control

Page 9: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

9 Mobiarch ’07 - Kyoto

Terminals: Support and features

•Control Plane

•New Identity Management Layer

• Identity is a control plane task

•Identity aware applications

•Legacy interfaces

•Data Plane

•Preserved

•Mobility

•New paradigm for control

•Identity Layer

• Point of decision

• Intelligence

•Mobility Protocols

• Signaling

•Common Mobility Interface

• Triggers

• APIs

Application Layer

Aware ApplicationsLegacy Applications

Legacy Interface

Identity Management System

Mobility Layer

Network Layer

Link Layer

Transport Layer

Identity Layer

MIPv6 HIP SIP

Common Mobility Interface

Page 10: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

10 Mobiarch ’07 - Kyoto

Example: Bootstrap

Mobile

Node

Access

Router A4C

L2 Association

PANA Authentication (ID-Pointer)

EAP Authentication (ID-Pointer)

EAP Authentication (HoA)

Identity

Manager

Verifiy Identity (ID-Pointer)

Home

Agent

Configure HoA (ID-Pointer)

PANA Answer (HoA)

HoA Config (ID-Pointer)

SLAAC CoA (ID-Pointer)

Bandwith

Broker

NSIS Flow Setup (Flow)

QoS Authorization (ID-Pointer, Flow)

NSIS Flow Setup (Flow)

Binding Update

Page 11: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

11 Mobiarch ’07 - Kyoto

Example: Handover

Mobile

Node

Old Access

Router

New Access

Router

Bandwidth

Broker

Handover Decision (ID-Pointer)

Reserve Resources (ID-Pointer)Handover Negotiation

Context (ID-Pointer)

L2 Association

A4CIdentity

Manager

PANA Authentication (ID-Pointer)

EAP Authentication (ID-Pointer)

PANA Authentication (HoA)

SLAAC CoA (ID-Pointer)

Verifiy Identity (ID-Pointer)

Home Agent

Binding Update

EAP Authentication (HoA)

Release Resources (ID-Pointer)

Handover Complete (ID-Pointer)

Page 12: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

12 Mobiarch ’07 - Kyoto

Results in:

Identity Based Mobility

• Consistent Approach across the network

• Addresses change

• ID-Pointer does not change

• Update ONLY mobility tables

• not everything else: triggers and referrals are consistent.

• Modularized mobility

• Control is in the identity layer

• Identifiers are embedded in the protocols and remain constant

• Pick your own protocol

• New paradigms

• Addresses don’t move, Entities do.

• Can be decoupled from the terminal

• Mobility between terminals

• Multiple identities or users in the same terminal

Page 13: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

13 Mobiarch ’07 - Kyoto

IdBM Privacy and Multiple Identities

• Identifiers raise privacy issues

• Identity related information in addressing structures

• Resolvable pointers

• Passive listeners can reach identity information

• Strong security is required

• Authentication for requesters

• Non-public user information only allowed after the authentication

• Multi-tier access control

• Cross Layer Identifiers raise linkability issues

• More actions under the same identifiers

• Higher probability of correlation

• More security required

• Per layer encryption hides upper layer identifiers

Page 14: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

14 Mobiarch ’07 - Kyoto

Benefits

• Cross-layer and cross-protocol integration• Distributed database model with consistent indexes

• Not bound by specific protocol Identifiers• Distributed meta-system

• Different addresses, same Identity• Simplification of network processes

• Simpler user profiles• Identity is not the profile

• Different information exists in different places under the same identity

• Abstraction Layer enables access• Larger information set

• Same access means

• User-centric paradigms

• Better APIs• Abstraction layer

• User-centric software

• Legacy support

Page 15: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

15 Mobiarch ’07 - Kyoto

Drawbacks

• Mandatory Identity Resolution

• Resolution of the ID-Pointer at each network element

• ID-Pointer to ID-Manager

• Reverse DNS, Distributed Hash Tables

• Minimized by caching

• Optimized through deduction (e.g. if the A4C receives a preconfigured HoA

it can safely infer the Realm by looking at the address).

• Longer setup phases are unavoidable

• But mobility can be as fast as before

• Strong Security is a requirement not an option

• If you believe in “free networks”, you have here a challenge

• Per requester Access Control

• Multi-tier access control

Page 16: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

16 Mobiarch ’07 - Kyoto

Conclusions

• Identity in the communication stack

• Both as a 6th (presentation) layer AND a vertical control layer

• Greatly simplified network processes

• Technology and protocol independent mobility

• Re-focus around the identity of the customer in all its actions

• Open path to a decoupling of mobility management (user, device, session)

from underlying technologies, smoothing network evolution and driving

optimization aspects at all levels of the OSI stack.

• Necessary infrastructure enabling a distributed linkable database

(somewhat implicit already in management systems)

• Modifications to resolution systems (to transverse these databases) and on

the protocol stack on the equipments

Page 17: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

17 Mobiarch ’07 - Kyoto

Future (hum, hum… on-going) Work

• Mapping of this architecture in specific protocol instances

• Including evolution path from current 3G networks

• Performance and scalability analysis

• Further study on mobility control common layer

• Technology independence

• Easier migration paths from current technologies and protocols

• Implementation

• Mobility-aware and Identity-aware services.

• Cross-protocol identifiers and privacy

Page 18: Embedding Identity in Mobile Environmentsconferences.sigcomm.org/sigcomm/2007/mobiarch/... · VoIP Server Location Server Application Server Access Router Wimax Access Router UMTS

18 Mobiarch ’07 - Kyoto

Thank You.

Questions ?