Doc.: IEEE 802.11-12/0039r0 Submission NameAffiliationsAddressPhoneemail Robert Sun; Yunbo Li Edward Au; Phil Barber Junghoon Suh; Osama Aboul-Magd Huawei.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE /1281r1 Submission NameAffiliationsAddressPhone Robert Sun;Huawei Technologies Co., Ltd. Suite 400, 303 Terry Fox Drive, Kanata,
Doc.: IEEE /1160 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA
Doc.: IEEE /1436r0 Submission NameAffiliationsAddressPhone Robert Sun Huawei Technologies Co., Ltd. Suite 400, 303 Terry Fox Drive, Kanata,
Doc.: IEEE /0780r1 Submission NameAffiliationsAddressPhone Ping Fang Zhiming Ding Phillip Barber Rob Sun Huawei Technologies Co., Ltd. Bldg.
Analysis and Improvements over DoS Attacks against IEEE i Standard Networks Security, Wireless Communications and Trusted Computing(NSWCTC), 2010.
Doc.: IEEE /0041r1 Submission NameAffiliationsAddressPhone Robert Sun; Yunbo Li; Edward Au; Phillip Barber Huawei Technologies Co., Ltd.
Doc.: IEEE /0567r1 Submission May 2012 Huawei Slide 1 Multiple Frequency Channel Scanning Date: Authors: NameAffiliationsAddressPhone .
TGai FILS Authentication Protocol
Doc.: IEEE / ai Submission NameAffiliationsAddressPhone Phillip BarberHuawei Technologies Co., Ltd Alma Rd, Ste 500 Plano,
Submission doc.: IEEE ai May 2012 InterDigital, KDDI, Nokia, Huawei, Intel, Qcomm Slide 1 Proposed SFD Text for ai Passive Scanning.
Doc.: Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Securing the Network.
Doc.: IEEE /0976r1 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0976r3 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1169r1 Submission January 2012 Jihyun Lee, LG ElectronicsSlide 1 FILS Association Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /933r6 Submission July 2012 Fang Xie (CMCC)Slide 1 Access Control Mechanism for FILS Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1042r3 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang,
Doc.: IEEE /1042 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang, Kyungki,
Doc.: IEEE /0249r0 Submission March 2012 Slide 1Lin Cai et al,Huawei. Differentiated Association Service Provisioning in WiFi Networks Date: 03/02/2012.
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho
Doc.: IEEE /1054r0 Submission Sep Santosh Pandey (Cisco)Slide 1 FILS Reduced Neighbor Report Date: Authors:
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Doc.: IEEE /1429r2 Submission January 2012 Dan Harkins, Aruba NetworksSlide 1 A Protocol for FILS Authentication Date: Authors:
Submission doc.: IEEE 11-11/1414r2 November 2011 Katsuo Yunoki, KDDI R&D LaboratoriesSlide 1 Probe Request and Response in TGai Date: Authors:
Doc.: IEEE /0067r0 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 Active Scanning Time Notification Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0977r2 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN
Submission doc.: IEEE ai March 2012 InterDigital, KDDI, Nokia, Huawei, IntelSlide 1 Proposed SFD Text for ai Passive Scanning Improvement.
Doc.: IEEE /0897r0 SubmissionJae Seung Lee, ETRISlide 1 Active Scanning considering Operating Status of APs Date: July 2012.
Doc.: IEEE /551r0 Submission September 2002 Moore, Roshan, Cam-WingetSlide 1 TGi Frame Exchanges Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget.
Doc.: IEEE / ai Submission Nov 2011 Huawei Technologies Co. LtdSlide 1 Broadcast Probe Response in TGai Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0061r1 SubmissionJae Seung Lee, ETRISlide 1 Probe Response frame transmission interval Date:
Doc.: IEEE /0547r1 Submission May 2012 Dapeng Liu, China MobileSlide 1 Extend 802.1X for higher layer configuration in FILS Date:
Doc.: IEEE /0158r2 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 Proposed Additions to SFD Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /01047r2 Submission NameAffiliationsAddressPhone Ping Fang Huawei Technologies Co., Ltd. Bldg 7, Vision Software Park, Road Gaoxin.
Doc.: IEEE / ai Submission NameAffiliationsAddressPhone Phillip BarberHuawei Technologies Co., Ltd Alma Rd, Ste 500 Plano,
Submission doc.: IEEE /1034r4 September 2012 Jeongki Kim, LG ElectronicsSlide 1 Enhanced scanning procedure for FILS Date: Authors:
Doc.: IEEE /1233r3 Submission Sep 2011 Slide 1 Passive Scanning Improvement Date: Authors:
Submission doc.: IEEE ai May 2012 Lei Wang, InterDigital CommunicationsSlide 1 Proposed SFD Text for ai AP/STA Initiated FILS Optimizations.
Doc.: IEEE /1042r1 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang,
Doc.: IEEE /0275r3 Submission March 2012 Hitoshi Morioka, Allied Telesis R&D CenterSlide 1 Higher Layer Configuration Function for TGai SFD Date:
Doc.: IEEE /1281r1 Submission NameAffiliationsAddressPhone Robert Sun;Huawei Technologies Co., Ltd. Suite 400, 303 Terry Fox Drive, Kanata,
Doc.: IEEE /278r0 Submission NameAffiliationsAddressPhone Ping Fang Huawei Technologies Co., Ltd. Bldg 7, Vision Software Park, Road Gaoxin.
Doc.: IEEE /0080r0 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 AP Admission Control in TGai Date: Authors: NameAffiliationsAddressPhone .
Wireless Network Security CSIS 5857: Encoding and Encryption.
Doc.: IEEE /1000r1 Submission July 2011 Jihyun Lee, LG ElectronicsSlide 1 TGai FILS Proposal Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0568r0 Submission May 2012 Young Hoon Kwon, Huawei Slide 1 AP Discovery Information Broadcasting Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE 11-12/1051r2 Multi-channel information for AP discovery 1 September 2012 HTC Corp. NameAffiliationsAddressPhone Jing-Rong HsiehHTC.
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Doc.: IEEE /01047r4 Submission NameAffiliationsAddressPhone Ping Fang Huawei Technologies Co., Ltd. Bldg 7, Vision Software Park, Road Gaoxin.
Doc.: IEEE /1426r00 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi- tech District,
Doc.:IEEE /1523r1 Submission November 2011 Access Delay Reduction for FILS: Network Discovery & Access congestion Improvements Slide 1 Authors:
Doc.: IEEE /0158r0 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 Proposed Additions to SFD Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1426r02 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District,
Doc.: IEEE /0269r1 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District, Chengdu,
Doc.: IEEE /0294r2 Submission March 2012 Jonathan Segev (Intel)Slide 1 Active Scanning Reply Window Date: Authors:
Robust Security Network (RSN) Service of IEEE
Month Year doc.: IEEE yy/xxxxr0 May 2012
AP discovery with FILS beacon
Some LB 62 Motions January 13, 2003 January 2004
FILS presentation on High Level Security Requirements
EAP based Message Flow Optimization for FILS
TGai FILS Authentication Protocol
AP discovery with FILS beacon
AP discovery with FILS beacon
AP discovery with FILS beacon
AP Status Broadcast Date: Authors: November 2011
Access Control Mechanism for FILS
Performance Analysis of authentication and authorization
11ay Fast Association Authentication
11ay Fast Association Authentication
Presentation transcript:

doc.: IEEE /0039r0 Submission NameAffiliationsAddressPhone Robert Sun; Yunbo Li Edward Au; Phil Barber Junghoon Suh; Osama Aboul-Magd Huawei Technologies Co., Ltd. Suite 400, 303 Terry Fox Drive, Kanata, Ontario K2K 3J1 Paul Lambert Yong Liu Marvell Semiconductor 5488 Marvell Lane Santa Clara, CA TGai FILS Authentication Protocol Date: Jan 2012 Slide 1 Authors: Rob Sun etc, Huawei.

doc.: IEEE /0039r0 SubmissionSlide 2 Abstract Huawei. Dec 2011

doc.: IEEE /0039r0 Submission Conformance w/ TGai PAR & 5C Huawei.Slide 3 Conformance QuestionResponse Does the proposal degrade the security offered by Robust Security Network Association (RSNA) already defined in ? No Does the proposal change the MAC SAP interface?No Does the proposal require or introduce a change to the architecture?No Does the proposal introduce a change in the channel access mechanism?No Does the proposal introduce a change in the PHY?No Which of the following link set-up phases is addressed by the proposal? (1) AP Discovery (2) Network Discovery (3) Link (re-)establishment / exchange of security related messages (4) Higher layer aspects, e.g. IP address assignment 3 Dec 2011

doc.: IEEE /0039r0 Submission RSNA Security Analysis Stage 1:Network and Security Capability Discovery Stage 2: Authentication and Association Open System Authentication is included only for backward compatibility Stage 3: EAP/802.1X/RADIUS Authentication This stage execute the mutual authentication protocol based on EAP (i.e EAP-TLS, EAP-SIM/AKA/TTLS) authentication AP is functioning as authenticator to relay EAP messages This stage COULD be skipped in the scenarios of : 1) PMK cached for re-authentication 2) PSK is shared between STA and AP Stage 4: 4-way handshake: Both STA and the AP can trust each other with the authorized token (PMK) to derive the PTK and GTK HuaweiSlide 4 Dec 2011

doc.: IEEE /0039r0 Submission RSNA Security Analysis Stage 5 (Optional): Group Key Handshake The AP will generate the fresh GTK and distributed this GTK to the STA GTK may be distributed during the Stage 4 Stage 6: Secure Data Communication DHCP request/response … HuaweiSlide 5 Dec 2011

doc.: IEEE /0039r0 Submission The Security Model of RSNA HuaweiSlide 6 Policy Decision Point Policy Decision Point Policy Enforcement Point Policy Enforcement Point STA AS AP 1.Authenticate to derive MSK 2: Derive PMK from MSK 3: Use PMK to enforce channel access Derive and use PTK Dec 2011 Reference: “IEEE i Overview”, 2002, Nancy Cam-Winget, et al

doc.: IEEE /0039r0 Submission RSNA Components IEEE 802.1X for Access Control EAP (RFC 4017) for authentication and cipher suite negotiation 4-Way Handshake for establishing security association between STA and AP Pre-Shared Key (PSK) mode between AP and STA HuaweiSlide 7 Dec 2011

doc.: IEEE /0039r0 Submission RSNA Establishment Procedures (I) HuaweiSlide 8 Supplicant Unauthenticated Unassociated 802.1x Blocked Authenticator Unauthenticated Unassociated 802.1x Blocked Authentication Server (Radius) (1) Beacon +AA RSN-IE (2) Probe Request (3) Probe Response + AA RSN-IE (4) Authentication Request (5) Authentication Response (6) Association Request +SPA RSN IE (7) Association Response Authenticated Associated 802.1x Blocked Security Params Authenticated Associated 802.1x Blocked Security Params (8) EAPOL-Start (9) EAPOL-Request Identity (10) EAPOL-Response Identity Stage 1: Network and Security Capability Discovery Stage 2: Authentication And Association Stage 3: EAP/802.1X/ Radius Authentication 1)This Open authentication and association is nothing but an RSN negotiation between STA and AP, Could FILS authentication be in parallel here? 2) At this stage, no MPDUs are allowed due to the 802.1X state machine blocking, Can we allow traffic to go through at this stage? 1)This Open authentication and association is nothing but an RSN negotiation between STA and AP, Could FILS authentication be in parallel here? 2) At this stage, no MPDUs are allowed due to the 802.1X state machine blocking, Can we allow traffic to go through at this stage? Observation and potential Improvement Areas for FILS Area 1: Dec 2011

doc.: IEEE /0039r0 Submission RSNA Establishment Procedures (II) HuaweiSlide 9 Supplicant Unauthenticated Unassociated 802.1x Blocked Authenticator Unauthenticated Unassociated 802.1x Blocked Authentication Server (Radius) (12) Mutual Authentication (14) EAPOL Success (16) {AA, Anounce, sn, msg1} Master Session Key (MSK) (17) {SPA, Snounce, SPA, sn, msg2, MIC} (18) {AA, Anounce, AA,GTK, sn+1, msg3, MIC} (19) {SPA, sn+1, msg4, MIC} (11) Radius Request (13) Radius Accept Master Session Key (MSK) Pairwise Master Key (PMK) Pairwise Master Key (PMK) Pairwise Transient Key (PTK) PTK, GTK Stage 3: EAP/802.1X/ Radius Authentication Stage 4 4-Way Handshake 3) This EAP/802.1X/Radius is supplementing the Open system authentication with mutual authentication between STA and Radius, Can this authentication be skipped if FILS authentication CAN take place at stage 2. 4) Can this FILS authentication be faster in generating the PMK? 3) This EAP/802.1X/Radius is supplementing the Open system authentication with mutual authentication between STA and Radius, Can this authentication be skipped if FILS authentication CAN take place at stage 2. 4) Can this FILS authentication be faster in generating the PMK? Area 2: 5) 4-way handshake guarantees the STA can mutually trust the AP and share their keys with the indication of the PMK, Can this process be skipped or optimized to satisfy the FILS performance requirements? 5) 4-way handshake guarantees the STA can mutually trust the AP and share their keys with the indication of the PMK, Can this process be skipped or optimized to satisfy the FILS performance requirements? Area 3: Pairwise Master Key (PMK) Dec 2011

doc.: IEEE /0039r0 Submission RSNA Establishment Procedures (III) HuaweiSlide 10 Supplicant Unauthenticated Unassociated 802.1x Blocked Authenticator Unauthenticated Unassociated 802.1x Blocked Authentication Server (Radius) GTK, 802.1X Unblocked 802.1X unblocked Generate Rand GTK (20) EAPOL-Key {Group, sn+2,GTK, Key ID, MIC} (21) EAPOL-Key {Group, Key ID, MIC} New GTK Obtained (22 ) Protected Data Packets Stage 5 Group Key Handshake (Optional) Stage 6 Secure Data Communication (23) DHCP Req/Res DHCP Server Dec 2011

doc.: IEEE /0039r0 Submission Modified Authentication and Association State Machine Huawei Slide 11 State 1 Unauthenticated, Unassociated Class 1 Frames State 2 Authenticated, Unassociated Class 1 & 2 Frames State 3 Authenticated, Associated (Pending RSN Authentication) Class 1,2 & 3 Frames IEEE 802.1X Controlled Port Blocked State 4 Authenticated, Associated Class 1,2 & 3 Frames IEEE 802.1X Controlled Port UnBlocked Successful Authentication Successful (Re)Association –RSNA Required 4- way Handshake Successful Deauthentication Deassociation Deauthentication Unsuccessful (Re)Association (Non-AP STA) Successful Authentication Unsuccessful (Re)Association (Non-AP STA) Disassociation Successful Authentication Successful (Re) Association No RSNA required or Fast BSS Transitions State 5 FILS Authenticated Class 1 & 2 Frames With Selected Management & Data Frames IEEE 802.1x controlled Port blocked FILS Authenticated Class 1 & 2 Frames With Selected Management & Data Frames IEEE 802.1x controlled Port blocked Successful FILS Authentication FILS Deauthentication FILS Key Handshake Dec 2011 Slide 11

doc.: IEEE /0039r0 Submission FILS Authenticated State Upon receipt of a Beacon message from a AP STA or Probe Request from non-AP STA with FILS authentication number, both the STA and AP’s shall transition to FILS Authenticated state STA at FILS Authenticated State, it allows Class 1,2 and selected Data frames piggybacked over Class 1 &2 frames to be transmitted Upon receipt of a De-association frame from either STA or AP STA with reasons, the STA at the FILS authenticated state will be transitioned to State 1. STA transitioned back to State 1 may retry with FILS authentication or use the RSNA authentication Upon receipt of a FILS key exchange success, the STA shall transition to state 3 which is allows full class 1, 2 and 3 frames to pass through. HuaweiSlide 12 Selected Management Frames and Data Frames Reasons EAPOL To carry out the EAPOL authentication at FILS Authenticated State DHCP To enable the parallel DHCP processing Dec 2011

doc.: IEEE /0039r0 Submission Appropriate FILS Authentication Properties HuaweiSlide 13 Mandatory Properties i FILS Security Mutual Authentication with key agreement Yes Strong Confidentiality Yes RSNA Security Model Yes Key Confirmation Yes Key Derivation Yes Fast Re-authentication Yes Strong Session Key Yes Replay Attack Protection/MTIM protection/Dictionary Attack /Impersonation Attack Protection Yes Recommended Properties i FILS Security Fast and EfficientNo Yes Forward SecrecyImplementation Related Denial of Service ResistanceImplementation Related Dec 2011

doc.: IEEE /0039r0 Submission Authentication Algorithm Number Field Insert the following FILS Authentication Algorithm Number – Authentication algorithm number = 0: Open System –Authentication algorithm number = 1: Shared Key –Authentication algorithm number = 2: Fast BSS Transition –Authentication algorithm number = 3: simultaneous authentication of equals (SAE) –Authentication algorithm number = 4: FILS Authentication –Authentication algorithm number = : Vendor specific use HuaweiSlide 14 Dec 2011

doc.: IEEE /0039r0 Submission IEEE TGai FILS Authentication (Revising Revmb Section ) Dec 2011 HuaweiSlide 15 Supplicant AP / Authenticator AS 1) Beacon 2) Probe Request 3) Probe Response 4) |802.1x EAP OL-Start with Security Parameters for FILS handshake) 5) Access Request (EAP Request) 6) EAP Authentication Protocol Exchange AS Generates PMK 7) Accept/ EAP Success/ PMK 8) 802.1x EAPOL success || msg 1: EAPOL-KEY (Anounce, Unicast)) Supplicant Generates PMK Removing EAP-Identity Request / Response Message Authenticator Stores PMK And Generate Anounce Supplicant Derives PTK 4 Way Handshake Message is overhauled in Auth Resp State 1 State 5 State 1 State 5

doc.: IEEE /0039r0 SubmissionHuaweiSlide 16 Supplicant AP / Authenticator 9) Association Request ( Msg 2: EAPOL-Key (Snounce, Unicastm MIC) 10) Association Response ( Msg 3: EAPOL-Key (Install PTK, unicast, MIC, Encrypt (GTK, IGTK) )) Msg 4: EAPOL-Key (Unicast, MIC) Secure Data Communication Supplicant with PTK Authenticator with PTK |GTK|IGTK Optional Msg 4 for key confirmation Install PTK, GTK IGTK Install PTK, GTK IGTK IEEE TGai FILS Handshake (Revising Revmb Section ) State 5 State 4 State 5 State 4 Dec 2011

doc.: IEEE /0039r0 Submission Protocol Analysis Parallelize the Open Authentication Request/Response with EAPOL Authentication for STA and AS to execute the mutual authentication with EAP method neutral and generate PMK Remove the EAP Identity Request and Response messages whose functions will be carried out in EAPOL start message Parallelize the message 1 of 4-way handshake (now 3 way handshake) on association response for STA to simultaneously generate the PMK and PTK Parallelize the 3 way handshake with association request/response message handshakes Original 4 way handshake is reduced to 3 way handshake to satisfy the performance requirements (changing from Bilateral Key confirmation to Unilateral key confirmation). No violating RSNA security protocol and security models Total of 10 message handshakes vs 21 message handshakes HuaweiSlide 17 Dec 2011

doc.: IEEE /0039r0 Submission Further Development for FILS authentication Problem observed: The EAP authentication between STA and AP usually takes longer processing time given some specific EAP methods being deployed (i.e EAP- TLS with RSA and DH cipher suites) Suggested working area: HuaweiSlide 18 Dec 2011

doc.: IEEE /0039r0 Submission Questions & Comments Slide 19Huawei. Dec 2011