Doc.: IEEE 802.11-11/0780r1 Submission NameAffiliationsAddressPhoneemail Ping Fang Zhiming Ding Phillip Barber Rob Sun Huawei Technologies Co., Ltd. Bldg.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1160 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA
Advertisements

Using Upper Layer Message IE in TGai
Doc.: IEEE /1436r0 Submission NameAffiliationsAddressPhone Robert Sun Huawei Technologies Co., Ltd. Suite 400, 303 Terry Fox Drive, Kanata,
Doc.: IEEE /0041r1 Submission NameAffiliationsAddressPhone Robert Sun; Yunbo Li; Edward Au; Phillip Barber Huawei Technologies Co., Ltd.
Doc.: IEEE /0567r1 Submission May 2012 Huawei Slide 1 Multiple Frequency Channel Scanning Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE / ai Submission NameAffiliationsAddressPhone Phillip BarberHuawei Technologies Co., Ltd Alma Rd, Ste 500 Plano,
Submission doc.: IEEE ai May 2012 InterDigital, KDDI, Nokia, Huawei, Intel, Qcomm Slide 1 Proposed SFD Text for ai Passive Scanning.
Doc.: IEEE /0550 Submission NameAffiliationsAddressPhone Kiseon RyuLG Electronics10225 Willow Creek Rd, San Diego, CA, 92131, USA +1
Doc.: IEEE /933r6 Submission July 2012 Fang Xie (CMCC)Slide 1 Access Control Mechanism for FILS Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1042r3 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang,
Doc.: IEEE /1042 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang, Kyungki,
Doc.: IEEE /0249r0 Submission March 2012 Slide 1Lin Cai et al,Huawei. Differentiated Association Service Provisioning in WiFi Networks Date: 03/02/2012.
Doc.: IEEE /1054r0 Submission Sep Santosh Pandey (Cisco)Slide 1 FILS Reduced Neighbor Report Date: Authors:
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Doc.: IEEE /0067r0 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 Active Scanning Time Notification Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE ai March 2012 InterDigital, KDDI, Nokia, Huawei, IntelSlide 1 Proposed SFD Text for ai Passive Scanning Improvement.
Doc.:IEEE /0259r4 Submission March 2012 Reducing Probe Responses for faster AP discovery Slide 1 Authors: March 2012 NameAffiliationsAddressPhone .
Doc.: IEEE /0897r0 SubmissionJae Seung Lee, ETRISlide 1 Active Scanning considering Operating Status of APs Date: July 2012.
Doc.: IEEE / ai Submission Nov 2011 Huawei Technologies Co. LtdSlide 1 Broadcast Probe Response in TGai Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0547r1 Submission May 2012 Dapeng Liu, China MobileSlide 1 Extend 802.1X for higher layer configuration in FILS Date:
Doc.: IEEE /0158r2 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 Proposed Additions to SFD Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /01047r2 Submission NameAffiliationsAddressPhone Ping Fang Huawei Technologies Co., Ltd. Bldg 7, Vision Software Park, Road Gaoxin.
Doc.: IEEE / ai Submission NameAffiliationsAddressPhone Phillip BarberHuawei Technologies Co., Ltd Alma Rd, Ste 500 Plano,
Submission doc.: IEEE /1034r4 September 2012 Jeongki Kim, LG ElectronicsSlide 1 Enhanced scanning procedure for FILS Date: Authors:
Doc.:IEEE /0258r7 Submission May 2012 Reducing Probe Responses for faster AP discovery Slide 1 Authors: May 2012 NameAffiliationsAddressPhone .
Submission doc.: IEEE ai September 2012 Lei Wang, InterDigital CommunicationsSlide 1 Ad Hoc Discussions of ai Passive Scanning during.
Submission doc.: IEEE ai May 2012 Lei Wang, InterDigital CommunicationsSlide 1 Proposed SFD Text for ai AP/STA Initiated FILS Optimizations.
Doc.: IEEE /1042r1 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang,
Doc.: IEEE /278r0 Submission NameAffiliationsAddressPhone Ping Fang Huawei Technologies Co., Ltd. Bldg 7, Vision Software Park, Road Gaoxin.
Submission doc.: IEEE 11-11/0761r0 July 2012 Katsuo Yunoki, KDDI R&D LaboratoriesSlide 1 Operating Channels Information Date: Authors:
Doc.: IEEE /0080r0 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 AP Admission Control in TGai Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0568r0 Submission May 2012 Young Hoon Kwon, Huawei Slide 1 AP Discovery Information Broadcasting Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0263r1 SubmissionJae Seung Lee, ETRI Spec Framework Proposal: Selection of the AP for Scanning Date: Slide 1 March 2012.
Submission doc.: IEEE ai May 2012 InterDigital Slide 1 Passive Scanning Improvement Ad Hoc Report Date: Authors:
Submission doc.: IEEE 11-12/1051r2 Multi-channel information for AP discovery 1 September 2012 HTC Corp. NameAffiliationsAddressPhone Jing-Rong HsiehHTC.
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Doc.: IEEE /01047r4 Submission NameAffiliationsAddressPhone Ping Fang Huawei Technologies Co., Ltd. Bldg 7, Vision Software Park, Road Gaoxin.
Doc.: IEEE /1426r00 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi- tech District,
Doc.: IEEE /0158r0 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 Proposed Additions to SFD Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /xxxr0 Submission Nov Jonathan Segev (Intel)Slide 1 Rapid Scanning Procedure Date: Authors:
Doc.: IEEE /1426r02 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District,
Doc.:IEEE /0258r6 Submission May 2012 Reducing Probe Responses for faster AP discovery Slide 1 Authors: May 2012 NameAffiliationsAddressPhone .
Doc.: IEEE /0269r1 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District, Chengdu,
Doc.: IEEE /0294r2 Submission March 2012 Jonathan Segev (Intel)Slide 1 Active Scanning Reply Window Date: Authors:
Access Control Mechanism for FILS
Month Year doc.: IEEE yy/xxxxr0 May 2012
AP discovery with FILS beacon
Proposed SFD Text for ai Link Setup Procedure
Discussions on FILS Authentication
FILS presentation on High Level Security Requirements
AP Discovery Information Broadcasting
Fast Authentication in TGai
Triggering the Broadcast Probe Response
EAP based Message Flow Optimization for FILS
Using Upper Layer Message IE in TGai
Improvement on Active Scanning
Scanning from Specific Channel
Access Control Mechanism for FILS
Listen to Probe Request from other STAs
Access Control Mechanism for FILS
Fast Authentication in TGai
Access Control Mechanism for FILS
Performance Analysis of authentication and authorization
Differentiated Association Service Provisioning in WiFi Networks
Triggering the Broadcast Probe Response
Month Year doc.: IEEE yy/xxxxr0 May 2012
Differentiated Initial Link Setup (Follow Up)
Scanning from Specific Channel
Fast passive scan for FILS
Month Year doc.: IEEE yy/xxxxr0 May 2012
Presentation transcript:

doc.: IEEE /0780r1 Submission NameAffiliationsAddressPhone Ping Fang Zhiming Ding Phillip Barber Rob Sun Huawei Technologies Co., Ltd. Bldg 7, Vision Software Park, Road Gaoxin Sourth 9, Nanshan District, Shenzhen, Guangdong, China, Dapeng LiuChina Mobile32 Xuanwumen West Street Beijng, Xicheng District, China m EAP based Message Flow Optimization for FILS Date: July 2012 Slide 1 Authors: Huawei, China Mobile

doc.: IEEE /0780r1 Submission July 2012 Slide 2 Abstract This contribution proposes a Fast authentication proposal for FILS. This proposal is based on EAP and mainly focuses on the message optimization of conventional authentication, association, EAP and 4 way handshake. Huawei, China Mobile

doc.: IEEE /0780r1 Submission Conformance w/ TGai PAR & 5C July 2012 Huawei, China MobileSlide 3 Conformance QuestionResponse Does the proposal degrade the security offered by Robust Security Network Association (RSNA) already defined in ? No Does the proposal change the MAC SAP interface?No Does the proposal require or introduce a change to the architecture?No Does the proposal introduce a change in the channel access mechanism?No Does the proposal introduce a change in the PHY?No Which of the following link set-up phases is addressed by the proposal? (1) AP Discovery (2) Network Discovery (3) Link (re-)establishment / exchange of security related messages (4) Higher layer aspects, e.g. IP address assignment 3, 4

doc.: IEEE /0780r1 Submission Background This contribution is based on 1047r6 and updated based on discussion on1160r9, which merged with 1047 and proposes fast authentication for FILS using EAP/EAP-RP ; This contribution focuses on the optimization of message flows of conventional full EAP authentication and association, providing detailed explain of implementation problem received per discussion on 1160r9. Comments on this contribution can be updated into 1160r10. July 2012 Huawei, China MobileSlide 4

doc.: IEEE /0780r1 SubmissionHuawei, China MobileSlide 5 Conventional initial link setup July 2012 Authentication frames can be omitted as these two messages do nothing in the flow. But it would be good to start authentication for the state machine The AKM SuitType in Association Request frame indicates that whether a 802.1x authentication will be called. According to IEEE 802.1x and RFC 3748, the EAP- Request/Identity and EAP-Response/Identity messages can be omitted if the Authenticator can obtain Identify with other approachs. Some EAP methods only need one pair of EAP messages like EAP-AKA, but some others need multiple pair of messages. 4-way handshake is started by AP. AP will not accept any unexpected EAPoL-Key message in order to avoid DOS attacking. See sub-clause of x controlled port is unblocked here, when the AP believes the non-AP STA holds the same PTK.

doc.: IEEE /0780r1 SubmissionHuawei, China MobileSlide 6 Principle of FILS FILS shall be compatible with current standard, so Authentication and Association frames shall be remained to comply with current state definitions in subclause 10.3 of IEEE FILS shall not degrade the security currently offered by Robust Security Network Association (RSNA) already defined in IEEE , so 11ai shall make the most reuse of current mechanism e.g x and 4-way handshake and must be cautious in involving unproved new authentication scheme. Considering to interwork with other heterogeneous network e.g. 3GPP which is the most important 3G wireless communication network and in which the EAP-AKA/EAP-AKA’ authentication method is used only, so EAP must be supported in FILS. July 2012

doc.: IEEE /0780r1 SubmissionHuawei, China MobileSlide 7 Optimized EAP with concurrent PTK handshake Step 1: Non-AP STA indicates FILS with 802.1x is expected, and includes the User ID and EAPoL-Start message in Authentication First frame. The AP Generates an EAP-Response/ID message. So the pair of EAP-Req/ID and EAP- Resp/ID messages can be omitted on the air. Step 4: The AP receives an EAP-Request (1 st message of EAP method). The AP sends an Authentication Second frame to the non-AP STA and the EAP-Request message and an first message of 4-way handshake which includes ANonce are piggybacked in the frame. Step5: Extra EAP messages for some EAP methods are as normal EAPoL messages packed in data frames. Step7: Once the non-AP STA derived MSK, then it also derives PTK, it sends an Association Request frame to the AP and the last EAP- Response message and an second message of 4- way handshake which includes SNonce are piggybacked in the frame. Step 15: The AP sends Association Response frame. An EAP-Success and a third message of 4-way handshake are piggybacked in the frame. A quick DHCP exchange is suggested to be concurrent with Association frames. July 2012

doc.: IEEE /0780r1 SubmissionHuawei, China MobileSlide 8 PSK authentication under the same framework In principle, we don’t suggest designing FILS for WPA2-Personal case. But this architecture can be used for WPA2-Personal case, the same framework can work. The gray entities are remained in this figure to compare with Optimized EAP flow. Step 1 indicates FILS with PSK is expected. Step 2, 4 and 8 fulfill the first 3 steps of 4- way handshake in current standard. Current 4-way handshake mechanism is not changed just the last step of 4-way handshake is omitted. July 2012

doc.: IEEE /0780r1 SubmissionHuawei, China MobileSlide 9 Analysis of Optimized EAP based FILS Any EAP method can be deployed e.g. EAP- AKA/EAP-AKA’ for interworking with 3GPP or EAP-TTLS for interworking with WiMAX. Step 4, 7, 15 included EAPoL-Key messages which fulfils the first three messages of 4-way handshake. The last message of 4-way handshake is just a confirm of message 3 and it is can be omitted actually. So the security of PTK handshake will not be downgrade. Note that current 4-way handshake is a good design which can avoid DOS attack by the non-AP STA or a fake AP sending first 4-way HS message to the non-AP STA. See subclause in DHCP message is forwarded after step 12 at which the AP verified the non-AP STA holds the same PTK with itself so the 802.1x controlled port can be unblocked. It complies 802.1x. For step 7: The non-AP STA knows when it gets MSK, so it knows when it shall send Association Request. For step 11: If the AP receives more EAP- Request but not a EAP-Success or EAP-Failure from the AS, the AP can exchange EAP messages by data frames like possible step 5 with the non-AP STA and defer sending Association Response frame. July 2012

doc.: IEEE /0780r1 SubmissionHuawei, China MobileSlide 10 Implementation of EAP Authenticator If the FILS with Optimized EAP is invoked, the MAC entity of AP will send the Identity received from an STA to the EAP Authenticator. The EAP Authenticator will generate an EAP-Response/ID message if it has got the Identity and send the message to AS side (maybe send to a AAA Client module in AP first), or the EAP Authenticator will generate an EAP-Request/ID message and send the message to the non-AP STA to ask a Identity. July 2012

doc.: IEEE /0780r1 Submission Conclusion Proposal Summary –4-way handshake is carried out concurrently with Authentication and Association frames to reduce message rounds and the main mechanism of current 4-way handshake is kept. –Existing EAP Method can be called so the interworking between cellular technology and WiFi technology will not be affected. –The EAP-Request/ID and EAP-Response/ID messages are omitted to reduce messages on the air interface. –FILS over EAP and FILS over PSK can work under the same framework. Slide 11Huawei, China Mobile July 2012

doc.: IEEE /0780r1 Submission SP Do you support to add the FILS proposal defined in slide 7 into 11ai SFD security section? Yes No Abstain July 2012 Huawei, China MobileSlide 12

doc.: IEEE /0780r1 Submission Motion Do you support to add the FILS proposal defined in slide 7 into 11ai SFD security section? Yes No Abstain July 2012 Huawei, China MobileSlide 13

doc.: IEEE /0780r1 Submission Reference [1] ai-fast-re-authentication [2] ai-using-upper-layer- message-ie-in-tgai Huawei, China MobileSlide 14 July 2012