Doc.: IEEE 802.11-09/1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 1 Toward Mobile IEEE802.11 (a.k.a. IEEE802.11 for High Speed.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0032r1 Submission January 2007 Donghee Shim et al, LG Electronics, Inc.Slide 1 Comments resolutions: Emergency call support in 11u.
Advertisements

Doc.: IEEE /0001r0 Submission Jan 2006 Bin Wang, ZTE CorporationSlide 1 ESS Load Balancing Notice: This document has been prepared to assist IEEE.
Doc.: IEEE /0508r0 Submission May 2007 Matthew Gast, Trapeze NetworksSlide 1 EAP Method Requirements for Emergency Services Notice: This document.
Doc.: IEEE /0256r0 Submission February 2007 A. Centonza, D. StephensonSlide 1 Limitations on the Use of EBR Notice: This document has been prepared.
Doc.: IEEE / wng Submission March 2007 Takeshi Nakamura, Trinity Security Systems, Inc.Slide 1 IPN-WLAN: ‘IPN’ enabled Wireless LANs A.
Doc.: IEEE /0866r1 Submission September 2005 Michael Montemurro, Chantry NetworksSlide 1 Mobility Domain Definition and Description Notice: This.
Doc.: IEEE /90r0 Submission Nov., 2012 NICTSlide b NICT Proposal IEEE P Wireless RANs Date: Authors: Notice: This document.
Doc.: IEEE /0930r0 Submission July 2006 Nancy Cam-Winget, Cisco Slide 1 Editor Updates since Jacksonville Notice: This document has been prepared.
Doc.: IEEE /0803r1 Submission July 2005 TK Tan, Philips Slide 1 WNG SC Closing Report Notice: This document has been prepared to assist IEEE
Doc.: IEEE /1000r4 Submission Jan 2010 Hiroshi Mano Root, Inc.Slide 1 IEEE for High Speed Mobility Notice: This document has been prepared.
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
Doc.: IEEE /0094r0 Submission November 2009 Steve Shellhammer, QualcommSlide 1 Comments on PAR Notice: This document has been prepared.
Doc.: IEEE /1020r0 Submission September 2008 Hitoshi MORIOKA, ROOT Inc.Slide 1 WLAN field trial in high speed moving environment Notice: This.
Doc.: IEEE /1000r0 Submission Sep 2009 Hitoshi MORIOKA, ROOT Inc.Slide 1 IEEE for high speed mobility Notice: This document has been prepared.
Doc.: IEEE /0111r0 Submission January 2009 Hitoshi MORIOKA, ROOT Inc.Slide 1 Broadband V2I Access for High Speed Transportation Notice: This document.
Doc.: IEEE /xxxxr0 Submission November, 2006 Scott Henderson, Research In Motion FCC : E911 Requirements for IP- Enabled Service Providers.
Doc.: IEEE /0121r0 Submission January 2006 S. Bezzateev, A. Fomin, M. WongSlide 1 Broadcast Management Frame Protection Notice: This document.
Doc.: IEEE /0644r2 Submission May 2006 Päivi Ruuska, NokiaSlide 1 Measurement Pilot Transmission Information as optional information in Probe.
Doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 1 MISP based Authentication Framework Notice: This document has been.
Doc.: IEEE /0239r0 Submission March 2005 Montemurro, Smith, Edney, KumarSlide 1 Resource pre-allocation and commmunication adhoc report Notice:
Doc.: IEEE /402r0 Submission May 2005 Stefano M. FaccinSlide 1 Notice: This document has been prepared to assist IEEE It is offered as.
Doc.: IEEE /0072r0 Submission January 2009 Slide 1 Proxy ARP Issue for Direct Link Setup Notice: This document has been prepared to assist IEEE.
Doc.: IEEE /0448r0 Submission March, 2007 Srinivas SreemanthulaSlide 1 Joiint TGU : Emergency Identifiers Notice: This document has been.
November 2005doc.: IEEE /1079r0 Stuart GoldenNovember Notice: This document has been prepared to assist IEEE It is offered as a.
Doc.: IEEE /1212r0 Submission TGT and MEF Liaison Notice: This document has been prepared to assist IEEE It is offered as a basis for.
Doc.: IEEE /86r2 Submission March, 2010 Gabor BajkoSlide 1 Location Proxy Notice: This document has been prepared to assist IEEE It is.
Doc.: IEEE /0028r0 Submission January 2005 Eleanor Hepworth, Siemens Roke ManorSlide 1 Definitions and Terminology Notice: This document has been.
November 2005doc.: IEEE /1079r1 Stuart GoldenNovember Notice: This document has been prepared to assist IEEE It is offered as a.
Doc.: IEEE /1528r0 Submission 22 September 2006 Naveen Kakani, Nokia, IncSlide 1 TGn PSMP adhoc Group September Closing Report Notice: This document.
Doc.: IEEE /0220r0 Submission March 2005 Peter Ecclesine, Cisco SystemsSlide Liaison Report Atlanta Notice: This document has been prepared.
Doc.: IEEE /0460r1 Submission March 2006 Fujio Watanabe, DoCoMo USA LabsSlide 1 Japanese Emergency Call Regulation Notice: This document has been.
Doc.: IEEE /0136r0 Submission January 2007 Dave Stephenson, Cisco Systems, Inc.Slide 1 Input to Information Model Date: Notice:
Doc.: IEEE /0652r1 Submission May 2007 Emily Qi, Intel CorporationSlide 1 TGv Redline D0.12 Insert and Deletion Notice: This document has been.
IEEE for High Speed Mobility
Coexistence Motions for LB84 Comment Resolution
[ Interim Meetings 2006] Date: Authors: July 2005
Resource Request/Response Discussion
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
TGp Closing Report Date: Authors: July 2007 Month Year
Attendance and Documentation for the March 2007 Plenary
[ Policies and Procedure Summary]
3GPP liaison report May 2006 May 2006 Date: Authors:
Motion to accept Draft p 2.0
[place presentation subject title text here]
TGp Closing Report Date: Authors: March 2006 Month Year
On Coexistence Mechanisms
TGp Closing Report Date: Authors: May 2007 Month Year
On Coexistence Mechanisms
TGp Closing Report Date: Authors: March 2006 Month Year
Reflector Tutorial Date: Authors: July 2006 Month Year
Experimental DTV Sensor
ADS Study Group Mid-week Report
TGu-changes-from-d0-01-to-d0-02
LB73 Noise and Location Categories
Secure Network Selection
TGy draft 2.0 with changebars from draft 1.0
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
TGp Closing Report Date: Authors: March 2007 Month Year
[ Policies and Procedure Summary]
TGu Motions Date: Authors: May 2006 May 2006
Questions to the Contention-based Protocol (CBP) Study Group
TGu-changes-from-d0-04-to-d0-05
Method for geting Link RCPI
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
TGu Motions Date: Authors: May 2006 May 2006
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Use of KCK for TGr Management Frame Protection
Use of KCK for TGr Management Frame Protection
Presentation transcript:

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 1 Toward Mobile IEEE (a.k.a. IEEE for High Speed Mobility) Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE Working Group. If you have questions, contact the IEEE Patent Committee Administrator at. Date: Authors: NameCompanyAddressPhone Hiroki NAKANOTrans New Technology, Inc. Sumitomo-Seimei Kyoto Bldg. 8F, 62 Tukiboko-cho Shimogyo-ku, Kyoto JAPAN Hitoshi MORIOKAROOT Inc.#33 Ito Bldg Tenjin, Chuo-ku, Fukuoka JAPAN Hiroshi MANOROOT Inc.8F TOC2 Bldg Nishi- Gotanda, Shinagawa-ku, Tokyo JAPAN

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 2 Abstract We told about IEEE enhancement for high speed mobility support in the previous session in Hawaii. –Mobile vs. Nomadic –Limitation of Market –Connectivity Lost –How to solve the issue Today, we talk about our exprimental protocol for high speed mobility support. –2 Straw Polls

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 3Hitoshi MORIOKA, ROOT Inc.Slide 3 Mobile vs. Nomadic Let’s quote definitions from RECOMMENDATION ITU-R F “Vocabulary of terms for wireless access” Mobile wireless access (MWA) –Wireless access application in which the location of the end-user termination is mobile. Nomadic wireless access (NWA) –Wireless access application in which the location of the end-user termination may be in different places but it must be stationary while in use.

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 4 Limit of market growth in the existing Bandwidth? –No! We are getting wide bandwidth day by day 11b, g, a, n, ac, ad Securities? –No! incorporates new security system too. WEP, i… Propagation range? –No! it is true, but it is not limit of technologies. –It’s depends on regulatory. –And it’s good for avoiding congestion. Service model? –Yes! we are still in nomadic services.

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 5 Beyond “Nomadic” If we got actual mobility on We will get Wi-Fi IP mobile phone (not only in-house phone) Wi-Fi on a car (high context navigation) Wi-Fi on a train (passenger services) Wi-Fi real-time audio (anywhere anytime) Wi-Fi real-time video (anywhere anytime) skype, etc.,

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 6 Existing Wi-Fi Service Area Huge number of APs were deployed by different owners. –APs owned by one owner can be operated by r technology to provide fast roaming inside one ESS. An STA is always receiving at least one or more signals from someone's APs continuously. However, we have to spend a couple of seconds to connect to another ESS every time. –In other words, we lost connectivity at every border of ESS. This fact is not suitable for mobile communication.

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 7 Reasons of Connectivity Loss Waste much time to … 1.Discover a new AP. Latency can be reduced by 11k or background scan. 2.Make association with a new AP. (includes authentication/key exchange…) 11i authentication is NOT fast. –It needs many packet exchanges. 3.Upper layer setup. (Out of Scope) 4.Upper layer handover. (Out of Scope) Fast authentication and key management (AKM) can reduce connectivity loss.

doc.: IEEE /1000r2 Submission Nov 2009 Time for handover IEEE802.16e ms IEEE802.16m -- 30ms? IEEE802.11i +.1X -- ?? while G.711 sends a packet every 20ms. Another VoIP implementation sends every 50ms. Hiroki NAKANO, Trans New Technology, Inc.Slide 8

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 9 Protocol Sequence of IEEE802.11i (EAP-TLS) STA AP RADIUS Server Beacon Probe Request Probe Response Authentication Request Authentication Reply Association Request Association Accept EAPOL-Start EAP-Request/Identity EAP-Response/Identity EAP-Request/TLS-Start RADIUS-Access-Request/Identity RADIUS-Access-Challenge/TLS-Start EAP-Response/TLS-client Hello EAP-Success RADIUS-Access-Request/Pass Through RADIUS-Access-Challenge/ Server Certificate EAP-Key EAP-Request/Pass Through EAP-Response/Client Certificate RADIUS-Access-Request/Pass Through RADIUS-Access-Challenge/Encryption Type EAP-Request/Pass Through EAP-Response RADIUS-Access-Request RADIUS-Access-Accept Roundtrip: 2ms to 5ms Roundtrip: 1ms to 20ms

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 10 An Example of Faster Key Exchange Utilize Pre-RSNA Security Framework –Authentication and PTK exchange can be done in pre-RSNA security framework. –After PTK setup, GTK can be securely delivered. STA AP Authentication Server Beacon (Probe Request) (Probe Response) Authentication Request Authentication Reply Access Request Access Response (Association Request) (Association Accept) Roundtrip: 2ms to 5msRoundtrip: 1ms to 20ms

doc.: IEEE /1000r2 Submission Nov 2009 Time for handover (review) IEEE802.16e ms IEEE802.16m -- 30ms? IEEE802.11i +.1X -- >150ms New Fast AKM ms (target) Hiroki NAKANO, Trans New Technology, Inc.Slide 11

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 12 An Example: Pre-shared Secret Key Access Point (AP) Authentication Server (AS) Station (non-AP STA) No pre-shared information between mobile STA and AP –AP and AS function can be equipped in a box for a small system. Share an identifier and a secret key (MN-key) Each mobile STA has a different key Identified by NAI (account name) Share a secret key (AP-key) Each AP has a different key Identified by IP/MAC address

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 13 An Example: PTK delivery Access Point (AP) Authentication Server (AS) Station (non-AP STA) AP-key shared STA-key shared PTK is delivered via AS between mobile STA and AP PTK delivery without STA-AP mutual secrets

doc.: IEEE /1000r2 Submission Nov 2009 An Example: Authentication Procedure Access Point (AP) Authentication Server (AS) Station (Non-AP STA) Authentication Request Frame Authentication Data (16byte) ICV (16byte) MD5 HMAC-MD5 (STA-key) Authentication Request Frame Authentication Data (16byte) Access Request Message ICV (16byte) Extract Authenticator (16byte) MD5 HMAC-MD5 (AP-key) Access Request Message Authenticator (16byte) Authentication Data (16byte) ICV (16byte) Authenticator (16byte) ICV (16byte) Extract HMAC-MD5 (AP-key) HMAC-MD5 (STA-key) Compare Beacon Nonce NAI… Check Timestamp Transmit Broadcast Slide 14Hiroki NAKANO, Trans New Technology, Inc.

doc.: IEEE /1000r2 Submission Nov 2009 An Example: Authentication Procedure (Cont.) Access Point (AP) Authentication Server (AS) Station (Non-AP STA) Authentication Success Frame Authentication Data (16byte) ICV (16byte) MD5 HMAC-MD5 Authenticator (16byte) Access Request Message Nonce (16byte) PTK (16byte) ICV (16byte) Extract HMAC-MD5 (STA-key) Extract HMAC-MD5 (AP-key) Hashed ICV (16byte) Session Key DD (16byte) XOR Access Approval Message Authenticator (16byte) HMAC-MD5 (AP-key) Access Approval Message Authenticator (16byte) Compare Extract HMAC-MD5 (AP-key) ICV (16byte) Hashed ICV (16byte) Extract HMAC-MD5 (AP-key) Session Key DD (16byte) PTK (16byte) Extract XOR Authentication Success Frame Authentication Data (16byte) ICV (16byte) MD5 HMAC-MD5 ICV (16byte) Nonce (16byte) PTK (16byte) HMAC-MD5 (STA-key) Compare Extract Network Info (IP address…) Transmit Slide 15Hiroki NAKANO, Trans New Technology, Inc.

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 16 Conclusion Limitation of IEEE is “NOMADIC” use only. Mobile communication will expand IEEE market. Long AKM time is not suitable for mobile use. We have to reduce AKM time toward mobile. We show an example of fast AKM method. Further study in SC/WG is required for better AKM method.

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 17 Questions & Comments

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 18 Straw Poll 1 “IEEE should proceed to mobile communication.” Yes: No: Need More Discussion: Don’t Care:

doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 19 Straw Poll 2 “A Study Group to develop a PAR and 5C for Fast Authentication and Key Exchange Method should be created” Yes: No: Need More Discussion: Don’t Care: