IEEE k Security: A Conceptual Model

Slides:



Advertisements
Similar presentations
IEEE i: A Retrospective Bernard Aboba Microsoft March 2004.
Advertisements

Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Submission August 2001 Nancy Cam-Winget, Atheros Slide 1 Rapid Re-keying WEP a recommended practice to improve WLAN Security Nancy Cam-Winget, Atheros.
November 2005 Floyd Simpson, MotorolaSlide 1 doc.: IEEE /1193r0 Submission LB78 D3.0 Active Scanning Comments (clause ) Notice: This.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Lecture 24 Wireless Network Security
Doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 1 Enhanced Security Date: Authors:
Doc.: IEEE /109r1 Submission July 2002 J. Edney, H. Haverinen, J-P Honkanen, P. Orava, Nokia Slide 1 Temporary MAC Addresses for Anonymity Jon.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
Doc.: IEEE k Submission July 2004 Bernard Aboba, MicrosoftSlide 1 IEEE k Security: A Conceptual Model Bernard Aboba Microsoft.
Doc.: IEEE /1468r1 Submission Jan 09 Ashish Shukla, Marvell SemiconductorSlide 1 ERP Protection in IEEE s Mesh Network Date:
Doc.: IEEE /0294r2 Submission March 2012 Jonathan Segev (Intel)Slide 1 Active Scanning Reply Window Date: Authors:
Robust Security Network (RSN) Service of IEEE
Security Issues in 11k Emily H. Qi Huai-An (Paul) Lin
FILS Reduced Neighbor Report
Authentication and Upper-Layer Messaging
Enhanced Security Features for
WEP & WPA Mandy Kershishnik.
WUR coexistence with existing power save mode
Information and Network Security
Enhanced Security Features for
AP Discovery Information Broadcasting
Directed Multicast Service (DMS)
Groupcast discussion Date: Authors: Mar 2009 Month Year
Discussion on CID2199 Date: Authors: Jan 2014 Name Company
Mesh Security Proposal
Integration of WUR to Power Save Mode
Coexistence of Legacy & RSN STAs in Public WLAN
Wake Up Frame to Indicate Group Addressed Frames Transmission
Multiple Frequency Channel Scanning
IGTK Switch Announcement
Cryptography and Network Security
Regarding UL MU protection
FILS Reduced Neighbor Report
July 2002 Threat Model Tim Moore Tim Moore, Microsoft.
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
A Review of the Site Reporting Protocol in IEEE802.11k Draft 0.2
Jesse Walker and Emily Qi Intel Corporation
Security for Measurement Requests and Information
GAPA - Efficient, More Reliable Multicast
Changes to SAE State Machine
Mechanism to update current session parameters
802.11ba Architecture Discussion
CCMP Nonce Construction
CID#89-Directed Multicast Service (DMS)
Shielding applications from an untrusted cloud with Haven
Rekeying Protocol Fix Date: Authors: Month Year
Mesh Security Proposal
Power Efficiency for Individually Addressed Frames Reception
Responses to Clause 5 Comments
Beacon Protection Date: Authors: July 2018 July 2018
Considerations on MU-MIMO Protection in 11ac
doc.: IEEE /1072r0 Dan Harkins Trapeze Networks
doc.: IEEE /1072r0 Dan Harkins Trapeze Networks
Beacon Protection Date: Authors: May 2018 January 2018
MBCA and Beacon Timing element clean up
Thinking About the Site Report
Use of EAPOL-Key messages
Considerations on post wake-up sequences
Pekko Orava, Henry Haverinen, Simon Black (Nokia)
TGu/TGv Joint Meeting Date: Authors: May 2008 Month Year
19, Yangjae-daero 11gil, Seocho-gu, Seoul , Korea
Site Report Conceptual Model
Peer Traffic Indication enhancements
Discussion on TESLA Based Frame Authentication
Presentation transcript:

IEEE 802.11k Security: A Conceptual Model Month 2004 doc.: IEEE 802.11-04/0724r0 July 2004 IEEE 802.11k Security: A Conceptual Model Bernard Aboba Microsoft Bernard Aboba, Microsoft

July 2004 Overview Before proposing an appropriate security scheme for 802.11k, we need to articulate the threat model – what we are trying to protect against. The primary threats to RRM are bad measurements. This is not a classic “denial of service” attack! We also need to understand the deployment implications Can implemented ciphersuites be reused? Can RRM support be retrofit in existing NIC drivers? Bernard Aboba, Microsoft

July 2004 Basic Principles Radio Resource Measurement support is orthogonal to security. RRM can be used with any level of security (even open auth) RRM support should be easily retrofit on existing drivers IEEE 802.11k security needs to leverage implemented ciphersuites Adding ciphersuites creates deployment barriers Subtracting ciphersuites lowers security Many RRM security issues are not addressed by transmission security. Measurements are only a “hint”. Bad Measurements cannot be eliminated by security, only heuristics. IEEE 802.11k implementations need to validate measurements whether or not frames are protected Just because a measurement is protected doesn’t mean it’s correct! Bernard Aboba, Microsoft

July 2004 Challenges Addressing DoS attacks in 802.11k does not lessen the vulnerability of 802.11 systems as a whole Many DoS threats unaddressed by IEEE 802.11i Many IEEE 802.11k DoS attacks cannot be eliminated by cryptography, only heuristics Bernard Aboba, Microsoft

Measurements as “Hints” July 2004 Measurements as “Hints” Bad measurements are likely Can result from poor calibration, stale data, timing errors, etc. Robustness is the core requirement, not cryptography STAs and APs need to be robust against misleading measurements STAs and APs cannot trust IEEE 802.11k frames, even when security is in use. Conclusion: IEEE 802.11k implementations must not assume that frames transmitted securely are correct! Bernard Aboba, Microsoft

Bad Measurements Require Heuristics July 2004 Bad Measurements Require Heuristics Cryptography cannot guarantee accurate measurements Security services (authentication, integrity, confidentiality) only ensure that bad measurements are received as sent. Threats from bad measurements exist, even after security services are implemented Replace “attacker STA” by “uncalibrated/poorly implemented but authenticated STA” and the same attacks are possible Heuristics needed For rubustness, STAs MUST be able to recover from reception of incorrect data In a good implementation, service is not denied, only delayed Conclusion: security only reduces the quantity of 802.11k attacks, but does not affect their quality. Bernard Aboba, Microsoft

802.11k Useful At Any Security Level July 2004 802.11k Useful At Any Security Level 802.11k useful at any security level Customers want to use 802.11k with Open Auth, WEP, TKIP, CCMP, etc. Vendors may retrofit 802.11k on legacy NICs or APs No room in NVRAM for additional ciphersuites No additional CPU cycles for security Conclusions 802.11k should utilize existing security mechanisms rather than creating new ones 802.11k security can’t be mandatory to use. 802.11k not the right group to tackle security for management/action frames Handling action/management frame security in a new PAR would allow 802.11k to complete sooner, focus on the security threats unique to measurement Bernard Aboba, Microsoft

Example: The Neighbor Report July 2004 Example: The Neighbor Report The Neighbor Report data is third hand - APA providing the STA with information about APB The information is inherently suspect Neighbor report entry can become stale: APB was a neighbor, but was removed for maintenance; how long before APA removes it? Neighbor report entry can be polluted: APB was (incorrectly) submitted by STA in a Beacon Report, APA didn’t validate the entry with another STA or with its “Authorized AP list” before including APB in the Neighbor Report. Neighbor report has limited “shelf life”: it’s only useful prior to scanning. Bernard Aboba, Microsoft

Neighbor Report Robustness July 2004 Neighbor Report Robustness A STA may choose to ignore part or all of the measurements provided The STA might validate the neighbor report using other mechanisms (active or passive scan) The STA might ignore part or all of the neighbor report A STA MUST be robust against misleading information. Example: A STA should not “blacklist” APs based on the Neighbor Report “Bad” APs are just lower priority, not “off limits”. When information in the Neighbor Report conflicts with other sources, the other sources (scan, 4-way handshake, etc.) are definitive. Once the STA scans, it behaves the same way it would if there were no Neighbor Reort. The Neighbor Report has a very short “shelf life” Bernard Aboba, Microsoft

Deployment Issues Separate RRM Security Negotiation July 2004 Deployment Issues Separate RRM Security Negotiation Requires confirmation in 4-way handshake or the security negotiation is insecure. Driver needs to pass up RRM security negotiation results to operating system to enable confirmation New OIDs required; current WPA2 driver model does not support this! End result: substantial delays until 802.11k can be supported Cleaner to leverage 802.11i security negotiation Legacy driver support Many of today’s NIC drivers unlikely to be modified to support RRM Data frame encapsulation enables RRM support to be added in the OS Enables performance improvements for legacy drivers. Bernard Aboba, Microsoft

Data Frame Proposal Pros Cons July 2004 Data Frame Proposal Pros No changes to existing security mechanisms. RRM uses implemented ciphersuites. No modifications to 4-way handshake. No additional text in 802.11k specification. Compatible with WPA2 driver model. Enables sending of RRM frames over the DS in future. Cons Requires allocation of new Ethertype Experimental Ethertype used until actual Ethertype allocated Bernard Aboba, Microsoft

July 2004 Feedback? Bernard Aboba, Microsoft