Doc.: IEEE 802.11-10/0371r0 Submission Mar 2010 Hiroshi Mano, Root, Inc.Slide 1 Fast Initial Authentication Date: 2010-03-17 Authors: NameCompanyAddressPhoneemail.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0898r2 Submission July 2012 Marc Emmelmann, FOKUSSlide 1 Fast Initial Service Discovery: An enabler for Self-Growing Date:
Advertisements

Doc.: IEEE /0032r0 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0023r1 Submission January 2011 Hitoshi MORIOKA, ROOT INC.Slide 1 Use Case Scenario for TGai Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0976r1 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0976r0 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone .
Submission October 2011 doc.:IEEE /1517r0 Santosh Abraham, Qualcomm Incorporated Efficient Device and Service Discovery for Peer-to-Peer (P2P)
Doc.: IEEE /1042 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang, Kyungki,
Doc.: IEEE /0034r0 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0023r2 Submission January 2011 Hitoshi Morioka, ROOT INC.Slide 1 Use Case Scenario for TGai Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE 11-13/1325r5 Hiroshi Mano (ATRD) Nov ai – Improving WLAN System Performance Date: Authors: Slide 1 NameCompanyAddressPhone .
Doc.: IEEE /0023r0 Submission January 2011 Hitoshi MORIOKA, ROOT INC.Slide 1 Use Case Scenario for TGai Date: YYYY-MM-DD Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1207r0 Submission November 2009 Marc Emmelmann et al, Technical University BerlinSlide 1 Continuous network discovery using Opportunistic.
Submission doc.: IEEE 11-12/0273r8 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE 11-12/0273r9 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0371r3 Submission Mar 2010 Hiroshi Mano, Root, Inc.Slide 1 Fast Initial Authentication Date: Authors: NameCompanyAddressPhone .
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Submission doc.: IEEE 11-11/1414r2 November 2011 Katsuo Yunoki, KDDI R&D LaboratoriesSlide 1 Probe Request and Response in TGai Date: Authors:
Doc.: IEEE /1000r4 Submission Jan 2010 Hiroshi Mano Root, Inc.Slide 1 IEEE for High Speed Mobility Notice: This document has been prepared.
Doc.: IEEE /1585r0 Submission Nov 2011 Hiroshi Mano (ATRD Root Lab)Slide 1 IEEE TGai Closing Report Date: Authors: NameCompanyAddressPhone .
Doc.: IEEE /0111r3 Submission Jul 2009 Hitoshi MORIOKA, ROOT Inc.Slide 1 Broadband V2I Access for High Speed Transportation Notice: This document.
Doc.: IEEE /0977r2 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN
Doc.: IEEE /1000r0 Submission Sep 2009 Hitoshi MORIOKA, ROOT Inc.Slide 1 IEEE for high speed mobility Notice: This document has been prepared.
Doc.: IEEE /2778r1 Submission November 2007 Sandra Qin et al., SamsungSlide 1 Content Protection Support in Date: Authors:
Doc.: IEEE /0111r0 Submission January 2009 Hitoshi MORIOKA, ROOT Inc.Slide 1 Broadband V2I Access for High Speed Transportation Notice: This document.
Doc.: IEEE /1233r3 Submission Sep 2011 Slide 1 Passive Scanning Improvement Date: Authors:
Submission doc.: IEEE 11-12/535r1 May 2012 Jarkko Kneckt, NokiaSlide 1 Scanning and FILS requirements Date: Authors:
Doc.: IEEE /0275r3 Submission March 2012 Hitoshi Morioka, Allied Telesis R&D CenterSlide 1 Higher Layer Configuration Function for TGai SFD Date:
Doc.: IEEE /0977r1 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN
Doc.: IEEE /1358r0 Submission November 2008 Marc Emmelmann et al., TU BerlinSlide 1 Fast Handover Support for Highly Mobile Users using COTS
Doc.: IEEE /0111r2 Submission May 2009 Hitoshi MORIOKA, ROOT Inc.Slide 1 Broadband V2I Access for High Speed Transportation Notice: This document.
Doc.: IEEE /0873r0 Submission July 2010 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Effectiveness of Reduction of Message Exchanges Date:
Doc.: IEEE /0361r0 Submission March 2010 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Fast Initial Authentication Date: Authors:
Doc.: IEEE /0r0 Submission Mar 2010 Hiroshi Mano, Root, Inc.Slide 1 Fast Initial Authentication Notice: This document has been prepared to assist.
Submission doc.: IEEE 11-13/1325r3 Hiroshi Mano (ATRD) Nov ai – Improving WLAN System Performance Date: Authors: Slide 1 NameCompanyAddressPhone .
Submission doc.: IEEE 11-12/0273r7 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1008r0 August 2010Hiroki Nakano, Trans New Technology, Inc.Slide 1 Parallel processing for upper layer Date: Authors: NameCompanyAddressPhone .
Doc.: IEEE /0977r6 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA Allied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0977r4 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA Allied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /1244r0 Submission Sep 2011 Hiroshi Mano, Root, Inc.Slide 1 11ai overview (PAR, Scope and current status) Date: Authors:
Doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 1 Toward Mobile IEEE (a.k.a. IEEE for High Speed.
IEEE Wireless LAN Standard
Fast Initial Authentication
Content Protection Support in
AP discovery with FILS beacon
Proposed SFD Text for ai Link Setup Procedure
Feasibility Study of FIA
[place presentation subject title text here]
IEEE for High Speed Mobility
IEEE for High Speed Mobility
More Example Ideas around FIA
More Example Ideas around FIA
Fast Initial Authentication
An Example Idea of FIA Authors: Date: May 2010 Name Company
An Example Idea of FIA Authors: Date: May 2010 Name Company
Feasibility Study of FIA
An Example Idea of FIA Authors: Date: May 2010 Name Company
Content Protection Support in
IEEE TGai Closing Report
An Example Protocol for FastAKM
AP discovery with FILS beacon
IEEE Fast Initial Authentication Study Group Closing Report
AP discovery with FILS beacon
An Example Idea of FIA Authors: Date: May 2010 Name Company
IEEE Fast Initial Authentication Study Group Closing Report
An Example Protocol for FastAKM
IEEE TGai Closing Report
802.11ai – Improving WLAN System Performance
802.11ai – Improving WLAN System Performance
Cooperative AP Discovery
HIP DEX for Fast Initial Authentication in
Presentation transcript:

doc.: IEEE /0371r0 Submission Mar 2010 Hiroshi Mano, Root, Inc.Slide 1 Fast Initial Authentication Date: Authors: NameCompanyAddressPhone Hiroshi MANOROOT Inc.8F TOC2 Bldg Nishi- Gotanda, Shinagawa-ku, Tokyo JAPAN Hitoshi MORIOKAROOT Inc.#33 Ito Bldg Tenjin, Chuo-ku, Fukuoka JAPAN Paul A LambertMarvellMarvel lane, MS Santa Clara, CA Marc EmmelmannTU BerlinEinsteinufer Berlin Germany Hiroki NakanoTrans New Technology Sumitomo-Seimei Kyoto Bldg. 8F, 62 Tukiboko-cho Shimogyo-ku, Kyoto JAPAN Mineo TakaiSpace Time Engineering 609 Deep Valley Drive, Suite 200 Rolling Hills Estates, CA 90274, USA

doc.: IEEE /0371r0 Submission Mar 2010 Hiroshi Mano, Root, Inc.Slide 2 Agenda Motivation and background of proposal Limitation of coexisted standard –Long time initial authentication –Scalability of simultaneous access for initial authentication –Operator oriented roaming support Example idea of Fast secure Initial Authentication –Implementation of fast secure initial authentication Time Analysis Security Analysis –Example idea of supporting contentious IP connection Straw Poll/Motion

doc.: IEEE /0371r0 Submission Mar 2010 Limitation of market growth in the existing IEEE evolved greatly for the past ten years and got big success in a market –Bandwidth : 11/2Mbps →11b/11Mbps→11g/54Mbps →11n/300Mbps –Securities : WEP->WPA->WPA2 –Service device Desktop PC → Note Book → PDA → Portable game, Digital Camera → Hybrid cell phone. However –We are still in nomadic services. Hiroshi Mano, Root, Inc.Slide 3

doc.: IEEE /0371r0 Submission Mar 2010 Nomadic Vs Mobile Nomadic STA must be stationary while in use. Mobile STA do not need stop while in use. Hiroshi Mano, Root, Inc.Slide 4 Reference :RECOMMENDATION ITU-R F “Vocabulary of terms for wireless access” MWA & NWA

doc.: IEEE /0371r0 Submission Mar 2010 Today’s market back ground –Growth of portable device Number of portable device which incorporate Wi-Fi is more than PC’s Low power consumption device realized the use of the always-on connection type service. –New application’s request (Twitter, Face book…) Push Notification Service Quick update –Only cell phone provide these service –Highly bandwidth Very SMALL CELL of each AP Hiroshi Mano, Root, Inc.Slide 5

doc.: IEEE /0371r0 Submission Mar 2010 Prospect of use case 1 Quick update contents and push service. –You can update new messages and location data while just passing an AP's coverage. –So you do not have to stop many times like serious landing operation. –Service provider can distribute the handbill without stopping the foot of the customer. Location Pop Twitter Hiroshi Mano, Root, Inc.Slide 6Hiroshi Mano, Root, Inc.Slide 6 LocationMessagesHandbill New location and presence Updated new twitters and messages Get new handbills No need stop! Just pass through!

doc.: IEEE /0371r0 Submission Mar 2010 Prospect use case 2 Hiroshi Mano, Root, Inc.Slide 7Hiroshi Mano, Root, Inc.Slide 7Hiroshi Mano, Root, Inc.Slide 7 No need stop! Just pass through! Automatic Electrical Cash Register Security Gate ID Exchange

doc.: IEEE /0371r0 Submission Mar 2010 Prospect use case 3 Automatic metering –Power electric –Water meter –etc.. Hiroshi Mano, Root, Inc.Slide 8

doc.: IEEE /0371r0 Submission Mar 2010 Limitation of coexisted standard Long Authentication and Key Management time loosing scalability Limited number of simultaneous access of initial authentications Limited speed of moving devices Hiroshi Mano, Root, Inc.Slide 9

doc.: IEEE /0371r0 Submission Mar 2010 Scope of.11r and.11i IEEE802.11r support high speed mobility within the same ESSID Hiroshi Mano, Root, Inc.Slide 10 Network A AP ESSID 1 AP ESSID 2 AP ESSID.11i is used for Initial authentication Operator II Operator I Intra-Network Fast Handover is supported by.11r

doc.: IEEE /0371r0 Submission Mar 2010 Hiroshi Mano, Root, Inc.Slide 11 Time consumption for initial authentication Waste much time to … 1.Discover a new AP. Latency can be reduced by 11k or background scan. 2.Make association with a new AP. (includes authentication/key exchange…) 11i authentication is not so fast. –It needs many packet exchanges. 3.Upper layer setup. (Out of Scope) 4.Upper layer handover. (Out of Scope) Most of time consumption in initial authentication process is used for AKM. Therefore Fast S ecure initial authentication is key solution for high speed mobility.

doc.: IEEE /0371r0 Submission Mar 2010 Handover Taxonomy Handover Phases Network Discovery Handover Decision Link layer (re-) establishment = Scanning and other means Goal: Find other BSSs in reach Active / passive scanning  not mandatory for network discovery but only for synchronizing TSF timer Implicit knowledge (neighborhood reports) in combination with localization Existing approaches e.g. background scanning can reduce the delay to tens of ms [1--4]  Associated delay theoretically not noticeable if we can avoid requiring synchronization of TSF timer during the handover process = when to leave old BSS and connect to new one Decision based on (vendor specific) algorithm  not the concern of the standard Several approaches potentially resulting in zero delay handover possible Location based in combination with estimation of AP’s coverage area RSS-based [1,5--7] = Authentication, Association (+ security) No Security: Open Authentication & 1 Mbps = 2.8 ms mean value + time for required synchronization of TSF (2 ms mean)  Total of 4.8 ms [1] Adding Security: IEEE802.11i ( PEAP/EAP-MSCHAPv2) increases delay to at least 48ms, large number of simultaneous handover cause a tremendous network load due to the large number of message exchanges  does not scale Optimized: IEEE802.11r can reduce delay to up to XXXXX but can be only applied within a single ESS Currently, we do not have a fast handover including security that a) is suitable for frequent handover scenarios due to highly mobile users b) scales for large number of simultaneously occurring handovers

doc.: IEEE /0371r0 Submission Mar 2010 Slide 13 Protocol Sequence between AP and STA on IEEE802.11i ( PEAP/EAP-MSCHAPv2) STA AP EAPOL-Start EAP-Success PEAP EAP-MSCHAPv2 (4 round trip) Establishing TLS tunnel for PEAP (3 round trip) EAP-Identity (1 round trip) Association (1 round trip) Authentication (1 round trip) EAPOL-Key (2 round trip) Total: 14 round trip Probe (1 round trip) Slide 13Hiroshi Mano, Root, Inc.

doc.: IEEE /0371r0 Submission Mar 2010 Airtime consumption for every single authentication process We observed an STA connecting to an AP with PEAP/MS-CHAPv2 by IEEE802.11g. All management frames were transmitted in 1Mbps mode. Required airtime for one unicast frame is defined as described below. Frame Occupied Time DIFSCW ACK aSlotTime:20us aSIFSTime:10us aPreambleLength:144us aPLCPHeaderLength:48bits aCWmin:31 aCWmax:1023 DIFS:50us CW:620us ACKRate:1Mbps ACKLength:14Bytes TXTIME SIFS TXTIME PEAP/EAP-MSCHAPv2 needs 14 round trip frame exchanges. From our observation result, total frame length without PLCP header is 4390 byte. An STA needs 48.4ms airtime connecting to an AP. Slide 14Hiroshi Mano, Root, Inc.

doc.: IEEE /0371r0 Submission Mar 2010 Simulation 1 Assumption –Place: Train Station –Time: Rush Hour –Walking Speed: 4.8km/h=80m/min –AP cover area: 80m*80m square –Occupied Space by 1 Person: 2m*2m square –All persons have a cellular phone which supports WLAN. –All persons are walking same direction. 1,600 STAs are passing through the AP’s cover area in 1 minutes. this means 1,600 authentication process should be proceeded during every 1 minutes. Every authentication process needs 48.4ms airtime to connect to the AP. Only 1,238 authentication process can be proceeded. There is no time space to data communication. Furthermore, AP transmits beacons, STA needs DHCP… exiting initial authentication is not scale for mobility Slide 15Hiroshi Mano, Root, Inc.

doc.: IEEE /0371r0 Submission Mar 2010 Simulation STAs are already connected to an AP and up/downloading data. (Static STA) STAs are simultaneously coming into the cell and make authentication. (Moving STA) Assumption –All STAs uses OFDM –DATA frames are transmitted in 54Mbps –Management frames are transmitted in 6Mbps Analyzed required time to complete authentication for all moving STAs. Moving STAsStatic STAs

doc.: IEEE /0371r0 Submission Mar 2010 Simulation 2 Result

doc.: IEEE /0371r0 Submission Mar 2010 References [1]H. Morioka, H. Mano, M. Ohmori, M. Ohta, "MIS Protocol for Secure Connection and Fast Handover on Wireless LAN", No.454, The IEEE 20th International Conference on Advanced Information Networking and Applications, Austria, Apr.18-20, 2006 [2]H. Morioka, H. Mano, M. Ohmori, M. Ohta, M. Hirabaru, M. Hasegawa, M. Inoue, "Seamless Handover with Wireless LAN, Mobile IP, MISP and PDMA", The 9th International Symposium on Wireless Personal Multimedia Communications, 2006 [3]H. Morioka, H. Mano, "Broadband V2I Access for High Speed Transportation", 09/0111r3 [4]H. Mano, H. Morioka, "IEEE for High Speed Mobility", 09/1000r6 [5]H. Nakano, H. Morioka, H. Mano, "An Exsample Protocol for FastAKM", 10/0059r3 [6]H. Nakano, H. Morioka, H. Mano, "Fast Initial Authentication", 10/0361r0 [7]M. Emmelmann. System Design and Proof-of-Concept Implementation of Seamless Handover Support for Communication-Based Train Control. In M. Emmelmann, B. Bochow, and C. Kellum, editors, Vehicular Networking -- Automotive Applications and Beyond. John Wiley & Sons, 2010, ISBN: [8]M. Emmelmann, S. Wiethölter, and H.-T. Lim. Continuous network discovery using Opportunistic Scanning WNG SC Wireless Next Generation Standing Committee. Doc. 09/1207r1. IEEE Plenary, Atlanta, GA, USA, November , [9] M. Emmelmann and H.-T. Lim. Empirical Evaluation of Overlap Requirements of Adjacent Radio Cells for Zero Delay Handover. In Proc. of Vehicular Technology Conference (VTC) Fall 2009, Anchorage, Alaska, USA, Sep 20-23, [10] M. Emmelmann, S. Wiethölter, and H.-T. Lim. Opportunistic Scanning: Interruption-Free Network Topology Discovery for Wireless Mesh Networks. In Porc. of International Symposium on a World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM), Kos, Greece, June 15-19, 2009.

doc.: IEEE /0371r0 Submission Mar 2010 References [11] M. Emmelmann. Velocity Effects on RSM-based Handover Decision TGt Wireless Performance Prediction Task Group Doc. 05/0233r1. IEEE Plenary, Atlanta, USA, March , [12] Marc Emmelmann. "Influence of Velocity on the Handover Delay associated with a Radio-Signal- Measurement-based Handover Decision". In Proc. of IEEE Vehicular Technology Conference (VTC 2005 Fall), Dallas, TX, USA, September Digital Object Identifier /VETECF [13] M. Emmelmann and H.-T. Lim. Empirical Evaluation of Overlap Requirements of Adjacent Radio Cells for Zero Delay Handover. In Proc. of Vehicular Technology Conference (VTC) Fall 2009, Anchorage, Alaska, USA, Sep 20-23, 2009.

doc.: IEEE /0371r0 Submission Mar 2010 Hiroshi Mano, Root, Inc.Slide 20 Questions & Comments

doc.: IEEE /0371r0 Submission Mar 2010 Hiroshi Mano, Root, Inc.Slide 21 Straw Poll? Motion? “?”