Doc.:IEEE 802.11-01/636r1 Submission November 2001 Dmitri Varsanofiev Slide 1 A Simple Rekeying Proposal Dmitri Varsanofiev Resonext Communications San.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: e Submission Huawei Technologies Co., Ltd.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.:IEEE /540ar0 Submission November 2001 Albert Young, Bob OHara Slide 1 A Re-Key Proposal Albert Young 3Com Corporation Santa Clara, CA
Doc.: IEEE /178 Submission July 2000 A. Prasad, A. Raji Lucent TechnologiesSlide 1 A Proposal for IEEE e Security IEEE Task Group.
Doc.:IEEE /636r0 Submission November 2001 Dmitri Varsanofiev Slide 1 A Simple Rekeying Proposal Dmitri Varsanofiev Resonext Communications San.
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Doc.: IEEE /0527r0 Submission March 2010 Slide 1 A Periodic 5 MHz Measurement Pilot for Channel Scan Date: Authors:
Doc.: IEEE /0178r1 Submission January 2013 Jiamin Chen, HuaweiSlide 1 A Simplified Method for Beamforming Training Procedure for Multi-Band Capable.
Doc.: IEEE /0410r2 Submission March 2011 Slide 1 Data Transmission Protection on the IEEE ac MU-MIMO Downlink Date: Authors:
Doc.: IEEE /301R0 Submission May 2002 Terry Cole, AMDSlide 1 A More Efficient Protection Mechanism Terry Cole AMD Fellow +1.
Doc.: IEEE /147March 2000 TGe SecuritySlide 1 The Status of TGe S Draft Text Jesse Walker Intel Corporation (503)
Doc.: IEEE /082r0 Submission January 2001 Anuj Batra et al., Texas InstrumentsSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /026r1 Submission March 2001 Jie Liang, Texas InstrumentsSlide 1 Jie Liang Texas Instruments Incorporated TI Blvd. Dallas, Texas.
Doc.: IEEE /1191r5 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 AP Architecture Thoughts Mike Moreton, STMicroelectronics.
Doc.: IEEE /265r0 Submission June 2001 Robert F. Heile, Consultant Steve Shellhammer, Symbol Technologies Slide 1 IEEE P Working Group for.
Doc.: IEEE /516r0-I Submission September 2002 Robert Moskowitz, ICSALabsSlide 1 RADIUS Client Kickstart Robert Moskowitz, ICSALabs John Vollbrecht,
Doc.: IEEE /1043 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang, Kyungki,
Submission doc.: IEEE /0325r0 March 2012 Slide 1 TIM Enhancement With Group Bits Date: Authors: Zhong-Yi Jin, Nokia.
Doc.:IEEE /1523r4 Submission November 2011 Access Delay Reduction for FILS: Network Discovery & Access congestion Improvements Slide 1 Authors:
Submission doc.: IEEE /1326r1 August 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Early Key Generation by ECDH and PKC Date:
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
IEEE DRAFT RECOMMENDED PRACTICE Clause 14: Collaborative Coexistence Mechanism – IEEE and Steve Shellhammer (Symbol Technologies)
Doc.: IEEE /0255r1 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang,
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 1 Re-authentication when Roaming Dan Harkins.
Doc.: IEEE /1160r1 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA +1
Doc.: IEEE /080r1 Submission January 2001 Jie Liang, Texas InstrumentsSlide 1 Jie Liang Texas Instruments Incorporated TI Blvd. Dallas,
Doc.: IEEE /1550r1 Submission Nov 2011 Zander, I2R SingaporeSlide 1 Extension of AID and TIM to Support 6000 STAs in ah Date:
Doc.: IEEE /1205r1 Submission September 2011 ZTE CorporationSlide 1 Consideration on battery power alarm mechanism for IEEE ah framework.
Doc.: IEEE /1521r2 Submission January 2012 Marc Emmelmann, FOKUSSlide 1 AP and Network Discovery Enhancements Date: Authors:
Submission doc.: IEEE 11-13/0070r1 Enabling AP Sleep Date: Authors: Jafarian, Qualcomm Slide 1 January 2013.
Doc.: IEEE /630r1a Submission S. Choi, Philips Research November 2001 Slide 1 HC Recovery and Backoff Rules Sunghyun Choi and Javier del Prado.
Submission doc.: IEEE ai November 2012 Lei Wang, InterDigital CommunicationsSlide 1 Proposals for the FD Frame Capability, Security and.
Doc.: IEEE /630r4a Submission S. Choi, Philips Research January 2002 Slide 1 HC Recovery and Backoff Rules Sunghyun Choi and Javier del Prado.
Doc.:IEEE /xxxxr0 Submission Nov. 8, 2010 Notification on Change of BW & Rx Nss Joshua Zhao, et al1 Date: Authors:
Doc.: IEEE /1282r1 Submission Extending the 11ad MAC for dynamic bandwidth management (60 GHz) October 2013 Slide 1 Multiple co-authors Date:
Doc.: IEEE /1190r2 September 2014 Submission Kaiying Lv (ZTE) Frame Exchange Control for Uplink Multi-user transmission Slide 1 Date:
TIM Compression Date: Authors: January 2012 Month Year
Doc.: IEEE /0032r0 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0018r0 Submission January 2010 Alexander Tolpin, Intel CorporationSlide 1 4 –Way Handshake Synchronization Issue Date:
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Doc.: IEEE /0846r0 Submission July 2008 Mathilde BenvenisteSlide 1 Power save for wireless mesh Mathilde Benveniste
Doc.: IEEE /0567r1 Submission May 2012 Huawei Slide 1 Multiple Frequency Channel Scanning Date: Authors: NameAffiliationsAddressPhone .
Doc.: Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Securing the Network.
IEEE Wireless Local Area Networks (WLAN’s).
Doc.: IEEE /0976r1 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone .
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Submission doc.: IEEE /1003r1 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Doc.: IEEE /0071r0 January 2013 Submission Channel indication in RAW/TWT Date: Authors: Merlin, Qualcomm Slide 1.
Doc.: IEEE /1109r0 Submission Month Year Tom Siep, CSRSlide 1 Amendment Creation Process Date: YYYY-MM-DD Authors:
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE /008r0 Submission January 2003 N. Cam-Winget, D. Smith, K. AmannSlide 1 Proposed new AKM for Fast Roaming Nancy Cam-Winget, Cisco Systems.
Doc.: IEEE /0568r0 Submission May 2012 Young Hoon Kwon, Huawei Slide 1 AP Discovery Information Broadcasting Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /657r0 Submission August 2003 N. Cam-WingetSlide 1 TGi Draft 5.0 Comments Nancy Cam-Winget, Cisco Systems Inc.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE /482r0 Submission October 2001 Steve Shellhammer, Symbol Technologies Slide 1 IEEE P Working Group for Wireless Personal Area.
Doc.: IEEE /2952r2 Submission Dec 2007 L.Chu Etc.Slide 1 Simplified DLS Action Frame Transmission in 11Z Date: Authors:
SPINS: Security Protocols for Sensor Networks
Wake Up Frame to Indicate Group Addressed Frames Transmission
Multiple Frequency Channel Scanning
Beacon Protection Date: Authors: May 2018 January 2018
SPINS: Security Protocols for Sensor Networks
Reducing Overhead in Active Scanning with Simulation Results
doc.: IEEE /454r0 Bob Beach Symbol Technologies
AP Status Broadcast Date: Authors: November 2011
Reducing Overhead in Active Scanning with Simulation Results
Beacon Protection Date: Authors: May 2018 January 2018
Multiple Frequency Channel Scanning
Presentation transcript:

doc.:IEEE /636r1 Submission November 2001 Dmitri Varsanofiev Slide 1 A Simple Rekeying Proposal Dmitri Varsanofiev Resonext Communications San Jose, CA

doc.:IEEE /636r1 Submission November 2001 Dmitri Varsanofiev Slide 2 Rekeying Proposal Goals –Eliminate the synchronization exchange at the MAC level –Handle the per-link keys and multicast keys in a uniform manner

doc.:IEEE /636r1 Submission November 2001 Dmitri Varsanofiev Slide 3 Rekeying Proposal: Idea Temporary key is derived based on a master key and a nonce Rekeying is synchronized using the nonce broadcasted in the clear in each beacon To avoid the packet loss during rekeying, two keys are used. Rekeying moments for the two keys are different. Stations avoid using the key that is about to be changed All stations are rekeyed simultaneously Two nonces are transmitted with the corresponding key IDs: the current one and the next one as well as the number of beacon intervals before a key change.

doc.:IEEE /636r1 Submission November 2001 Dmitri Varsanofiev Slide 4 Rekeying Proposal: Assumptions Master key setup is done using means outside of the scope of this proposal (Upper Layer Authentication) Rekeying is infrequent (once per so many minutes) Rekeying is done using a temporary key which is a function of a master key and a nonce. Nonce and key derivation for temporary key are outside of the scope of this proposal. For example, the formula for base_shared_key in the 01/508 can be used

doc.:IEEE /636r1 Submission November 2001 Dmitri Varsanofiev Slide 5 Beacon Information Element Patterned after the Rekey Information Element in 01/508 Includes –Current Nonce –Current Key ID –Next Nonce –Next Key ID –Key Sequence Number –Cipher Suite –Rekey Count –MIC

doc.:IEEE /636r1 Submission November 2001 Dmitri Varsanofiev Slide 6 Rekeying Proposal: Drawbacks The rekeying is based on the station that was the first to exhaust the IVs. AP has to derive keys for all associated stations each time – more calculations needed than in the case of individual rekeying of each station. Two key IDs are needed (can be relaxed)

doc.:IEEE /636r1 Submission November 2001 Dmitri Varsanofiev Slide 7 Rekeying Proposal Inspired by Young / OHaras proposal 01/540 Not a stand-alone proposal –Uses re-key information element similar to 01/508 Possible modifications –Use just one key ID. May require re-encryption of few packets during the key switch time, if they would fall into a different beacon interval than planned. Alternatively, packets encrypted both with the old and new key can be always transmitted during the predetermined overlap period. –Transmit nonces only along with DTIM information –Broadcast two nonces at a time; one for each direction