Doc.: IEEE 802.11-11/0877r0 Submission June 2011 802.11 WG Slide 1 TGs response to CN NB comments Date: 2011-06-17 Authors:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0960r1 Submission July 2012 Stephen McCann, RIMSlide 1 ISD SG Closing Report Date: Authors:
Advertisements

Doc.: IEEE /1326r1 Submission November 2008 Donald Eastlake 3rd, MotorolaSlide 1 TGs Process, November Date: Author:
Doc.: IEEE /1259r0 Submission Nov 2009 Michael Bahr, Siemens AGSlide 1 RFI Tüddelkram Date: Authors:
Doc.: IEEE /410 Submission November 2000 Duncan Kitchin, IntelSlide 1 A Network Enrollment Protocol Duncan Kitchin, Intel.
Doc.: IEEE /0413r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 A Study Group for Enhanced Security Date: Authors:
Doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 1 A vendor specific plan for centralized security Date: Authors:
Doc.: IEEE /1263r0 Submission November 2008 Dan Harkins, Aruba NetworksSlide 1 A Modest Proposal…. Date: Authors:
Doc.: IEEE /0953r0 Submission Sept 2009 Adrian Stephens, Intel CorporationSlide TGmb Editor Report - Sept 2009 Date: Authors:
Doc.: IEEE /0953r1 Submission November 2009 Adrian Stephens, Intel CorporationSlide TGmb Editor Report - Nov 2009 Date: Authors:
Doc.: IEEE /1184r0 Submission Sept 2011 Robert Stacey, AppleSlide TGac Editor Report – Sept 2011 Date: Authors:
Doc.: IEEE /2079r0 Submission July 2007 Terry Cole, AMDSlide 1 WG Technical Editors Opening Report (July) Date: Authors:
Doc.: IEEE /2389r0 Submission Sept 2007 Terry Cole, AMDSlide 1 WG Technical Editors Opening Report (September) Date: Authors:
Doc.: IEEE /0445r0 Submission May 2009 Adrian Stephens, Intel CorporationSlide TGn Editor Report May 2009 Date: Authors:
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Doc.: IEEE /xxxxr0 Submission May 2010 Jarkko Kneckt, NokiaSlide 1 M-QoS Comments Date: Authors:
Doc.: IEEE /XXXr0 Submission March, 2004 Matthew Sherman, BAE SystemsSlide 1 LMSC Policy and Procedures Update Date: March 14 th, 2005 Author:
Doc.: IEEE /0358r0 Submission March 2013 Osama Aboul-Magd (Huawei Technologies)Slide 1 TGac March 2013 Closing Report Date: Authors:
Doc.: IEEE /1226r0 Submission September 2013 Osama Aboul-Magd (Huawei Technologies)Slide 1 TGac September 2013 Closing Report Date:
Doc.: IEEE /464r0 Submission November, 2001 John Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: IEEE /141r0 Submission July 2012 Tuncer Baykas, NICTSlide TG 1 July Session Closing Report Notice: This document has been prepared.
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 1 Re-authentication when Roaming Dan Harkins.
Doc.: IEEE /1160 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA
Doc.: IEEE /2547r2 Submission September 2007 Slide 1 Reconsidering RA-OLSR Date: Authors: J. Jetcheva, Firetide, et al.
Doc.: IEEE /108r2 Submission May 2012 Tuncer Baykas, NICTSlide TG 1 May Session Closing Report Notice: This document has been prepared.
Doc.: IEEE /1125r0 Submission September 2010 Marc Emmelmann, Fraunhofer FOKUSSlide 1 How does the (new) Fast Initial Link Set- Up PAR address.
Doc.: IEEE /0358r0 SubmissionRobert Stacey, Intel TGac Editor’s Report Date: Authors: Slide 1 March 2011.
Doc.: IEEE /0674r0 Submission June 2009 Bruce Kraemer, Marvell; Adrian Stephens, Intel Corporation Slide 1 P802.11n report to EC on request for.
Doc.: IEEE /1294r0 Submission September 2011 Rolf de Vegt, QualcommSlide 1 Spec Framework Text for.11ah Bandwidth Modes Date: Authors:
Doc.: IEEE /1345r0 Submission November 2013 Jiamin Chen, HuaweiSlide 1 Dynamic Channel Transfer(DCT) Procedure for IEEE aj ( 60GHz New Technique.
Doc.: IEEE 802 EC-12/0026r2 Submission July 2012 Jon Rosdahl, CSRSlide 1 Meeting Manager - Proposed Changes to OM and Chair’s Guideline Date:
Doc.: Submission1 IEEE Motions in November Plenary DCN: Title: Request for EC Conditional Approval Date Submitted:
Doc.: Submission1 IEEE Motions in November Plenary DCN: Title: Request for EC Conditional Approval Date Submitted:
Doc.: IEEE /1457r0 Submission December 2010 David Halasz, OakTree WirelessSlide 1 Frequency Hopping Review and IEEE ah Date:
Doc.: IEEE /0564r0 Submission May 2014 Marc Emmelmann, SelfSlide 1 Results of LB 201 on TGai D2.0 Date: Authors:
Doc.: IEEE /0995r0 Submission July 2011 Nir Shapira, Celeno Communications Determination of Ng in MU mode (CID 3432) Date: Authors:
Doc.: IEEE /0440r1 Submission July 2013 Jiamin Chen, HuaweiSlide 1 Dynamic Channel Transfer(DCT) procedure for IEEE aj ( 60GHz ) Date:
March 2015 Doc.: IEEE NNN Submission Karen Randall, Randall Consulting Slide 1 IEEE 802 Response to comments on IEEE 802.1Q-2014 and IEEE 802.1Xbx-2014.
Doc.: IEEE /0660r0 Submission May 2015 Stephen McCann, BlackBerrySlide 1 TGaq Closing Report Date: Authors:
Doc.: IEEE 11-14/1213r0 September 2014 SubmissionSlide 1 Mark Hamilton, Spectralink AP Architectural concepts, and Distribution System Access Function.
Doc.: IEEE /1110r0 Submission September 2008 Stephen McCann, RokeSlide 1 TGu Motions Date: Authors:
Doc.: IEEE P /187r1 Submission January 2009 Donald Eastlake 3rd, MotorolaSlide 1 TGs Los Angeles Closing Report Date: Authors:
Doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 1 Refining the Security Architecture Date: Authors:
Doc.: IEEE /0123r0 Submission January 2009 Dan Harkins, Aruba NetworksSlide 1 Secure Authentication Using Only A Password Date:
Doc.: IEEE /1445r1 Submission TGad November 2011 Closing Report November 2011 Eldad Perahia, Intel CorporationSlide 1 Date: Authors:
Doc.: Submission1 IEEE Motions in March Plenary DCN: Title: Request for EC Unconditional Approval Date Submitted:
Doc.: IEEE /0333r1 Submission May 2014 TGaj Editor Report Jiamin Chen, HuaweiSlide 1 Date: Author:
Doc.: IEEE /1147r1 Submission November 2009 David Halasz, AclaraSlide 1 Path Protection Date: Authors:
Submission May 2016 doc.: Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ e Status Report.
Secure PSK Authentication
P802.11aq Waiver request regarding IEEE RAC comments
Secure PSK Authentication
November 2010 doc.: IEEE /0872r3 November 2010
doc.: IEEE <doc#>
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG3f RevCom request support package.
Mutual Authentication
doc.: IEEE <doc#>
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4h Closing Report for Orlando Mar 2010.
Traffic Class Control in MBSS
doc.: IEEE <doc#>
Submission Title: TG-VLC Closing Report for LA January 2010
November 2010 doc.: IEEE /0872r4 November 2010
Submission Title: [TGn Liaison Report] Date Submitted: [20 June 2006]
doc.: IEEE <doc#>
doc.: IEEE <doc#>
Jul 15, /15/10 07/15/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4g-SUN Closing Report.
P802.11aq Waiver request regarding IEEE RAC comments
JTC1 ad hoc closing report (May11)
TGs Denver Closing Report
Submission Title: [TGn Liaison Report] Date Submitted: [20 June 2006]
Presentation transcript:

doc.: IEEE /0877r0 Submission June WG Slide 1 TGs response to CN NB comments Date: Authors:

doc.: IEEE /0877r0 Submission June WG Slide 2 Abstract IEEE Task Group ‘s’ (Mesh Networking) received comments from the China NB on its draft. Their resolutions are discussed here.

doc.: IEEE /0877r0 Submission June WG China NB Comments on IEEE s and Their Resolutions There are numerous editorial mistakes in the draft. (Specific examples were given). The specific mistakes were corrected and a complete pass was made on the draft fixing several more editorial errors. A professional editor from IEEE SA will be assigned to edit the draft after Sponsor Balloting closes to resolve any remaining editorial issues. Slide 3

doc.: IEEE /0877r0 Submission June WG China NB Comments on IEEE s and Their Resolutions What are the mechanisms against man-in-the-middle attack in a Mesh Network? The mandatory-to-implement security protocol (SAE) performs mutual authentication and is resistant to passive attack, active attack, and dictionary attack. A man-in-the-middle would be unable to impersonate another mesh point nor could it glean any secret information by observing exchanges between legitimate mesh points. A man-in-the-middle would be unable to launch an attack. Slide 4

doc.: IEEE /0877r0 Submission June WG China NB Comments on IEEE s and Their Resolutions Because the authentication credential is a shared secret (word, key, code, or phrase) it may be necessary to add support for authentication using a certificate. A proposal was made to introduce an protocol that authenticated a Diffie-Hellman exchange with digital certificates. The proposal failed to garner enough support for inclusion in the draft. The effort can be taken up again, and any and all help is solicited to encourage its adoption. Slide 5

doc.: IEEE /0877r0 Submission June WG China NB Comments on IEEE s and Their Resolutions Is the Root Mesh STA the same as a Mesh Portal (now named a Mesh Gate)? Conceptually, a Root Mesh STA is the entity used as a root for proactive tree building (routing); a Mesh Gate is the entity that has access to the DS as well as the MBSS. In practice they may be the same, but they need not be. Slide 6

doc.: IEEE /0877r0 Submission June WG China NB Comments on IEEE s and Their Resolutions Is a Mesh STA a Mesh Portal (now called a Mesh Gate) or a terminal point? A Mesh STA is a STA that supports mesh functionality as defined in IEEE s. That functionality can include the requirements to be a Mesh Gate but it is not required to include it. Not all Mesh STAs are Mesh Gates but all Mesh Gates are Mesh STAs. Slide 7

doc.: IEEE /0877r0 Submission June WG Summary Task Group ‘s’ (Mesh Networking) thanks the China NB for its comments on, and review of, the TGs draft All comments were resolved in Palm Springs, CA, in May The Task Group feels no further disposition is necessary. Assistance in adding a certificate-based authentication protocol is requested The authentication protocol added by Task Group ‘s’ (SAE) can be used as a blue-print– authentication prior to association followed by the 4-way handshake, negotiation of the domain parameter set to use with Diffie-Hellman, use of a new RSN AKM and ciphersuite, etc. The exchange can be modeled on existing, provably secure exchanges. The old proposal can be polished and resubmitted. Additional support of the proposal can help it be adopted into the IEEE standard. Slide 8

doc.: IEEE /0877r0 Submission June WG Slide 9 References s-p802-11s-sponsor-ballot-4 th -recirc-comments.xls