Hvad er 4G mobilkommunikation..? Lektor Peter Koch Institut for Elektroniske Systemer Aalborg Universitet pk@kom.aau.dk 9635 8696
Diskussions-emner... Tele-infrastrukturen og dens muligheder Trådløs sikkerhed i 4G systemer Andre interessante emner...???
4G The Global Communication Village Lag 1 Global satellit-kommunikation, High-Altitude Platform Systems (HAPS) Lag 2 Global celle-baseret kommunikation Lag 3 Global trådløs LAN Lag 4 Global trådløs PAN 1 bps 1 Gbps Lag 5 Global trådløs BAN The Global Communication Village repræsenteret via 5 globale kommunikations-lag, som tilsammen giver mulighed for trådløs adgang til elektroniske services, hvor som helst og når som helst.
4G Tele-infrastruktur Billing SIP Proxy Signalling VHE WAP Accounting Server Gateway IS P Internet Satellite FES IP Core Network Context-aware information Centre Broadcast Networks (DAB, DVB-T) UMTS UWB/ BT IP-based micro-mobility GSM / GPRS Wireless LANs
4G Adaptiv Global Netværk Det globale personlige kommunikationsnetværk Home network Remote personal devices Local foreign devices Smart building Interconnecting structure (Internet, UMTS, WLAN, Ad Hoc) Corporate network Vehicular area network Core PAN PAN Remote foreign devices
4G brugerens hverdag Next generation systems will support different types of terminals in terms of display size, energy consumption, portability, weight, complexity, etc. One option is to exploit Terminal Heterogeneity! SCREEN SIZE SIZE/WEIGHT/PORTABILITY PERFORMANCE BANDWIDTH REQUIREMENTS NETWORKS SUPPORTED
Diskussionsoplæg #1 Muligheder/begrænsninger i 4G teleinfrastrukturen...?? Er brugeren for meget/lidt i fokus...?? Hvordan optimeres det forretningsmæssige aspekt...?? Indenfor hvilke services/applikationer kan/bør Danmark gøre sig specielt gældende...?? På hvilket niveau kan det forventes at danske virksomheder vil deltage i udviklingen af 4G (platform-design, terminaler, servicedesign og udbud...)...??
Sikkerhed i trådløse systemer Cel l u l a r Net w o r k Mall Netw ork Friend s PAN Store Netw ork Electr o n ic billboard Sun Warm Co r e PAN Friend s PAN Sp o u se s PAN Ho me Net w or k Remote personal sensor Identification sensor Internet Fr ien d s PAN Opera server Source: MAGNET Smart Shopping Use Case
Hospital-scenariet Home Network Home Agent AN Recovering patient at home Private Network AN Internet AN Patient Records Content server - entertainment - insurance company -etc. Doctor s PAN Patient s PAN Patient s PAN Hospital Network Patient moves home Hospital Services AN - Active Node (Router + Server)
Alt er et mål for angreb Routers are targets Switches are targets Hosts are targets Networks are targets Applications are targets Information is a target Management tools are targets
Sikkerhed for alle hvor som helst og når som helst
Nye krav til sikkerhed... PAST Reactive Point Products Product Support Services NEEDED NOW Automated, Proactive Integrated Multiple Layers Advanced Design/Deployment Services
Typisk knude i sensor netværk Sensor node Non Volatile Memory Antenna RF Front End Digital Processing Energy Management Sensor/actuators interface ADC / DAC Miocro-sensors Security Management of the node Micro power sources Miocro-actuators
Hvor gør det specielt ondt mht. sikkerheden...?? The memory size is very limited. This constraint reduces the capability to handle tables, buffer, long security-related information (e.g. keys). The battery size must cope with the long life requirement. Moreover, big batteries cannot be used, because of the heterogeneous devices. These two factors imply that energy consuming operation must be limited. Specially, the overhead required by security functions must be reduced as far as possible. The embedded processor has reduced capabilities. This implies that heavy security functions need long time to be executed, which could result in unacceptable latency. Further, processing functions result in battery consumption, which is to keep under strict control.
Adaptive Security Architecture Low Adaptive networks High Security Level
Low level In networks for e.g., personal entertainment no sensitive data are exchanged attacks are highly unlikely, thus no or little encryption needed
Medium level 1. Sensor networks in the home environment 2. Wireless PC peripherals (cameras, mobile phones, etc.) 3. Larger sensor networks few nodes and simple topology many nodes but unknown topology Exchanged data are not necessarily sensitive, but attacks are likely Computationally light encryption mechanism
High Level 1. Medical applications 2. Industrial applications (e.g., nuclear plant) 3. Financial applications (e.g., credit cards) Security has a fundamental role Full encryption mechanism needed
Security Level Manager... A sensor network/pan/ban must adapt itself to the security requirements of heterogeneous devices and services This task can be fulfilled by a SECURITY MANAGER Application SDB LLC Security Manager DDB MAC Physical SDB: Service Database contains information about the security requirement of a set of supported services, DDB: Device Database contains information about the devices which aim at using the services provided by the network.
Diskussionsoplæg #2 Lyder det fornuftigt med en adaptiv (contextaware) sikkerheds-arkitektur...?? Skal brugeren ha indflydelse på valget af sikkerhedsniveau hvorfor/hvorfor ikke...?? Hvor går din grænse mellem sikkerhed og beregningsmæssigt overhead...??
Diskussionsoplæg #3 Hvilke parametre er speciel vigtige ved design af 4G terminaler...?? 1. Fysisk størrelse 2. Batteri-levetid 3. Lyd-, billed- og data-kvalitet 4. Brugervenlighed/interface 5. Multi-funktionalitet 6. Sikkerhed 7. Andet... Er 4G realisationen af Big Brother...?? Hvordan vil 4G påvirke din hverdag...??