mario hoffmann (chair) [email protected] fraunhofer institute sit, germany wang, hu...
TRANSCRIPT
Mario Hoffmann (Chair)[email protected] Institute SIT, Germany
Wang, Hu (Vice Chair)[email protected] Huawei Technologies, China
Special Interest Group 2 “Security & Trust“
General Information
WWRF · SIG2 · General Information page 2
SIG2: Introduction – Vision & Mission
• MISSION
- SIG 2 focusses on identifying and promoting research areas that strive to
understand and resolve the needs of users, operators, service providers and
other players for secure and trustworthy wireless systems
- Provide White Paper material to share these ideas with the Wireless World
Community
• VISION
Security and privacy are key enablers of the Wireless World.
Whereas context awareness and ambient intelligence will considerably
drive the development of mobile devices, services, and networks, holistic
and multilateral security approaches will be the essential ingredient for
their successful and sustainable introduction to end users.
WWRF · SIG2 · General Information page 3
SIG2: Introduction – A horizontal action
SIG3: SIG3: Self-Organizationin Wireless World Systems
Vision Committee
SIG1:SIG1:Spectrum Topics
SIG2: SIG2: Security & Trust
WG
1:
WG
1: H
um
an
Per
spec
tive
an
d
Ser
vice
Co
nce
pts
WG
2:
WG
2: S
ervi
ce
Arc
hit
ectu
re
WG
3:
WG
3: C
oo
per
ativ
e &
A
d-H
oc
Net
wo
rks
WG
4:
WG
4: N
ew A
ir
Inte
rfac
es, R
elay
-bas
ed
Sys
tem
s &
Sm
art
An
ten
nas
WG
5:
WG
5: S
ho
rt-r
ang
e W
irel
ess
Co
mm
un
icat
ion
S
yste
ms
WG
6:
WG
6: R
eco
nfi
gu
rab
ility
Management Team
General Assembly
Chair
Secretariat
Steering Board
... to
be
refin
ed
becau
se o
f re-
stru
cturin
g
WWRF · SIG2 · General Information page 4
SIG2: Layered approach to identify security implications
Mobile andWireless Networks
Smart Tags, RFID,Sensors, NFC
WLAN, ZigBee,Bluetooth, UWB
2,5G -> 4G,WiMAX, D{V,A}B
All IP / Mobile IP / IPv6
Service EnablingTechnologies
IdentityManagment
SeamlessService Usage
ContextAwareness
Web Services
Mobile Scenariosand Applications
Tourism,Mobile Office
Emergency,Healthcare
Automotive,Telematics
Mobile Devices
Operating Systems Identification User InterfacesDevice EnablingTechnologies
Mobile Users
(Based on the reference model)
WWRF · SIG2 · General Information page 5
SIG2: 1. White Paper “The Big Picture“
6 major topics to be introduced
- Risk Assessment
- Utilisation and User Perception
- Trust
- Privacy
- Identity Managment• Security for Accounting and Charging (A4C), Christos, Seppo
- Malicious mobile Code
WWRF · SIG2 · General Information page 6
SIG2: White Paper Roadmap
2003 20052004
NY Beijing Oslo Toronto
User-centric Security?User-centric Security?
““The Big Picture”The Big Picture”
1. Security & Trust – The Big Picture:Basic Challenges and Threats across all Working Groups
2. Specific topics are going to be defined for “San Diego“-Meeting
Identity Management?Identity Management?
Malicious Mobile Code?Malicious Mobile Code?
Jeju San Diego Paris