Integrated Security with Access Network Use Case
draft-qi-i2nsf-access-network-usecase-00
The information below is for an old version of the document.
| Document | Type | Active Internet-Draft (individual) | |
|---|---|---|---|
| Authors | Minpeng Qi , Xiaojun Zhuang | ||
| Last updated | 2014-10-27 | ||
| Stream | (None) | ||
| Formats | plain text htmlized pdfized bibtex | ||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | I-D Exists | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
draft-qi-i2nsf-access-network-usecase-00
Internet Engineering Task Force M. Qi
Internet-Draft X. Zhuang
Intended status: Informational China Mobile
Expires: April 27, 2015 October 24, 2014
Integrated Security with Access Network Use Case
draft-qi-i2nsf-access-network-usecase-00
Abstract
In traditional telecommunication system, operators usually provide
general and limited security protection service for users during
access (e.g. AKA in 3G/4G network). Now, with the development of
network virtualization technology, the physical network device is
became a network function software which is running on virtual
machine and the network functions can be flexible and elastic. So
operators can provide more flexible security function to users
through network function. In order to provide more flexible security
function, an interface between operator's network and user should be
needed. The interface will be used to request/negotiate/allocate/
operate (Virtual) Network Security Functions from operator's network.
This draft describes use cases for using the interface in operator's
network environment.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 27, 2015.
Copyright Notice
Copyright (c) 2014 IETF Trust and the persons identified as the
document authors. All rights reserved.
Qi & Zhuang Expires April 27, 2015 [Page 1]
Internet-Draft Access Network Use Case October 2014
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Conventions used in this document . . . . . . . . . . . . . . 2
3. Interface about sending security configuration
information from network to UE . . . . . . . . . . . . . . . 3
4. Interface about optional security function negotiation
between Network and UE . . . . . . . . . . . . . . . . . 4
5. UE proposed security request to the network . . . . . . . . . 4
6. The Benefits . . . . . . . . . . . . . . . . . . . . . . . . 5
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 5
8. Informative References . . . . . . . . . . . . . . . . . . . 5
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 5
1. Introduction
In traditional telecommunication system, operators will provide
security protection function for users when they request to access
the network, such as authentication, encryption and integrity
protection function, etc. However, considering efficiency and costs
of the network deployment, operators usually provide general and
limited security protection service for users during access(e.g. AKA
in 3G/4G network).Now, with the development of network virtualization
technology, security function virtualization can help operators to
provide flexible and reliable security protection service for users
access.
2. Conventions used in this document
The section clarifies the intended meaning of specific terms used
within this document.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Qi & Zhuang Expires April 27, 2015 [Page 2]
Internet-Draft Access Network Use Case October 2014
In this document, these words will appear with that interpretation
only when in ALL CAPS. Lower case uses of these words are not to be
interpreted as carrying [RFC2119] significance.
3. Interface about sending security configuration information from
network to UE
In the traditional telecommunication network, when a user requests to
access network, operators will provide security service during access
procedure to ensure that users can securely connect to the
telecommunications network. This security solution is not provided
by the access equipment such as CPE, but by the operator's core
network equipment (e.g. MME). As operators provide such security
solutions by using physical network equipment, which would cause
limitation for security service, operators should provide the same
security function to all users, such as unified authentication
mechanism (usually pre-shared key based authentication), same
encryption capabilities and so on.
But under virtualized environment, the physical network device is as
network function software which is running on virtual machine and the
network functions can be flexible and elastic. So operators can
provide more flexible security function to users through virtualized
network function.
For example, it can provide different authentication function for
different users. Authentication mechanism can be provided based on
pre-shared key or based on certificate. What is more, it can also
provide flexible encryption function. Operators can provide
encryption by usingnot only encryption algorithms, but also keys with
different lengths.
An concrete example is, Internet of Things(IoT)business. When a
simple IoT services such as street lighting controlling need connect
to the network, it only needs to implement simple network
authentication with users, so it can choose one-way pre-shared key
based access authentication through the interface like GSM
authentication. While for another IoT business, such as home remote
monitoring, it needs to utilize mutual authentication with pre-shared
key between network and users. As a result UMTS access
authentication would be chosen and applied through the interface.
For some other kind of more sensitive IoT business, such as automatic
selling machine, it would need certificate based authentication. As
a result, operators need to inform the UE of the configuration
information, and help UE to make a decision.
Qi & Zhuang Expires April 27, 2015 [Page 3]
Internet-Draft Access Network Use Case October 2014
So an interface to sending such configuration is needed. The list of
allowed security functions and prohibited security functions should
be both passed in the interface.
4. Interface about optional security function negotiation between
Network and UE
Under current network access environment, when users want to access
to the network, operators can only provide necessarily basic security
functions, which avoids impact to all of users by using advanced
security functions designed for a specific user. However, in a
virtualized network, operators can customize more flexible security
functions for users.
For example, if a user does not want to receive spam, operator can
provide countermeasures like key words filtering function to such
user; if a user want to keep communication data with high security,
operator can provide enhanced services based on IDS / IPS. And if
users want to have no security requirement to speed up, there is no
need for operator to provide any security functions.
In this case, an interface is needed for operators. It can inform
the UE about what optional security functions they could provide.
5. UE proposed security request to the network
Before the virtualization of the network, UE can only be provided the
fixed security services provided by operators when access to the
network, which is mentioned as above. In a virtualized environment,
operators has ability to provide more service. Therefore, UEs get
new chance to send security services request based on its specific
requirement to operators. And operators can fulfill users
requirement by increasing, updating the corresponding network
security functions.
In this case, a new interface is needed. It can be used by users to
inform specific network element, like operator-specific gateway.
Operators can convert the user's functional requirements into the
corresponding security functions settings, then provide security
access services in accordance with the required security function.
There are some kinds of fulfillment of such interface. For example,
users don't want to receive abnormal traffic, like advertisement,
worms, IP detecting flows, etc. Operators can provide IP address
filtering capabilities according to the IP address defined
requirements which have been negotiated with users. Alternatively,
according to a list of pre-defined options, users can send the
functions and configuration requirements in a specific format to the
Qi & Zhuang Expires April 27, 2015 [Page 4]
Internet-Draft Access Network Use Case October 2014
operator's gateway, and operator provide services directly according
to enabling security functions from related requirements. A concrete
example is, a user hoping to filter traffic in tcp 21 port sent "tcp
21 port block on firewall " command directly to the operator gateway,
then operator send the same command directly to the virtual firewall
corresponding to users ,after testing the legality of the message.
6. The Benefits
It will bring benefits by defining such interface. Operator could
send specific security configurations and optional security service
list to user equipments. UE could send security policy/function
request to operators. Through such interface, operator could provide
more flexible and tailored security functions for specific user,
which would lead more efficient and secure protection to each end
user.
7. IANA Considerations
TBD
8. Informative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
Authors' Addresses
Minpeng Qi
China Mobile
32 Xuanwumenxi Ave,Xicheng District
Beijing 100053
China
Email: qiminpeng@chinamobile.com
Xiaojun Zhuang
China Mobile
32 Xuanwumenxi Ave, Xicheng District
Beijing 100053
China
Email: zhuangxiaojun@chinamobile.com
Qi & Zhuang Expires April 27, 2015 [Page 5]