Security Identifies some broad security issues to be considered How to analyse the mixed L2/L3 case What it means to secure the discovery process Baseline assumption: MIH support will provide a channel security service and make authenticated peer identities available to MIH services Assumption of re-using standard security protocols Protocol selection depends on deployment issues MIH security analysis can only be done on the completed solution (including the MIH service itself) Note: the major work that will have to be done (in mipshop) is to define the rules/policies for invoking the channel security protocol E.g. for TLS: what sorts of names should be used in TLS certificates What sort of attributes one should demand/expect in those certificates |