Site Report Conceptual Model

Slides:



Advertisements
Similar presentations
IEEE P802 Handoff ECSG Submission July 2003 Bernard Aboba, Microsoft Detection of Network Attachment (DNA) and Handoff ECSG Bernard Aboba Microsoft July.
Advertisements

Doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 1 Re-authentication when Roaming Dan Harkins.
Doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 1 Coexistence of Legacy & RSN STAs in Public WLAN Byoung-Jo “J” Kim AT&T Labs-Research.
Submission doc.: IEEE 11-12/0281r0 March 2012 Jarkko Kneckt, NokiaSlide 1 Recommendations for association Date: Authors:
Doc.: IEEE /0201r0 Submission March 2005 Michael Montemurro and Matt SmithSlide 1 Communications with a target AP prior to roaming. Notice: This.
Doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 1 Network Selection Bernard Aboba Microsoft
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
Doc.: IEEE /109r1 Submission July 2002 J. Edney, H. Haverinen, J-P Honkanen, P. Orava, Nokia Slide 1 Temporary MAC Addresses for Anonymity Jon.
1 Network Selection Problem Definition Draft-ietf-eap-netsel-problem-01.txt Jari Arkko Bernard Aboba.
Doc.: IEEE /402r0 Submission May 2005 Stefano M. FaccinSlide 1 Notice: This document has been prepared to assist IEEE It is offered as.
Doc.: IEEE k Submission July 2004 Bernard Aboba, MicrosoftSlide 1 IEEE k Security: A Conceptual Model Bernard Aboba Microsoft.
Robust Security Network (RSN) Service of IEEE
Support for Dynamic Channel Selection (DCS) in v
Wireless Protocols WEP, WPA & WPA2.
WUR-based Broadcast Reference Signal
Jari Arkko Bernard Aboba
802.11r Requirements Discussion
AP Discovery Information Broadcasting
WUR Discovery Frame Content
WUR Discovery Frame Content
TSN Architecture Mike Moreton, STMicroelectronics
Maryna Komarova (ENST)
Network Selection Bernard Aboba Microsoft
Coexistence of Legacy & RSN STAs in Public WLAN
WUR Discovery Frame Content
BSS Scanning through Low Power Radio
BSS Transition Improvements
Consideration on WUR frame for Fast Scanning
Consideration on WUR frame for Fast Scanning
Advertising WUR Discovery Frame Related Info for Fast Scanning
Use of EAPOL-Key messages during pre-auth
Multiple Frequency Channel Scanning
Consideration on WUR frame for Fast Scanning
WUR Discovery Frame Content
Wake up packet contents
BSSID Info Field Comment resolution
Requirements for Network Selection
WUR Discovery Frame Content
WUR Discovery Frame Content
July 2002 Threat Model Tim Moore Tim Moore, Microsoft.
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
IEEE k Security: A Conceptual Model
A Review of the Site Reporting Protocol in IEEE802.11k Draft 0.2
WUR Discovery Frame Content
Jesse Walker and Emily Qi Intel Corporation
Roaming Keith Amann, Spectralink
Network Selection Bernard Aboba Microsoft
Month Year doc.: IEEE yy/xxxxr0
AP Discovery Discussion
802.11ba Architecture Discussion
Analysis of Roaming Techniques
RRM and Roaming Support
WUR Discovery Frame Content
Rekeying Protocol Fix Date: Authors: Month Year
Network Discovery Mechanism
Fast Roaming Using Multiple Concurrent Associations
Proposal for authentication cluster
Beacon Protection Date: Authors: July 2018 July 2018
Using The Site Report to Target Potential Roam Candidates
doc.: IEEE /1072r0 Dan Harkins Trapeze Networks
FILS Frame Content Date: Authors: February 2008
Power Efficient WUR AP Discovery
Thinking About the Site Report
Use of EAPOL-Key messages
Reserving STA Date: Authors: January 2011 January 2011
Month Year doc.: IEEE yy/xxxxr0
BSS Transition with Bearing
Proposal for Diagnostics and Troubleshooting
Comment Resolution Motions
Presentation transcript:

Site Report Conceptual Model Month 2004 doc.: IEEE 802.11-04/xxxr0 May 2004 Site Report Conceptual Model Bernard Aboba Microsoft Bernard Aboba, Microsoft

May 2004 Problem Statement The primary purpose of the Site Report is to provide measurements to the STA prior to scanning, which enable the STA to optimize aspects of roaming: Scanning Pre-authentication Others? Are there secondary purposes? Bernard Aboba, Microsoft

Basic Principles The Information in the Site Report is only a “hint”. May 2004 Basic Principles The Information in the Site Report is only a “hint”. The information could be wrong, so the STA needs to be robust against misleading Site Reports. This is true whether the Site Report is authenticated or not. The STA will always scan prior to roaming (passive or active). At a minimum, the STA needs to determine which APs it can communicate with prior to roaming. Bernard Aboba, Microsoft

Robustness Against Bad “Hints” May 2004 Robustness Against Bad “Hints” A STA may choose to ignore part or all of the Site Report. The STA might investigate the first few entries, fail to find an AP of interest and do a full scan. The STA might investigate all the entries, regardless of any prioritization implied in the Site Report. A STA MUST be robust against misleading information. A STA should not “blacklist” APs based on the Site Report “Bad” APs are just lower priority, not “off limits”. When information in the Site Report conflicts with other sources, the other sources (scan, 4-way handshake, etc.) are definitive. Once the STA scans, it behaves the same way it would if there were no site report. The Site Report has a very short “shelf life” Bernard Aboba, Microsoft

Examples of “Bad Hints” May 2004 Examples of “Bad Hints” APA provides irrelevant information in the site report STA was headed north, APA provided info on APs to the south. APA provided info on APs supporting IEEE 802.11a, but STA only support 802.11b. Result: STA does a conventional scan, is no worse off. APA has stale information on APB STA will discover correct capabilities when it scans or receives IEs in the 4-way handshake Lesson: STA can benefit by scanning for low priority APs. Need to be careful how APA obtains information provided in the Site Report Information obtained from STAs can be stale, pollute APA cache Need to carefully define what info STAs provide APA priorities differ from STA priorities Example: APA thinks pre-authentication is not as good as other schemes, prioritizes APB lower… STA only supports pre-authentication, but APA has no way to know this. Better for APA to provide the info, let the STA decide Bernard Aboba, Microsoft

Site Report vs. Scanning Month 2004 doc.: IEEE 802.11-04/xxxr0 May 2004 Site Report vs. Scanning The Site Report can provide information that the STA needs prior to scanning. If the information isn’t required prior to scanning, it should be considered for the Beacon/Probe Response, not the Site Report. Even though the Site Report is more scalable than the Beacon/Probe Response, this doesn’t imply that the Site Report should replace existing scan mechanisms. All STAs and APs implement the Beacon/Probe Response. Not all APs or STAs will implement the Site Report. Bernard Aboba, Microsoft

Implementation Choices May 2004 Implementation Choices A STA may choose to scan in the background. The scan may not be on the critical path for roaming, but reducing unnecessary scanning is still useful. AP may not have enough buffers to avoid losing packets when frequently placed into power save mode. A STA may choose to send Site Report queries and receive responses in the background. The STA may wish to obtain a Site Report every DT, regardless of the status of the current point of attachment. Enables a STA to handle a disassociation at any time, without additional on-the-wire functionality. Bernard Aboba, Microsoft

A Conceptual model At Point 1, the STA obtains the Site Report. May 2004 A Conceptual model Channel 11 Channel 6 c v 2 1 D APB STA APA At Point 1, the STA obtains the Site Report. At Point 2, the STA scans. Shortly thereafter, the STA roams from APA to APB. Bernard Aboba, Microsoft

What Information Is Needed Early? May 2004 What Information Is Needed Early? Information related to pre-authentication. By the time the STA gets to point 2, it may be too late to complete pre-authentication successfully. Information related to scanning. Optimized scanning can enable the STA to pick up APB earlier, particularly if scanning occurs in the background and traffic is heavy. Bernard Aboba, Microsoft

What Information Do We Need? May 2004 What Information Do We Need? AP BSSIDs, Channels, SSIDs A STA can function with only this information: Sufficient for scan optimization STA can try pre-auth to all APs, regardless of whether they support it or are reachable. Bernard Aboba, Microsoft

What Information Might We Want? May 2004 What Information Might We Want? Information to allow the STA to prioritize potential roaming candidates STA may not have the resources (or time) to “investigate” all potential roaming candidates AP may not be aware of all STA capabilities, therefore cannot prioritize potential roaming candidates the same way the STA would. Examples: RSN IE Match Whether an AP supports pre-authentication, WPA2, etc. Reachability Whether an 802.1X pre-authentication packet sent by the STA can reach the AP. Bernard Aboba, Microsoft

Thinking About Security May 2004 Thinking About Security The Site Report may be needed even in networks where security is not in use. Even Open networks may want to optimize scanning! STAs need to be robust against bad “hints” regardless of whether the Site Report is authenticated Question: Should security be mandatory to use for the Site Report? Bernard Aboba, Microsoft

Case Study: “Trusted” Bit May 2004 Case Study: “Trusted” Bit Meaning: APB is a member of the ESS, according to APA. What does a STA do with this? STA may choose to prefer a “Trusted” AP. STA may also choose to ignore the “Trusted” bit. If APA is truly “untrusted” then pre-auth will fail. If STA has resources to try pre-auth to “untrusted” APs, it may not care about the value of the “Trusted” bit. What does the STA not do with it? Refuse to talk to APA : enables a DoS attack Bernard Aboba, Microsoft

May 2004 Feedback? Bernard Aboba, Microsoft