Doc.: IEEE 802.11-11/0976r0 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: 2011-07-17 Authors: NameAffiliationsAddressPhoneemail.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Submission doc.: IEEE /1326r1 August 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Early Key Generation by ECDH and PKC Date:
Doc.: IEEE /0093r2 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /1160 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA
Doc.: IEEE /1160r2 Submission NameAffiliationsAddressPhone George Cherian Santosh Abraham Hemanth Sampath Qualcomm 5775 Morehouse Dr, San.
Doc.: IEEE /0059r3 Submission January 2010 Hiroki Nakano, Trans New Technology, Inc.Slide 1 An Example Protocol for FastAKM Date: Authors:
Doc.: IEEE /0119r00 Submission January 2011 Marc Emmelmann, Fraunhofer FokusSlide 1 Requirements for FILS Submissions coming from PAR & 5C Date:
Doc.: IEEE /0032r0 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0023r1 Submission January 2011 Hitoshi MORIOKA, ROOT INC.Slide 1 Use Case Scenario for TGai Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0343r0 Submission March 2011 Hitoshi Morioka, ROOT INC.Slide 1 Pedestrian Model Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0976r1 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0976r3 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0034r0 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0023r2 Submission January 2011 Hitoshi Morioka, ROOT INC.Slide 1 Use Case Scenario for TGai Date: Authors: NameAffiliationsAddressPhone .
Wireless and Security CSCI 5857: Encoding and Encryption.
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho
Submission doc.: IEEE /1003r1 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Doc.: IEEE /0023r0 Submission January 2011 Hitoshi MORIOKA, ROOT INC.Slide 1 Use Case Scenario for TGai Date: YYYY-MM-DD Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE 11-12/0273r8 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0039r0 Submission NameAffiliationsAddressPhone Robert Sun; Yunbo Li Edward Au; Phil Barber Junghoon Suh; Osama Aboul-Magd Huawei.
Submission doc.: IEEE 11-10/0701r0 May 2012 Hitoshi Morioka, Allied Telesis R&D CenterSlide 1 Supplemental Information for HLCF Date: Authors:
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Doc.: IEEE /1000r4 Submission Jan 2010 Hiroshi Mano Root, Inc.Slide 1 IEEE for High Speed Mobility Notice: This document has been prepared.
Doc.: IEEE /1585r0 Submission Nov 2011 Hiroshi Mano (ATRD Root Lab)Slide 1 IEEE TGai Closing Report Date: Authors: NameCompanyAddressPhone .
Doc.: IEEE /0977r2 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN
Doc.: IEEE /1000r0 Submission Sep 2009 Hitoshi MORIOKA, ROOT Inc.Slide 1 IEEE for high speed mobility Notice: This document has been prepared.
Doc.: IEEE /551r0 Submission September 2002 Moore, Roshan, Cam-WingetSlide 1 TGi Frame Exchanges Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget.
Doc.: r02 Submission Aug Hiroshi Mano, Root IncSlide 1 IEEE TGai Fast Initial Link Setup Teleconference Agenda for 2 Aug to 13 Sep 2011.
Doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 1 MISP based Authentication Framework Notice: This document has been.
Doc.: IEEE /0275r3 Submission March 2012 Hitoshi Morioka, Allied Telesis R&D CenterSlide 1 Higher Layer Configuration Function for TGai SFD Date:
Doc.: IEEE /008r0 Submission January 2003 N. Cam-Winget, D. Smith, K. AmannSlide 1 Proposed new AKM for Fast Roaming Nancy Cam-Winget, Cisco Systems.
Doc.: IEEE /0977r1 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN
Doc.: IEEE /0093r0 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /109r1 Submission July 2002 J. Edney, H. Haverinen, J-P Honkanen, P. Orava, Nokia Slide 1 Temporary MAC Addresses for Anonymity Jon.
Doc.: IEEE /0133r3 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0873r0 Submission July 2010 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Effectiveness of Reduction of Message Exchanges Date:
Doc.: IEEE /0361r0 Submission March 2010 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Fast Initial Authentication Date: Authors:
Doc.: IEEE /0010r1 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Submission doc.: IEEE 11-13/1325r3 Hiroshi Mano (ATRD) Nov ai – Improving WLAN System Performance Date: Authors: Slide 1 NameCompanyAddressPhone .
Doc.: IEEE /0977r6 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA Allied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0977r4 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA Allied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /1244r0 Submission Sep 2011 Hiroshi Mano, Root, Inc.Slide 1 11ai overview (PAR, Scope and current status) Date: Authors:
Doc.: IEEE /1426r02 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District,
Submission doc.: IEEE /313r1 March 2016 Guido R. Hiertz, Ericsson et al.Slide 1 The benefits of Opportunistic Wireless Encryption Date:
Submission doc.: IEEE 11-12/0206r1 March 2012 Slide 1 Necessity of Probe Reduction Date: Authors:
Doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 1 Toward Mobile IEEE (a.k.a. IEEE for High Speed.
Submission doc.: IEEE /1146r0 Hitoshi Morioka, ROOT INC. Jun 2010 Feasibility Study of FIA Date: Authors: NameCompanyAddressPhone .
Fast Initial Authentication
Higher Layer Packet Container Proposal Presentation
Authentication and Upper-Layer Messaging
Feasibility Study of FIA
IEEE for High Speed Mobility
IEEE for High Speed Mobility
Fast Authentication in TGai
More Example Ideas around FIA
More Example Ideas around FIA
An Example Idea of FIA Authors: Date: May 2010 Name Company
An Example Idea of FIA Authors: Date: May 2010 Name Company
Feasibility Study of FIA
An Example Idea of FIA Authors: Date: May 2010 Name Company
IEEE TGai Closing Report
An Example Protocol for FastAKM
IEEE Fast Initial Authentication Study Group Closing Report
An Example Idea of FIA Authors: Date: May 2010 Name Company
Security for Measurement Requests and Information
IEEE Fast Initial Authentication Study Group Closing Report
Security for Measurement Requests and Information
An Example Protocol for FastAKM
IEEE TGai Closing Report
Presentation transcript:

doc.: IEEE /0976r0 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN Hiroshi ManoROOT INC Nishi- Gotanda, Shinagawa- ku, Tokyo JAPAN Mark RISONCSRCambridge Business Park, Cowley Road, Cambridge CB4 0WZ UK Marc EmmelmannFraunhofer FOKUS Kaiserin-Augusta- Alle Berlin Germany

doc.: IEEE /0976r0 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 2 Abstract This document describes a technical proposal for TGai which addresses the following phase. Authentication and Association

doc.: IEEE /0976r0 Submission Network Assumption July 2011 Hitoshi Morioka, ROOT INC.Slide 3 STA AP Network Standalone (Home/Small Office, No AS) STA AP Network Enterprise (ISP/Large Office, with AS) STA AP STA AP AS LAN (subnet)

doc.: IEEE /0976r0 Submission Key Sharing Standalone –A PMK is pre-shared between AP and an STA. –Each STA has a different PMK. Enterprise –A PMK is pre-shared between AS and an STA. –Each STA has a different PMK. –A shared secret (AP-key) is pre-shared between AS and AP. –Each AP has a different AP-key. July 2011 Hitoshi Morioka, ROOT INC.Slide 4 RADIUS

doc.: IEEE /0976r0 Submission Authentication Protocol Sequence(Standalone) July 2011 Hitoshi Morioka, ROOT INC.Slide 5 STA AP Beacon (TS, aiCAP) Probe Req. Probe Resp. (TS, aiCAP) Assoc. Req. (TS, Nonce, NAI, MIC) Beacon and Probe Resp. deliver the same information. To reduce occupied air-time, Probe should not be used. Beacon/Probe Resp. delivers Timestamp and ai capability indicator. This Timestamp must be unique. So it’s different from TSF. Any other unique number can be alternative. Assoc. Req. delivers TS: received timestamp Nonce: unique random number NAI: user ID (RFC2486) MIC: Apply hash function to a part of the frame. Then HMAC hash function with PMK to the previous result. (RFC2104) AP confirms the validity of each information. AP authenticates the STA by calculating and comparing MIC. PTK is calculated by applying HMAC to the Nonce with PMK. PTK is calculated by applying HMAC to the Nonce with PMK. PTK is calculated by applying HMAC to the Nonce with PMK. PTK is calculated by applying HMAC to the Nonce with PMK. PTK shared Assoc. Resp. (TS, PTKVT, GTK, MIC) Assoc. Resp. delivers TS: timestamp included in the Req. PTKVT: PTK validity time. GTK: GTK is encrypted with PTK. MIC: Apply HMAC hash function with PTK to a part of the frame. (HMAC: RFC2104) STA confirms the validity of each information. STA authenticates the AP by calculating and comparing MIC. Authentication, Key sharing, Association completed

doc.: IEEE /0976r0 Submission Current State Machine (IEEE ) July 2011 Hitoshi Morioka, ROOT INC.Slide 6 NOTE 3—IEEE Open System authentication provides no security, but is included to maintain backward compatibility with the IEEE state machine (see 11.3). ( b)) NOTE 3—IEEE Open System authentication provides no security, but is included to maintain backward compatibility with the IEEE state machine (see 11.3). ( b))

doc.: IEEE /0976r0 Submission TGai State Machine In real implementation –STA: Skip transmitting Auth Req. –AP: Process Open System authentication and association sequentially. –These modifications are small. –And can coexist with legacy system (state machine). –We tried to implement on NetBSD, Linux and Android. July 2011 Hitoshi Morioka, ROOT INC.Slide 7 State 1: Unauthenticated, Unassociated State 1: Unauthenticated, Unassociated State 3: Authenticated, Associated State 3: Authenticated, Associated Sucessful Association Disassociation Notification

doc.: IEEE /0976r0 Submission Protocol Features Mutual Authentication between AP and STA –Both AP and STA check MIC in the Assoc frame. –MIC is calculated by using PMK. –So they can authenticate mutually. PTK never on-the-air –PTK is calculated by STA and AP separately. –So PTK is never on-the-air. Early PTK share –PTK can be shared after the AP received Assoc. Request. –So some information, GTK, upper layer information, can be encrypted even in the Assoc. Request. July 2011 Hitoshi Morioka, ROOT INC.Slide 8

doc.: IEEE /0976r0 Submission Security Consideration Major Attacks –Replay Attack By using timestamp, AP can eliminate replay attack. –Man-in-the-middle Attack Prevented by “mutual authentication” and “PTK never on-the-air” features. –Fake AP Prevented by “mutual authentication” feature. Security Strength –Security strength of this protocol depends on the strength of hash function. July 2011 Hitoshi Morioka, ROOT INC.Slide 9

doc.: IEEE /0976r0 Submission Authentication Protocol (Enterprise) July 2011 Hitoshi Morioka, ROOT INC.Slide 10 STA AP Beacon (aiCAP, TS) Probe Req. Probe Resp. (TS) Assoc. Req. (TS, Nonce, NAI, MIC 1 ) PTK shared Assoc. Resp. (TS, PTKVT, GTK, MIC 4 ) Authentication, Key sharing, Association completed AS Access Req. (Nonce, NAI, MIC 1, AD, MIC 2 ) Access Approval (PTKDD, MIC 3 )

doc.: IEEE /0976r0 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 11 Authentication Process APASSTA Association Request Authentication Data MIC 1 hash HMAC-hash (PMK) Association Request Authentication Data Access Request MIC 1 Extract MIC 2 hash HMAC-hash (AP-key) Access Request MIC 2 Authentication Data MIC 1 MIC 2 MIC 1 Extract HMAC-hash (AP-key) HMAC-hash (PMK) Compare Timestamp Nonce NAI… Check Timestamp Check User, Domain Transmit Beacon Probe Resp. NAI Nonce

doc.: IEEE /0976r0 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 12 Authentication Process (Cont.) APASSTA Association Response Authentication Data MIC 4 hash HMAC-hash MIC 3 Access Request Nonce PTK MIC 1 Extract HMAC-hash (PMK) Extract HMAC-hash (AP-key) Hashed MIC 1 PTKDD XOR Access Approval MIC 3 HMAC-hash (AP-key) Access Approval MIC 3 Compare Extract HMAC-hash (AP-key) MIC 1 Hashed MIC 1 HMAC-hash (AP-key) PTKDD PTK Extract XOR Association Response Authentication Data (16byte) MIC 4 hash HMAC-MD5 MIC 4 Nonce PTK HMAC-hash (PMK) Compare Extract ENC(GTK) PTK Transmit

doc.: IEEE /0976r0 Submission Out of Scope Issue Protocol between AP and AS is out of scope of IEEE So this should be discussed in IETF (AAA WG?). July 2011 Hitoshi Morioka, ROOT INC.Slide 13

doc.: IEEE /0976r0 Submission Questions & Comments July 2011 Hitoshi Morioka, ROOT INC.Slide 14