Could I help you?
New Reduced price! View larger

IEEE P802.1AEdk

M00004139

New product

IEEE P802.1AEdk IEEE Approved Draft Standard for Local and metropolitan area networks-Media Access Control (MAC) Security Amendment 4: MAC Privacy protection

standard by IEEE, 07/28/2023

More details

In stock

$70.52

-57%

$164.00

More info

Full Description

Scope

This amendment specifies privacy enhancements that complement existing IEEE Std 802.1AE MAC Security capabilities, and reduce the ability of external observers to correlate user data frames, their sizes, transmission timing and transmission frequency with users identities and activities. It specifies an encapsulation format that allows one or more user data frames and padding octets to be carried within the confidentiality protected data of consolidating frames, hiding the users MAC addresses and original frame sizes. The transmitter can balance the privacy improvement against the loss of efficiency and delay by controlling the sizes of consolidating frames and when they are transmitted. YANG configuration and operational state models are defined both for the existing functionality of IEEE Std 802.1AE and for the functionality to be added by this project. An SNMP MIB will be defined for the added functionality. This amendment also describes privacy considerations for the use, design, and deployment of bridged networks. This project includes technical and editorial corrections to existing IEEE Std 802.1AE functionality.

Abstract

Amendment Standard - Active - Draft.This amendment specifies a MAC Privacy protection encapsulating protocol and its use in conjunction with the MAC Security protocol (MACsec) to hide the source and destination MAC addresses of user data frames, and to reduce any correlation between observable frame sizes and transmission timing. This helps to protect user and application identities and to hide the purpose and content of communications. Management of MACsec and privacy protection is supported by YANG models and SNMP MIBs. Privacy considerations for bridged networks are reviewed.