Issues of MAC Management Security

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0170r0 Submission March 2005 Jon Edney, Stefano Faccin, NokiaSlide 1 Session MAC Address For Anonymity Date: Notice: This.
Advertisements

Doc.: IEEE /109r1 Submission July 2002 J. Edney, H. Haverinen, J-P Honkanen, P. Orava, Nokia Slide 1 Temporary MAC Addresses for Anonymity Jon.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 1 Protection of Action Frames Jon Edney Nokia
History and Implementation of the IEEE 802 Security Architecture
History and Implementation of the IEEE 802 Security Architecture
Interworking Study Group Justification
doc.: IEEE /xxx Jon Edney, Nokia
Relay Threat Model for TGaz
Relay Threat Model for TGaz
Security for location determination at a Public Domain
doc.: IEEE /xxxr0 Mike Moreton
Fast Authentication in TGai
Relay Threat Model for TGaz
ESS Mesh Deployment Usage Model
Stephen McCann, Siemens Roke Manor
Stephen McCann, Siemens Roke Manor
Management Frame Protection Study Group Request
MAC Address Hijacking Problem
Extra MIC for use in Public Access WLAN
Technical Requirements for IEEE ESS Mesh Networks
TruSecure Corporation
Reason Why L2 Per Frame Authentication Is Required
Security Req. related to Authentication
Beacon Response Proposal
New Twist on More Data Bit
Limiting Degrees of Freedom for Measurement Requests
Month 2002 doc.: IEEE /xxxr0 September 2004 Motion
Partial Proposal to TGw - AMID
Stefan Rommer, Mats Näslund, András Méhes (Ericsson)
IEEE Liaison to CableLabs
ESS Mesh Deployment Usage Model
Security for Measurement Requests and Information
Security for Measurement Requests and Information
Free the APs Button Images
AP Architecture Thoughts
A Review of the Site Reporting Protocol in IEEE802.11k Draft 0.2
Jesse Walker and Emily Qi Intel Corporation
Security for Measurement Requests and Information
Tentative Association May 12, 2004
RRM and WLAN-WWAN handovers
Elevation Effect on MIMO Channel
DLP & Security March 2003 Month 2002 doc.: IEEE /xxxr0
Management Frame Protection Study Group Request
Overlapping coverage issues with n BSSs
Radio Resource Measurement Closing Report to the Working Group
Flexible Pre-key Overview
Fast Authentication in TGai
CID#89-Directed Multicast Service (DMS)
Proposal for Emergency Services Requirement
WiNOT Consortium: Proposal For TGu Protection Requirements Cluster
WiNOT Consortium: Proposal For TGu Protection Requirements Cluster
Motion to a Start High Throughput Study Group
TGh Scope, Purpose and Status
802.21, TGr, TGs Joint Meeting Agenda
802.21, TGr, TGs Joint Meeting Agenda
Resolution to Comment 497, TGe D5.0
Random Access UL MU Resource Allocation and Indication
Session MAC Address Solves Deadlocks
TGh Wednesday Report Mika Kasslin Nokia January 2001
Use of EAPOL-Key messages
TGh Status and Objectives
Requirement Motions Date: Authors: July 2005 July 2005
Potential L2 security options for UL BCS
Security Ad-Hoc Report Draft
WiNOT Consortium: Proposal for TGu I1 requirement (Emergency Calls)
Ready to transition/ Clear to transition
On ESS Mesh Device Discovery
TGr Closing Report September 2004
Resolution to Comment 497, TGe D5.0
Presentation transcript:

Issues of MAC Management Security Month 2002 doc.: IEEE 802.11-02/xxxr0 Nov 2004 Issues of MAC Management Security Jon Edney, Stefano Faccin Nokia Edney, Faccin, Nokia John Doe, His Company

Month 2002 doc.: IEEE 802.11-02/xxxr0 Nov 2004 Objective (our view) Reduce DOS attack by preventing unauthorised disconnect (authenticate MAC addresses) Authenticate and hide information in action frames Hide station identity Edney, Faccin, Nokia John Doe, His Company

Not in Scope (our view) Protecting data frames (beyond what exists) Nov 2004 Not in Scope (our view) Protecting data frames (beyond what exists) Protecting control frames (cost outweighs the benefit) Inventing new key management scheme – protection based on same key hierachy as data frames and authentication frames. Edney, Faccin, Nokia

Nov 2004 Issues to address Status of management frames which occur before keys are established. Avoiding deadlock when one party looses keys to a secure session. Edney, Faccin, Nokia

One preliminary concept Nov 2004 One preliminary concept Station selects MAC address for session Station “registers” selected MAC address with AP in secure way Once registered MAC address is bound to security association Chosen MAC address is mapped to real MAC address Edney, Faccin, Nokia