SLIDE 32 IETF IETF-
67 INT Area 32 32
Security Models Security Models
Various security models in use in different networks Various security models in use in different networks Security Model Considerations Security Model Considerations
– – Presence of infrastructure entity Presence of infrastructure entity
E.g., AAA, PKI E.g., AAA, PKI
– – Need for infrastructure Need for infrastructure-
less security
E.g., CGA, self E.g., CGA, self-
signed certs certs
– – Use of existing security protocols Use of existing security protocols
E.g., IPsec, IKEv2, EAP E.g., IPsec, IKEv2, EAP
– – End End-
to-
end vs. hop-
by-
hop security
E.g., TLS, IPsec E.g., TLS, IPsec
Popular security models Popular security models
– – AAA AAA-
- based authentication/authorization
based authentication/authorization – – Use of EAP for authentication Use of EAP for authentication – – Use of IPsec for channel security and address authorization Use of IPsec for channel security and address authorization – – Use of CGAs for infrastructure Use of CGAs for infrastructure-
less SA creation
Threat analysis and security requirements conformance are vital Threat analysis and security requirements conformance are vital