Skip to main content

IAB Workshop on Managing Radio Networks in an Encrypted World (marnewws)

Team Name IAB Workshop on Managing Radio Networks in an Encrypted World
Acronym marnewws
State Active
Additional resources IETF Policy on Wiretapping, IETF RFC 2804, May 2000
Network Management of Encrypted Traffic, GSMA, Feb 2015
Pervasive Monitoring is an Attack, IETF RFC 7258/BCP188, May 2014
RFC 8462: Report from the IAB Workshop on Managing Radio Networks in an Encrypted World (MaRNEW
Securing the Web, W3C TAG Finding, January 2015
Statement on Internet Confidentiality, IAB, Nov 2014

Group description

Workshop Details

  • Title: Managing Radio Networks in an Encrypted World (MaRNEW)
  • Date: Thursday 24th – Friday 25th September, 2015
  • Place: AT&T Atlanta, Atlanta, GA (see “Venue” below for more details)
  • Time: 9am – 6pm both days

Workshop Bio

Mobile networks have a set of requirements and properties which places a large emphasis on sophisticated bandwidth optimization. Encryption is increasing on the internet which is a good thing for consumer and business privacy and security. Many existing mobile bandwidth optimization solutions primarily operate on non-encrypted communications; this can lead to performance issues being amplified on mobile networks. Encryption on networks will continue to increase; and with this understanding the workshop aims to understand how we can solve the issues of bandwidth optimization and performance on radio networks in this encrypted world.

Understanding “Bandwidth Optimization”

For the purposes of this workshop, bandwidth optimization encompasses a variety of technical topics related to traffic engineering, prioritisation, optimisation, efficiency enhancements, as well as user-related topics such as specific subscription or billing models. These can include:

  • Caching
  • Prioritisation of interactive traffic over background traffic,
  • Per-user bandwidth limits
  • Business-related topics such as content delivery arrangements with specific content providers.

Many of these functions can continue as they’re performed today, even with more encryption. Others traditionally inspect parts of the communication that are encrypted, and will have to be done differently in a more-encrypted Internet.

Finally, while not strictly speaking traffic management, some networks employ policy-based filtering (e.g., requested parental controls) and all networks support some form of legal interception functionality per applicable laws.


For this workshop we would like to consider topics that speak to these questions, including the following:

  • Understanding the bandwidth optimization use cases particular to radio networks
  • Understanding existing approaches and how these do not work with encrypted traffic
  • Understanding reasons why the Internet has not standardised support for LI and why mobile networks have
  • Determining how to match traffic types with bandwidth optimization methods
  • Discussing minimal information to be shared to manage networks but ensure user security and privacy
  • Developing new bandwidth optimization techniques and protocols within these new constraints
  • Discussing the appropriate network layer(s) for each management function
  • Cooperative methods of bandwidth optimization and issues associated with these

The outcome of the workshop will be architectural and engineering guidance on future work in the area, published as an IAB workshop report, based on discussion of proposed approaches. We will also explore possible areas for standardization, e.g. new protocols that can aid bandwidth optimization whilst ensuring user security inline with new work in the transport layer.

Position Papers

See Materials tab of this page.

  • Mohammed Dadas, Emile Stephan, Mathilde Cayla, Iuniana Oprescu, Cooperation Framework between Application layer and Lower Layers
  • Julien Maisonneuve, Thomas Fossati and Vijay Gurbani, The security pendulum and the network
  • Martin Peylo, Position Paper “Enabling Secure QoE Measures for Internet Applications over Radio Networks is a MUST”
  • Vijay Devarapalli, The bandwidth balancing act: Managing QoE as encrypted services change the traffic optimization game
  • Humberto La Roche, Use Cases for Communicating End-Points in Mobile Network Middle-Boxes
  • Richard Barnes and Patrick McManus, User Consent and Security as a Public Good
  • Iuniana Oprescu, Jon Peterson and Natasha Rooney, A Framework for Consent and Permissions in Mediating TLS
  • Jari Arkko and Göran Eriksson, Characteristics of Traffic Type Changes and Their Architectural Implications
  • Szilveszter Nadas and Attila Mihaly, Traffic Management for Encrypted Traffic focusing on Cellular Networks
  • Gianpaolo Scassellati, Vimpelcom Position Paper for MaRNEW Meeting
  • Mirja Kuehlewind, Dirk Kutscher and Brian Trammell, Enabling Traffic Management without DPI
  • Andreas Terzis and Chris Bentzel, Sharing network state with application endpoints
  • Marcus Ihlar, Robert Skog and Salvatore Loreto, The needed existence of Performance Enhancing Proxies in an Encrypted World
  • John Mattsson, Network Operation in an All-Encrypted World
  • Dirk Kutscher, Giovanna Carofiglio, Luca Muscariello and Paul Polakos, Maintaining Efficiency and Privacy in Mobile Networks through Information-Centric Networking
  • Chunshan Xiong and Milan Patel, The effect of encrypted traffic on the QoS mechanisms in cellular networks
  • Thomas Anderson, Peter Bosch and Alessandro Duminuco, Bandwidth Control and Regulation in Mobile Networks via SDN/NFV-Based Platforms
  • Karen O’Donoghue and Phil Roberts, Barriers to Deployment: Probing the Potential Differences in Developed and Developing Infrastructure
  • Wendy Seltzer, Performance, Security, and Privacy Considerations for the Mobile Web
  • Jianjie You, Hanyu Wei and Huaru Yang, Use Case Analysis and Potential Bandwidth Optimization Methods for Encrypted Traffic
  • Mangesh Kasbekar and Vinay Kanitkar, CDNs, Network Services and Encrypted Traffic
  • Claude Rocray, Mark Santelli and Yves Hupe, Providing Optimization of Encrypted HTTP Traffic
  • Zubair Shafiq, Tracking Mobile Video QoE in the Encrypted Internet
  • Kevin Smith, Encryption and government regulation: what happens now?

Workshop Slides

See Materials tab of this page.

Workshop sessions were run as panels with minimal slides. These slides were either presented or just discussed throughout the sessions.

  • MarNEW Main Slide Deck, Natasha Rooney
  • Scene Setting, Stephen Farrell
  • GSMA Process Background, Natasha Rooney
  • Security, Privacy, and the Effects of Ubiquitous Encryption, Kathleen Moriarty
  • Concept for Cooperative Traffic Management, Szilveszter Nadas, Attila Mihaly
  • Security, Privacy, and Performance Considerations for the Mobile Web, Wendy Seltzer
  • Mobile Use Cases for Encrypted Traffic, Chunshan Xiong
  • Enabling Traffic Management without DPI, Mirja Kuhlewind, Dirk Kutscher, Brian Trammell
  • Optimizing TCP for Radio, Marcus Ihlar
  • Transport Layer Issues, Optimizations, and Solutions, Spencer Dawkins


Thur 24 September 2015

  • 09:00 – 09:20 Introduction: welcome, introductions and announcements
  • 09:20 – 10:00 Scene Setting: defining goals, layouts and key in and out of cope topics.
  • 10:00 – 11:15 Session 1: Encryption Deployment Considerations
  • 11:15 – 11:45 Coffee Break
  • 11:45 – 13:00 Session 2: Trust Models and User Choice (Privacy)
  • 13:00 – 14:00 Lunch
  • 14:00 – 15:45 Session 3: Sending Data Up for Network Management Benefits
  • 15:45 – 16:15 Break
  • 16:15 – 17:30 Session 4: Sending Data Down for Network Management Benefits
  • 17:30 – 18:00 Day 1 Wrap Up
  • 18:30 Social Dinner, SunDial Restaurant, 210 Peachtree St NW, Atlanta, GA 30303

Fri 25 September 2015

  • 09:00 – 10:30 Session 5: Application Layer Optimisation, Caching and CDNs
  • 10:30 – 11:00 Break
  • 11:00 – 12:30 Session 6: Transport Layer: Issues, Optimisation and Solutions
  • 12:30 – 13:30 Lunch
  • 13:30 – 14:30 Session 7: Technical Analysis and Response to Potential Regulatory Reaction
  • 14:30 – 15:30 Parking Lot: time to review open questions from the last two days
  • 15:30 – 16:00 Break
  • 16:00 – 17:00 Roundup


  • Rich Salz, Akamai
  • Aaron Falk, Akamai
  • Vinay Kanitkar, Akamai
  • Julien Maisonneuve, Alcatel Lucent
  • Dan Druta, AT&T
  • Humberto La Roche, Cisco
  • Thomas Anderson, Cisco
  • Paul Polakos, Cisco
  • Marcus Ihlar, Ericsson
  • Szilveszter Nadas, Ericsson
  • John Mattsson, Ericsson
  • Salvatore Loreto, Ericsson
  • Blake Matheny, Facebook
  • Andreas Terzis, Google
  • Jana Iyengar, Google
  • Natasha Rooney, GSMA
  • Istvan Lajtos, GSMA
  • Emma Wood, GSMA
  • Jianjie You, Huawei
  • Chunshan Xiong, Huawei
  • Russ Housley, IAB
  • Mary Barnes, IAB
  • Joe Hildebrand, IAB / Cisco
  • Ted Hardie, IAB / Google
  • Robert Sparks, IAB / Oracle
  • Spencer Dawkins, IETF AD
  • Benoit Claise, IETF AD / Cisco
  • Kathleen Moriarty, IETF AD / EMC
  • Barry Leiba, IETF AD / Huawei
  • Ben Campbell, IETF AD / Oracle
  • Stephen Farrell, IETF AD / Trinity College Dublin
  • Jari Arkko, IETF Chair / Ericsson
  • Karen O’Donoghue, ISOC
  • Phil Roberts, ISOC
  • Olaf Kolkman, ISOC
  • Christian Huitema, Microsoft
  • Patrick McManus, Mozilla
  • Mark Watson, Netflix
  • Martin Peylo, Nokia
  • Mohammed Dadas, Orange
  • Diego Lopez, Telefonica
  • Matteo Varvello, Telefonica
  • Zubair Shafiq, The University of Iowa
  • Vijay Devarapalli, Vasona Networks
  • Sanjay Mishra, Verizon
  • Gianpaolo Scassellati, Vimplecom
  • Kevin Smith, Vodafone
  • Wendy Seltzer, W3C
  • Dirk Kutscher, NEC Europe Network Laboratories

Technical Program Committee

  • Joe Hildebrand, IAB / Cisco, USA
  • Stephen Farrell, IETF AD / Trinity College Dublin, Ireland
  • Jari Arkko, IETF Chair / Ericsson, Finland
  • Natasha Rooney, GSMA, UK
  • Spencer Dawkins, IETF AD / Huawei, USA
  • Kathleen Moriarty, IETF AD / EMC, USA
  • Barry Leiba, IETF AD / Huawei, USA
  • Alia Atlas, IETF AD / Juniper Networks, USA
  • Ben Campbell, IETF AD / Oracle, USA
  • Karen O’Donoghue, ISOC, USA
  • Phil Roberts, ISOC, USA
  • Kevin Smith, Vodafone, UK
  • Sanjay Mishra, Verizon, USA
  • Istvan Lajtos, GSMA, UK
  • Salvatore Loreto, Ericsson, Finland
  • Diego Lopez, Telefonica, Spain
  • Dan Druta, AT&T, USA
  • Brian Trammell, ETH Zurich, Switzerland

Sponsored by the Internet Architecture Board, ISOC, AT&T and GSM Association.