Security Issues in 11k Emily H. Qi Huai-An (Paul) Lin

Slides:



Advertisements
Similar presentations
Doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Enabling Encryption in Hotspots by Decoupling the Privacy Field from.
Advertisements

IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Doc.: IEEE ai Submission Paul Lambert, Marvell TGai Discovery Proposal Author: Abstract Short high-level proposal for discovery techniques.
Submission doc.: IEEE 11-10/0259r0 March 2013 Jarkko Kneckt (Nokia)Slide 1 CID 266 & CID 281 Date: Authors:
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
Doc.: IEEE k Submission July 2004 Bernard Aboba, MicrosoftSlide 1 IEEE k Security: A Conceptual Model Bernard Aboba Microsoft.
Doc.: IEEE k Submission July 2003 Byoung-Jo "J" Kim, AT&T Labs-ResearchSlide 1 RRM Feature to Function Match Byoung-Jo “J” Kim AT&T.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
Understand Wireless Security LESSON Security Fundamentals.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo
AP Architecture Changes Mike Moreton, STMicroelectronics
Supporting Authentication/Association for Large Number of Stations
Supporting Authentication/Association for Large Number of Stations
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Some LB 62 Motions January 13, 2003 January 2004
WLAN Paging and Idle Mode
Information and Network Security
مادسیج، شبکه آموزشی پژوهشی دانشجویان ایران
BSS Max Idle Period and Sleep Interval
Broadcast and Unicast Management Protection (BUMP)
TGaq Pre-Association Summary
Security Protection Goals
IGTK Switch Announcement
Dynamic Generation of Password Identifier
Topological Ordering Algorithm: Example
Securing the CASP Protocol
IGTK Switch Announcement
Broadcast and Unicast Management Protection (BUMP)
10018H -TGh Proposal for Transmitter Power Control (TPC)
Broadcast and Unicast Management Protection (BUMP)
Just-in-time Transition Setup
Proposal – Supported Radio Resource Measurement Bitmask IE
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
Fast Transition Report
CID#102 - Channel Allocation
IEEE k Security: A Conceptual Model
Security for Measurement Requests and Information
Diagnostics and Troubleshooting
Pre-Association Negotiation of Management Frame Protection (PANMFP)
CID#102 - Channel Allocation for P2P
Secure WNM Requirements
Proposal for Load Balancing
Security network management
Topological Ordering Algorithm: Example
CID#89-Directed Multicast Service (DMS)
Secure WNM Requirements
Channel Allocation March 2008 Authors: Date: Month Year
Secure WNM Requirements
January 2003 Joe Kwak InterDigital Communications Corporation
AP Load Balancing Requirements
FTM Frame Exchange Authentication
Topological Ordering Algorithm: Example
Responses to Clause 5 Comments
Beacon Protection Date: Authors: July 2018 July 2018
Supporting Authentication/Association for Large Number of Stations
AP Load Balancing Requirements
Security in SDR & cognitive radio
Beacon Protection Date: Authors: May 2018 January 2018
QoS Metrics Date: Authors: January 2005 Month Year
Suggested Major Functional Components for s
Confidentiality, Integrity, Nonrepudiation
Topological Ordering Algorithm: Example
TGi Draft 1 Clause – 8.5 Comments
Proposal for Diagnostics and Troubleshooting
Patrick Worfolk (Kiwi Networks)
Presentation transcript:

Security Issues in 11k Emily H. Qi Huai-An (Paul) Lin January 2003 Security Issues in 11k Emily H. Qi Huai-An (Paul) Lin Intel Corporation Emily.h.qi@intel.com huai-an.lin@intel.com Emily Qi, et al. Intel Corporation Emily Qi, et al. Intel Corporation

Security Alert WEP algorithm is only processed for the following frame bodies: Data frame Management frame with subtype authentication If management frames (Beacon, Probe, Probe Response) are used to communicate measurements between AP and STA, are there any security implications? Emily Qi, et al. Intel Corporation

Possible Security Attacks Unauthorized party in the parking lot receives clear text of measurement and sniff the topology of network layout or usage Unauthorized party tampers with measurement to mislead network management Emily Qi, et al. Intel Corporation

Possible Security Services Confidentiality Ensure that the measurement is accessible only for reading by authorized parties Integrity Ensure that only authorized parties are able to modify measurement. Modification includes writing, changing, changing status, deleting, creating, and delaying or replaying of measurement Authorization Authorize who knows what Emily Qi, et al. Intel Corporation

Suggested Work Items Study the possible security attack scenarios for RRM functional services Question: should TGk consider security issues (other than DOS)? requirements to TGi? what forms? Emily Qi, et al. Intel Corporation