Doc.: IEEE 802.11-03/173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 1 Coexistence of Legacy & RSN STAs in Public WLAN Byoung-Jo “J” Kim AT&T Labs-Research.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /309r0 Submission 2/8/2014 Michael Livshitz, MetalinkSlide 1 Issues With Off-channel TDLS Date: Authors:
Advertisements

IEEE P802 Handoff ECSG Submission July 2003 Bernard Aboba, Microsoft Detection of Network Attachment (DNA) and Handoff ECSG Bernard Aboba Microsoft July.
Doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Enabling Encryption in Hotspots by Decoupling the Privacy Field from.
Doc.: IEEE /0598r0 Submission May 2012 Steve Grau, Juniper NetworksSlide 1 Layer 3 Setup with Dynamic VLAN Assignment Date: Authors:
Doc.: IEEE /0497 r0 Submission May 2008 Allan Thomson, Cisco SystemsSlide 1 D2.0 Location Changes Summary Date: Authors:
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
Doc.: IEEE /2913r0 Submission November 2007 Kapil Sood, Intel CorporationSlide 1 Protecting Associations Attacks – Some Considerations Date:
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Doc.: IEEE /0573r1 Submission May 2012 David Halasz, Motorola MobilitySlide 1 Scalable Authentication Date: Authors:
Doc.: IEEE /0112r4 Submission Supporting Authentication/Association for Large Number of Stations September 2012 Slide 1 I2R Date:
Ch. 5 – Access Points. Overview Access Point Connection.
Doc.: IEEE Submission Nov 2013 Betty Zhao et. al., HuaweiSlide 1 Service Discovery with Association Date: Authors:
Doc.: IEEE /273r0 Submission March 2003 Byoung-Jo “J” Kim, AT&T Labs-ResearchSlide 1 MIB Discussions for TGk Byoung-Jo “J” Kim
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Doc.: IEEE /172r0 Submission March 2003 Byoung-Jo Kim, AT&TSlide 1 NDIS Objects Byoung-Jo “J “ Kim AT&T Labs-Research Mar. ’03, Dallas.
Doc.: IEEE /172r1 Submission NDIS Objects Byoung-Jo “J “ Kim AT&T Labs-Research Mar. ’03, Dallas.
November 2005 Floyd Simpson, MotorolaSlide 1 doc.: IEEE /1193r0 Submission LB78 D3.0 Active Scanning Comments (clause ) Notice: This.
Submission doc.: IEEE 11-10/0259r0 March 2013 Jarkko Kneckt (Nokia)Slide 1 CID 266 & CID 281 Date: Authors:
Doc.: IEEE /0394r0 Submission March 2012 HuaweiSlide 1 ISD Use Cases and Requirements Date: Authors:
Doc.: IEEE /0061r1 SubmissionJae Seung Lee, ETRISlide 1 Probe Response frame transmission interval Date:
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
Submission September 2015 doc.: IEEE /1091r0 September 2015 Considerations on Range Extension with SIG-A Repetition Date: Authors:
Submission Page 1 November 2002 doc.: IEEE /677r0 Daryl Kaiser, Cisco Systems Radio Measurement Actions Daryl Kaiser (Cisco Systems) 12 November.
Submission doc.: IEEE /162 January 2014 RYU Cheol, ETRISlide 1 Possible Agreements for the Design Date: Authors:
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE /2215r4 Submission August 2007 Ganesh Venkatesan, Intel CorporationSlide 1 Proposal –Radio Resource Measurement Capability Enabled.
Submission doc.: IEEE 11-12/535r1 May 2012 Jarkko Kneckt, NokiaSlide 1 Scanning and FILS requirements Date: Authors:
Doc.: IEEE /0027r0 Submission January 2006 Slide 1 WiNOT Consortium: Proposal for online enrollment cluster Notice: This document has been prepared.
Doc.: IEEE /109r1 Submission July 2002 J. Edney, H. Haverinen, J-P Honkanen, P. Orava, Nokia Slide 1 Temporary MAC Addresses for Anonymity Jon.
Doc.: IEEE /171r2A Submission March 2003 Byoung-Jo “J” Kim, AT&T Labs-Research RRM MIB Enhancement Paired with 03/171r0 Word doc Byoung-Jo “J”
Doc.:IEEE /0476r1 Submission Apr Santosh Pandey, Cisco SystemsSlide 1 Management Frame Policy Definition Authors: Date:
Doc.: IEEE /0690r0 Submission Andrew Myers, BT Slide 1 July GPP SA3 Interworking Security Issues II Andrew Myers British Telecommunications.
Submission November 2010 doc.: IEEE /1236r0 Enhancements to Enablement Procedure Slide 1 Santosh Abraham, Qualcomm Incorporated Date:
Doc.: IEEE /0010r1 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
Doc.: IEEE /0072r0 Submission January 2009 Slide 1 Proxy ARP Issue for Direct Link Setup Notice: This document has been prepared to assist IEEE.
Doc.: IEEE /0263r1 SubmissionJae Seung Lee, ETRI Spec Framework Proposal: Selection of the AP for Scanning Date: Slide 1 March 2012.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
Doc.: IEEE /0237r0 Submission March 2005 Fabrice Stevens, Sébastien Duré Requirements for Management Frame Protection Schemes Fabrice Stevens,
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Doc.: IEEE /0041r1 AP Location Capability January 2007 Donghee Shim et alSlide 1 AP Location Capability Notice: This document has been prepared.
Doc.: IEEE /1219r4 Submission March, 2006 S. Ponnuswamy (Aruba Networks)Slide 1 Virtual AP Presentation Notice: This document has been prepared.
Doc.: IEEE /1436r0 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 L2 Domain Indication Mike Moreton, STMicroelectronics 15 th.
Doc.: IEEE /0059r1 SubmissionJae Seung Lee, ETRI Selection of the AP for Scanning Date: Slide 1.
Doc.: IEEE k Submission July 2004 Bernard Aboba, MicrosoftSlide 1 IEEE k Security: A Conceptual Model Bernard Aboba Microsoft.
Doc.: IEEE /827r0 Submission November 2003 Eleanor Hepworth, Siemens Roke ManorSlide 1 Co-existence of Different Authentication Models Eleanor.
Doc.: IEEE /484r0 Submission NameAffiliationsAddressPhone George Cherian Santosh Abraham Qualcomm 5775 Morehouse Dr, San Diego, CA, USA +1.
Doc.:IEEE /0129r1 January 2012 S.Abraham, Qualcomm Inc Short Beacon Slide 1 Authors:
SubmissionJoe Kwak, InterDigital1 PHY measurements for interference reduction from 11h Joe Kwak, Marian Rudolf InterDigital doc: IEEE /537r0July.
Doc.: IEEE /0450r0 Submission March 2006 Eleanor Hepworth, Siemens Roke ManorSlide 1 Proposal for Emergency Service Support Notice: This document.
Doc.: IEEE /1299r0 Submission Dec 2009 Allan Thomson, Cisco SystemsSlide 1 BSS Transition Improvements Date: xx Authors:
Submission doc.: IEEE /0353r1 March 2016 Hanseul Hong, Yonsei UniversitySlide 1 MU-RTS/CTS for TWT Protection Date: Authors:
Doc.: IEEE /0537r0 Submission May 2010 Kazuyuki Sakoda, Sony CorporationSlide 1 General frame format comment resolution overview Date:
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Doc.: IEEE /171ar0 Submission March 2003 Byoung-Jo “J” Kim, AT&T Labs-Research RRM MIB Enhancement Paired with 03/171r0 Word doc Byoung-Jo “J”
TSN Architecture Mike Moreton, STMicroelectronics
Nancy Cam-Winget, Cisco Systems Inc
Coexistence of Legacy & RSN STAs in Public WLAN
Nancy Cam-Winget, Cisco Systems Inc
Element for Legacy Indication
doc.: IEEE /454r0 Bob Beach Symbol Technologies
CID#89-Directed Multicast Service (DMS)
Possible Enhancement for Broadcast Services over WLAN
Clause 7 Comment Resolutions
Power Efficient WUR AP Discovery
Site Report Conceptual Model
Request for Legacy IE ID for RSN Extension
Comment Resolution Motions
Presentation transcript:

doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 1 Coexistence of Legacy & RSN STAs in Public WLAN Byoung-Jo “J” Kim AT&T Labs-Research March ‘03, Dallas

doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 2 Purpose A Twist in Public Access Scenario: Must Support “Simultaneously” –Legacy STAs with WEP off For various reasons, at least for a while –RSN (or WPA) STAs For privacy protection if STAs capable Not a requirement for PWLAN in general: You should assume you’re on your own. But Use it if available: Must do more for customers for their protection, and maybe all hidden from users

doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 3 Possible Solutions Shares some issues with doc by Bernard Aboba, and Also maybe can be considered as a special case of TSN Use Two SSIDs with Two Radios Use Two SSIDs with a Single Radio –Common implementation has Primary SSID in Beacon, others Revealed with Probe Problems: Refer to Most importantly: Two SSID may confuse people – “Consumer” service, maybe OK, but not sure Preference toward single SSID Risk to Network is accepted factor of any ISP

doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 4 Single SSID: Beacon with Privacy off and RSN IE included No problem with Legacy STAs Not Sure How RSN STAs will behave –Not a valid option in Draft Capability Information field Add the following paragraphs to Clause : STAs (including APs) that include the RSN IE in beacons and probe responses shall set the Privacy subfield to 1 in any frame that includes it. –Attempt to associate regardless of Privacy bit, auth via 1x and run RSN? –Don’t even try to associate since Privacy bit is OFF? Possible Solutions: continued

doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 5 TSN Policy does not cover this case TSN policy selection > If an AP operating within a TSN receives a (Re)association request without an RSN IE, it shall allow communications only if a WEP key has been configured to secure communication. If a WEP key is not installed, the AP shall reject the association request; if a WEP key is configured, the AP may accept the request.

doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 6 Observations with “one” current HW Setup: Beacon WEP off, Some STAs configured to use 1x authentication/key exchange and Some configured no WEP. All Pre-RSN/WPA –Broadcast unencrypted by AP if non-1x STA present –No-WEP STAs associate and work fine –Some 1x STA models won’t even try to send assoc-req –Most do and associate/authenticate successfully –Some do accept unencrypted broadcast like ARP –Some do not –Some 1x STA broadcast unencrypted but refuse to receive Points toward potentially unpredictable STA behavior –Not a news –Expensive for PWLAN provider –Hope to minimize it as much as possible

doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 7 Broadcast/Multicast Probably solved at APs for this particular scenario ARP for gateway, DHCP, etc are necessary for service –STA to AP is OK, whether encrypted or not –AP can be smart about whether to encrypt, or not by keeping track of the interactions. –DHCP and gateway under our control –APs may be configured to drop direct communication between STAs in PWLAN, always via an access enforcer, so ARP for other than gateway is useless anyways

doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 8 Options Make “Beacon/Probe Privacy OFF” with RSN IE” a legitimate mode, a particular mode of TSN? Specify STA behaviors for this Case? –“Attempt RSN operation based on RNS IE only, regardless of WEP bit”? Specify what to do with broadcast/multicast traffic? Or leave it to AP vendors catering to PWLAN providers