Protected LTF Using PMF in SU and MU Modes

Slides:



Advertisements
Similar presentations
Beamformed HE PPDU Date: Authors: May 2015 Month Year
Advertisements

Submission doc.: IEEE /1097r1 September 2015 Narendar Madhavan, ToshibaSlide 1 Reducing Channel Sounding Protocol Overhead for 11ax Date:
Doc.: IEEE /0806r0 SubmissionSlide 1Young Hoon Kwon, Newracom Protection for MU Transmission Date: Authors: July 2015.
Submission doc.: IEEE /1340r2 November 2015 Narendar Madhavan, ToshibaSlide 1 NDP Announcement for HE Sequence Date: Authors:
Doc.: IEEE /1034r0 Submission September 2015 Yongho Seok, NEWRACOM Notification of Operating Mode Changes Date: Authors: Slide 1.
Submission doc.: IEEE /1340r0 November 2015 Narendar Madhavan, ToshibaSlide 1 NDP Announcement for HE Sequence Date: Authors:
PHY Security FRD and SRD Text
802.11az Negotiation Date: Authors: Jan 2017 Month Year
Location Measurement Protocol for Unassociated STAs
Trigger Frame Format for az
PHY Security FRD and SRD Text
Locationing Protocol for 11az
Polling for MU Measurements
Scheduling Information for UL OFDMA Acknowledgement
SU Sounding Measurement Exchange and Feedback
Ranging ID and its Lifetime Management
Pre-association Security Negotiation for 11az SFD Follow up
Feedback Element Compression for ax
Frame Protection for 11az
Pre-association Security Negotiation for 11az SFD Follow up
Availability Window Advertisement
Frame Responding Rules for NDP Ranging
Resource Allocation for Unassociated STAs – Follow Up
NDP Ranging Error Recovery
NDP Transmission Date: Authors: Month Year Month Year
11az NDP Announcement Date: July 2008
Two-sided LMR Feedback between AP and STA
Two-sided LMR Feedback between AP and STA
Secure Ranging Measurement
Pre-Association Security Negotiation (PASN) for 11az
11az STA Polling for MU NDP Ranging
UL OFDMA-based Random Access Parameter Set (RAPS) element
Resource Negotiation for Unassociated STAs in MU Operation
MU Ranging Sequence Date: Authors: Nov 2017 Month Year
HEz RTT Location Using Anchor Stations and Client Cooperation
HEz RTT Location Using Anchor Stations and Client Cooperation
Existence Indication of Attacker or Jammer in LMR
An unified az Protocol Date: Authors: Nov 2016
Intel Secured Location Threat Model
11az STA Polling for MU NDP Ranging
11az NDP Announcement Date: July 2008
Availability Window Update
Negotiation for HEz Ranging for Passive Location Support
Data field in HE PPDU Date: Authors: September 2015
Replay Attack to Secured TB Ranging
Replay Attack to Secured TB Ranging
FTM Frame Exchange Authentication
Explicit Block Ack Request in DL MU PPDU
Explanations for CR on NDP feedback report
PHY-Level Security Protection
Random Access UL MU Resource Allocation and Indication
Locationing Protocol for 11az
11az related bits in the Extended Capabilities element
CR for CID 1115 Date: Authors: May 2019
Measurement Report Feedback in 11az
Phase Shift Based TOA Reporting in Passive Location Ranging
CP Replay Attack Protection
Intel Secured Location Threat Model
NDP Bandwidth Selection in Range Measurement
Secure SU and MU Ranging Measurement Procedure
HEz Ranging Availability Window
Sounding-only Support During Ranging
Availability Window Termination
LMR and LCI Reporting For Passive Location
PHY Security SRD Text Update
Location Measurement Protocol for 11ax
11az Negotiation Protocol (update)
Intel Secured Location Threat Model
CR for CID 1115 Date: Authors: May 2019
Availability Window Advertisement
Presentation transcript:

Protected LTF Using PMF in SU and MU Modes Month Year doc.: IEEE 802.11-yy/xxxxr0 Protected LTF Using PMF in SU and MU Modes Date: 2017-11-08 Authors: Chittabrata Ghosh, Intel Jonathan Segev, Intel

Chittabrata Ghosh, Intel Nov 2017 doc.: IEEE 802.11-17/1770r0 Abstract In this presentation, we discuss about the LTF protection for both SU and MU ranging and its relation to the MAC security and security negotiation Key exchange in negotiation phase Randomization seed in measurement phase Chittabrata Ghosh, Intel

Chittabrata Ghosh, Intel Month Year doc.: IEEE 802.11-yy/xxxxr0 Nov 2017 doc.: IEEE 802.11-17/1770r0 Introduction In previous discussions we agree on the following: The HEz and VHTz FTM modes, the fields over which range measurements are performed shall be protected against a VHT/HE Type B adversary attack. For the purpose of PHY Security Mode, the field used for channel/ToA measurement shall not include any form of repetition in time domain or structure that is predictable. In this submission we will review possibilities of signaling between iSTA and rSTA that enables LTF protection. Chittabrata Ghosh, Intel Chittabrata Ghosh, Intel

Existing Proposal 1: Exchanging Keys in UL and DL NDP [1] Nov 2017 doc.: IEEE 802.11-17/1770r0 Existing Proposal 1: Exchanging Keys in UL and DL NDP [1] iSTA indicates Key 1 in UL NDP frame and rSTA indicates Key 2 in DL NDP frame Existing proposal has following limitations: Requires intended receiver to buffer the samples of the sounding (UL NDP and DL NDP) till results of the decoded key complete the entire Rx path: Creates a bottle neck and large buffers at the receiver side. Especially problematic for “Immediate RSTA” as LMR results generation now have shorter time (time is cut down by LTF processing time following the Key1 decoding). Requirement to have a separate Rx path for key and sounding creates complexity Limits ability to reuse existing baseband as the 802.11ax and 802.11ac sounding waveforms (DL NDP frame) does not include data field. Ghosh Chittabrata, Intel

Existing Proposal 2: Inserting Keys in NDPA frame [1] Month Year doc.: IEEE 802.11-yy/xxxxr0 Nov 2017 doc.: IEEE 802.11-17/1770r0 Existing Proposal 2: Inserting Keys in NDPA frame [1] rSTA indicates Key 1 and Key 2 in the NDPA frame However, 802.11 control frames does not support encryption Creates critical path at the receiver side between the decryption process (normally involved bit crunching) and likely to require the sounding waveform (UL NDP) samples to be buffered until the decryption process completes Layer boundary violation (PHY needs to do decryption) to meet the timing constraints. Hard on immediate RSTA that will need to decrypt prior to CE – not good for the technology and market. Not replay attack protected – unlike PMF. With PMF a STA does not use the same PN twice, and continuously increasing Pn. Once Pn space is exhausted key refresh is done. So its replay protected In the above proposal the keys needs to keep changing – used only once. Chittabrata Ghosh, Intel Chittabrata Ghosh, Intel

Month Year doc.: IEEE 802.11-yy/xxxxr0 Nov 2017 doc.: IEEE 802.11-17/1770r0 Proposed Key Exchange in Negotiation and LTF Randomization in Measurement Phases in SU Mode Key exchange and establishment between iSTA and rSTA in the non-time critical negotiation phase reusing PMF scheme. Initialization vector or Packet Number (PN) for both UL and DL in NDPA frame by the iSTA The iSTA LTF sequence in UL NDP is derived out of the established key in negotiation phase and the UL PN in NDPA frame The rSTA LTF sequence in DL NDP is derived out of the established key in negotiation phase and the DL PN in NDPA frame PN is transmitted in the clear – no encryption in control frames. PN selection follows same rules as PMF. Negotiation/key exchange NDPA (UL PN, DL PN) UL NDP LTF = f(key, UL PN) DL NDP LTF = f(key, DL PN) LMR ISTA RSTA Chittabrata Ghosh, Intel Santosh Pandey, Cisco

Option 1: UL and DL PNs in TF in MU Mode Nov 2017 doc.: IEEE 802.11-17/1770r0 Option 1: UL and DL PNs in TF in MU Mode Same key exchange and establishment as SU between iSTA and rSTA in negotiation phase again reusing PMF scheme for key generation, establishment and refresh. Initialization vector or Packet Number (PN) for both UL and DL are included in the Trigger frame transmitted by the RSTA The iSTA LTF sequence in UL NDP is derived out of the established key in negotiation phase and the UL PN in TF frame for UL sounding. The rSTA LTF sequence in DL NDP is derived out of the established key in negotiation phase and the DL PN in TF. Chittabrata Ghosh, Intel

Option 2: UL PN in TF / DL PN in NDPA Month Year doc.: IEEE 802.11-yy/xxxxr0 Nov 2017 doc.: IEEE 802.11-17/1770r0 Option 2: UL PN in TF / DL PN in NDPA Same key exchange and establishment as SU between iSTA and rSTA in negotiation phase again reusing PMF scheme for key generation, establishment and refresh. Initialization vector or Packet Number (PN) for UL in TF and for DL in NDPA frame by the iSTA The iSTA LTF sequence in UL NDP is derived out of the established key in negotiation phase and the UL PN in NDPA frame The rSTA LTF sequence in DL NDP is derived out of the established key in negotiation phase and the DL PN in NDPA frame Polling part Position (FTM) Sounding part SIFS Polling larger # of STA for resource request. Identify the STA require meas. TF (location) Per STA Info ([RID STA 1, UL PN]….[RID STA n UL PN]) UL NDP STA n Tx m NDPA Per STA Info ([RID STA 1, DL PN]….[RID STA n DL PN]) DL NDP Location Meas. Report Single availability window Chittabrata Ghosh, Intel Santosh Pandey, Cisco

Advantages of the Proposed Mechanism of Key Exchange Month Year doc.: IEEE 802.11-yy/xxxxr0 Nov 2017 doc.: IEEE 802.11-17/1770r0 Advantages of the Proposed Mechanism of Key Exchange Security context negotiation and establishment using PMF in the unassociated mode already agreed for MAC level security Extending PMY scheme for PHY level security and generation of LTFs are simple and straight forward Use of Packet Number (PN) as a seed for LTF sequence/secured property generation allows use of control frames (NDPA or Trigger frame) avoiding encryption of control frames. Inclusion of both the UL and DL PN in the preceding control frame allows for use of existing frame types and formats without the need of introducing a new frame format for the NDP (inclusion of PN without data field) The Location Measurement Reporting (LMR) can still use the PMF protection that 11az expects to extend to the unassociated mode Fits well to both SU and MU protect schemes Advantages: Longer processing time available for sequence generation. Extension to existing PMF scheme, reduces complexity for key generation, exchange and refresh protocol. No encryption in control frame – uses same frame formats. Chittabrata Ghosh, Intel Chittabrata Ghosh, Intel

Chittabrata Ghosh, Intel Nov 2017 doc.: IEEE 802.11-17/1770r0 Summary In this contribution, we have presented the existing proposal on key exchange for PHY level security We have proposed a new mechanism of key exchange by reusing the PMF scheme The key exchange and establishment are executed in the negotiation phase Initialization vector or PN for UL and DL are signaled in the measurement phase In SU mode, the UL and DL PNs are indicated in the NDPA frame by the iSTA In MU mode, the UL and DL PNs are either indicated in the Trigger frame in one option and in another option, UL PN indicated in TF and DL PN indicated in NDPA frame Chittabrata Ghosh, Intel

Chittabrata Ghosh, Intel Nov 2017 doc.: IEEE 802.11-17/1770r0 Reference [1] 11-17-1726r0, “Secure ranging measurement,” Yongho Seok Chittabrata Ghosh, Intel