Doc.: IEEE 802.11-00/684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1259r0 Submission Nov 2009 Michael Bahr, Siemens AGSlide 1 RFI Tüddelkram Date: Authors:
Advertisements

Doc.: IEEE /410 Submission November 2000 Duncan Kitchin, IntelSlide 1 A Network Enrollment Protocol Duncan Kitchin, Intel.
Doc.:IEEE /540ar0 Submission November 2001 Albert Young, Bob OHara Slide 1 A Re-Key Proposal Albert Young 3Com Corporation Santa Clara, CA
Doc.: IEEE /0527r0 Submission March 2010 Slide 1 A Periodic 5 MHz Measurement Pilot for Channel Scan Date: Authors:
Doc.: IEEE c Submission March, 2008 Inha Univ.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /1120r2 Submission September 2008 Guido R. Hiertz et al., PhilipsSlide 1 Terminology changes in a nutshell … Date: Authors:
Doc.: IEEE /1191r5 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 AP Architecture Thoughts Mike Moreton, STMicroelectronics.
Submission doc.: IEEE /0325r0 March 2012 Slide 1 TIM Enhancement With Group Bits Date: Authors: Zhong-Yi Jin, Nokia.
Block Cipher Modes of Operation and Stream Ciphers
Doc.: IEEE /0836r2 Submission July 2008 Dan Harkins, Aruba NetworksSlide 1 Changes to SAE State Machine Date: Authors:
Doc.: IEEE /2078r0 Submission July 2007 Matthew Gast, Trapeze NetworksSlide u and Emergency Services Notice: This document has been prepared.
1 November, 2002 doc:.: /480r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /380r0 Submission May 2002 Duncan Kitchin, IntelSlide WG Assigned Numbers Authority Duncan Kitchin Intel Corporation.
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 1 Re-authentication when Roaming Dan Harkins.
Doc.: IEEE /0618r2 Submission May 2014 Yunsong Yang, HuaweiSlide 1 TGaq CAG Number IE Date: Authors:
Doc.: IEEE /0027r1 Submission January 2012 Yongho Seok, LG ElectronicsSlide 1 IP configuration for fast initial link setup Date: Authors:
Doc.: IEEE /318r0 Submission May 2002 Martin Lefkowitz, Texas InstrumentsSlide 1 Implicit Initialization Vectors Martin Lefkowitz, Texas Instruments.
Doc.: IEEE /1550r1 Submission Nov 2011 Zander, I2R SingaporeSlide 1 Extension of AID and TIM to Support 6000 STAs in ah Date:
Doc.: IEEE /1106r0 Submission September 2012 Osama Aboul-Magd, Huawei TechnologiesSlide 1 A Short-Header Frame Format Date: Authors:
Doc.: IEEE k Submission September 2003 Martin Lefkowitz, Trapeze NetworksSlide 1 Directed Probe Request With No Response Option Martin.
ZTE corporation doc.: IEEE /1086r2 September 2012 Submission TIM Compression for No Buffered Unicast Traffic Date: Slide 1 Authors:
Doc.: IEEE /0608r2 Submission May 2012 Shoukang Zheng et. al, I2R, SingaporeSlide 1 Low-Power PS-Poll Date: Authors:
Submission doc.: IEEE 11-12/1329r0 PS-Poll for Downlink Bufferable Units Date: Slide 1Eric Wong, Broadcom November 2012 Authors:
Slide 1 doc.: IEEE /1092r0 Submission Simone Merlin, Qualcomm Incorporated September 2010 Slide 1 ACK Protocol and Backoff Procedure for MU-MIMO.
Doc.: IEEE /1190r2 September 2014 Submission Kaiying Lv (ZTE) Frame Exchange Control for Uplink Multi-user transmission Slide 1 Date:
IPv6 Victor T. Norman.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
Shambhu Upadhyaya Security – AES-CCMP Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 13)
Doc.: IEEE /684r0 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks.
Doc.: IEEE /1288r1 Submission November 2010 Sameer Vermani, QualcommSlide 1 Frame Format for GroupID Management Date: Authors:
Doc.: IEEE /2491r00 Submission September 2007 D. Eastlake (Motorola), G. Hiertz (Philips)Slide 1 WLAN Segregated Data Services Date:
Submission doc.: IEEE /1034r4 September 2012 Jeongki Kim, LG ElectronicsSlide 1 Enhanced scanning procedure for FILS Date: Authors:
Submission doc.: IEEE /0890r0 July 2012 Fei Tong, CSRSlide ah Multi-User Aggregation PDU Date: 2012-July-16 Authors:
Doc.: IEEE /1294r0 Submission November 2008 Kenan Xu, Nortel NetworksSlide 1 Enhancing BSS Transition Management Date: Authors:
Doc.: IEEE /1378r0 Submission November 2008 Darwin Engwer, Nortel NetworksSlide 1 Improving Multicast Reliability Date: Authors:
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE /0110r6 SubmissionLiwen Chu Etc.Slide 1 Frame Header Compression Date: Authors: Date: March, 2012.
Doc.: IEEE /0110r7 SubmissionLiwen Chu Etc.Slide 1 Frame Header Compression Date: Authors: Date: April, 2012.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
Doc.: IEEE /xxx Submission September 2003 Martin Lefkowitz, Trapeze NetworksSlide 1 Domain Signaling Martin Lefkowitz Trapeze Networks 5753 W.
Doc.: IEEE /0537r0 Submission May 2010 Kazuyuki Sakoda, Sony CorporationSlide 1 General frame format comment resolution overview Date:
IPv4 over IP CS Soohong Daniel Park Syam Madanapalli.
Doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 1 Protection of Action Frames Jon Edney Nokia
Security Enhancement to FTM
doc.: IEEE /xxxr0 Mike Moreton
WUR frame format follow-up
Motions to Address Some Letter Ballot 52 Comments
Martin Lefkowitz Trapeze Networks
WUR frame format follow-up
Key Descriptor Version in EAPOL Key Frames
Wake Up Frame to Indicate Group Addressed Frames Transmission
Multicast Replay Detection Fred Stivers, Texas Instruments
Multicast Replay Detection Fred Stivers, Texas Instruments
Multicast Replay Detection Fred Stivers, Texas Instruments
Discussion on Group ID Structure
WUR frame format follow-up
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Frame signaling options for Security.
Multicast Replay Detection Fred Stivers, Texas Instruments
WUR frame format follow-up
CID#89-Directed Multicast Service (DMS)
Discussion on Group ID Structure
Use of EAPOL-Key messages
Proposed Change to Intra-Mesh Congestion Notification Frame
WPA Coordination Changes
Encrypting Management Frames
Presentation transcript:

doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks

doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 2 Extended Keymap ID Current Encryption key Technology –Only 2 bits for 4 different key slots leaving a total of 4 keys per BSS per STA –Only 2 bits for 4 different key slots leaving a total of 4 keys per BSS for multicast/broadcast

doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 3 What if? We added a mechanism whereby we could use more than 4 keys per STA for Broadcast traffic. –A STA can receive secure multicast traffic based on application while still able to respond to multicast IP traffic like arp.

doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 4 Why Premium Subscriptions in the WISP, or carrier area –Pay Per view –Subscription broadcast data service An Administrator can determine if errors are caused by configured events or unconfigured events. A heterogenous environment can support multiple group keys for a more graceful transition to stronger encryption.

doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 5 How Add a field to the EAPOL Key Descriptor that indicates the key value in the encryption header of the MPDU format. – EAPOL Key messages have an 8 byte field that is reserved to zero. –802.1x already has a Key ID f field that is used for multiple group keys. Proposal is to make two of those bytes the Key ID fields

doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 6 How Assign some reserved bits in the encryption header to map a Key Id to a particular encryption key –There are 5 bits available between the key ID and TSC/IV fields of CCMP 5 bits for TKIP

doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 7 How Add Key Id field to MPDU format. –There are enough bits in the reserved field with 48 bit counter format –Noted Differences between CCMP and TKIP TKIP supports a 5 bit field CCMP supports a 12 bit field

doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 8 TKIP MPDU Format KID EX = Key ID Extension

doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 9 CCMP MPDU Format

doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 10 How Add SNMP MIB: –dot11numKeymapID Number of different key map IV a STA needs to keep track of. –dot11recievedFramesNoKeymap Indicates how many frames a STA has received for which it did not have the keymap ID. –A normal situation. Add appropriate logic to Pseudo code after the key has been looked up if that entry contains a key that is null discard the frame body and increment dot11WEPUndecryptableCount else if there is no key entry for keymap field in MPDU Increment dot11recievedFramesNoKeymap else attempt to decrypt with that key, incrementing dot11WEPICVErrorCount if the ICV check fails

doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 11 Conclusion Key IDs can be exended for both broadcast and unicast traffic with little change to the current SSN/TGI implementations