Doc.: IEEE 802.11-05/1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 1 MISP based Authentication Framework Notice: This document has been.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0300r1 Submission May 2007 Guenael Strutt, MotorolaSlide 1 LB93 Unresolved RFI Comments Notice: This document has been prepared to.
Advertisements

Doc.: IEEE /0866r1 Submission September 2005 Michael Montemurro, Chantry NetworksSlide 1 Mobility Domain Definition and Description Notice: This.
Doc.: IEEE /90r0 Submission Nov., 2012 NICTSlide b NICT Proposal IEEE P Wireless RANs Date: Authors: Notice: This document.
Doc.: IEEE /0930r0 Submission July 2006 Nancy Cam-Winget, Cisco Slide 1 Editor Updates since Jacksonville Notice: This document has been prepared.
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
Doc.: IEEE /0094r0 Submission November 2009 Steve Shellhammer, QualcommSlide 1 Comments on PAR Notice: This document has been prepared.
Doc.: IEEE /1020r0 Submission September 2008 Hitoshi MORIOKA, ROOT Inc.Slide 1 WLAN field trial in high speed moving environment Notice: This.
Doc.: IEEE /1138r1 Submission November 2005 Cheng Hong, PanasonicSlide 1 Authorization Information in interworking Notice: This document has been.
Doc.: IEEE /1138r0 Submission November 2005 Cheng Hong, PanasonicSlide 1 Authorization Information in interworking Notice: This document has been.
Doc.: IEEE /0121r0 Submission January 2006 S. Bezzateev, A. Fomin, M. WongSlide 1 Broadcast Management Frame Protection Notice: This document.
Doc.: IEEE /0644r2 Submission May 2006 Päivi Ruuska, NokiaSlide 1 Measurement Pilot Transmission Information as optional information in Probe.
Doc.: IEEE /0025r1 Submission January 2007 Peng Mo, Huawei Technologies Co., Ltd.Slide 1 MAPID for User Plane Support Notice: This document has.
Doc.: IEEE /1219r2 Submission January, 2006 S. Ponnuswamy (Aruba Networks)Slide 1 Virtual AP Presentation Notice: This document has been prepared.
Doc.: IEEE /1807r2 Submission November 2006 Matthew Fischer (Broadcom)Slide 1 TGN adhoc MAC subgroup report for November 2006 Notice: This document.
Doc.: IEEE /0072r0 Submission January 2009 Slide 1 Proxy ARP Issue for Direct Link Setup Notice: This document has been prepared to assist IEEE.
November 2005doc.: IEEE /1079r0 Stuart GoldenNovember Notice: This document has been prepared to assist IEEE It is offered as a.
Doc.: IEEE /1212r0 Submission TGT and MEF Liaison Notice: This document has been prepared to assist IEEE It is offered as a basis for.
Doc.: IEEE /86r2 Submission March, 2010 Gabor BajkoSlide 1 Location Proxy Notice: This document has been prepared to assist IEEE It is.
Doc.: IEEE /0667r0 Submission July 2005 Mike Moreton, STMicroelectronicsSlide 1 Multiple Networks Notice: This document has been prepared to assist.
Doc.: IEEE /0028r0 Submission January 2005 Eleanor Hepworth, Siemens Roke ManorSlide 1 Definitions and Terminology Notice: This document has been.
Doc.: IEEE /1528r0 Submission 22 September 2006 Naveen Kakani, Nokia, IncSlide 1 TGn PSMP adhoc Group September Closing Report Notice: This document.
Doc.: IEEE /0197r0 Submission March 2005 Nancy Cam-Winget et alSlide 1 TAP & JIT Merge Process Notice: This document has been prepared to assist.
Doc.: IEEE /0460r1 Submission March 2006 Fujio Watanabe, DoCoMo USA LabsSlide 1 Japanese Emergency Call Regulation Notice: This document has been.
Doc.: IEEE /0136r0 Submission January 2007 Dave Stephenson, Cisco Systems, Inc.Slide 1 Input to Information Model Date: Notice:
Doc.: IEEE /1006r0 Submission September 2005 Andrew McDonald, Siemens Roke ManorSlide 1 Initial Network Selection Concept Notice: This document.
Doc.: IEEE /0652r1 Submission May 2007 Emily Qi, Intel CorporationSlide 1 TGv Redline D0.12 Insert and Deletion Notice: This document has been.
Beacon Measurement on Pilot Frames
[ Interim Meetings 2006] Date: Authors: July 2005
IEEE WG Status Report – July 2005
TGu/TGv Joint Session Date: Authors: July 2005 July 2005
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
TGu Closing Report Date: Authors: November 2005
Attendance and Documentation for the March 2007 Plenary
3GPP Extended Date: Authors: July 2005 July 2005
[ Policies and Procedure Summary]
Problem & Proposal for User Plane Support for QoS Mapping
3GPP liaison report May 2006 May 2006 Date: Authors:
Motion to accept Draft p 2.0
Protected SSIDs Date: Authors: March 2005 March 2005
Some Operator Requirements on Management
3GPP liaison report July 2006
On Coexistence Mechanisms
GPS Aided WLAN Network Finder
TGu-changes-from-d0-02-to-d0-03
TGu Closing Report Date: Authors: July 2006 July 2006
On Coexistence Mechanisms
Reflector Tutorial Date: Authors: July 2006 Month Year
Proposal for User Plane Support for QoS Mapping
TGu Closing Report Date: Authors: September 2005
ADS Study Group Mid-week Report
TGu-changes-from-d0-01-to-d0-02
LB73 Noise and Location Categories
Secure Network Selection
TGy draft 2.0 with changebars from draft 1.0
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
802.11u Bootstrap Procedure with
TGu-changes-from-d0-02-to-d0-03
[ Policies and Procedure Summary]
Beamforming and Link Adaptation Motions
Limiting GAS State-1 Query Response Length
STA Location for emergency call support in SSPN interface
TGu-changes-from-d0-04-to-d0-05
TGu-changes-from-d0-03-to-d0-04
TGu Motions Date: Authors: May 2006 May 2006
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Use of KCK for TGr Management Frame Protection
Use of KCK for TGr Management Frame Protection
Proposal for User Plane Support for QoS Mapping
Presentation transcript:

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 1 MISP based Authentication Framework Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE Working Group. If you have questions, contact the IEEE Patent Committee Administrator at. Date: Authors:

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 2 Abstract We have modified our MIS protocol (DCN:11-05/0859r0) to meet the requirements. This pre-proposal describes the frame exchanges between STA, AP and authentication servers (AS). It meets the following TGu requirements. –R3N1 –R3N3 –R3P2 –R3S1 –R3S2 –R3M1 –R3M3

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 3 System Architecture AP Authentication Servers (AS) STA AP STA Authentication Servers (AS) SSPN A SSPN B

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 4 Pre-shared Information APASSTA No pre-shared information between AP and STA Share an identifier (User-ID) and a secret key (User-key) Each STA has a different key Share an identifier (AP-ID) and a secret key (AP-key) Each AP has a different key

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 5 SSPN ID SSPN ID is the unique identifier of SSPN. SSPN ID should be assigned by a public agency like IEEE, IANA and so on.

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 6 Protocol Overview STAAPAS Authentication Request Access Request Access Authorization Authentication Success Associate Mutual Authentication Session Key Sharing Upper Layer Information (Optional) Probe Request Probe Response

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 7 Probe Request STA broadcasts a probe request with the virtual MAC address as source address. A probe request includes –SSPN IDs which the STA wish to connect

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 8 Probe Response Each AP has a list of SSPN IDs which can be connected to. When AP receives a probe request, AP searches its SSPN ID list. The AP sends a probe response to the STA. A probe response includes –Timestamp –All matched SSPN IDs –Supported Security Types

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 9 Authentication Request Message If some SSPN IDs are in the probe response, the STA selects preferred SSPN and sends an authentication request message to the AP. An authentication request message includes –Timestamp (included in the probe response) –User ID –SSPN ID –STA-AP Security Type (used between the STA and the AP) –Session Key Seed (random value) –ICV (Integrity Check Value, generated from the authentication request message itself)

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 10 Access Request Message When the AP receives the authentication request message, it checks the timestamp new enough. Then it sends an access request message to the appropriate AS. The access request message includes –Authentication Data (generated from the authentication request message) –User ID, SSPN ID, Session Key Seed and ICV (included in the authentication request message) –Authenticator (generated from the access request message itself) –AP-AS Security Type (used between the AP and the AS) –AP-ID Any networks can be used for delivering access request messages. Network ID can be used as the AP-ID

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 11 Access Authorized Message When the AS receives the access request message, it checks the integrity of the request by the authenticator and the AP-key. Then it authenticates the STA by the authentication data, ICV, User ID and the User-key. If the authentication is successful, the AS sends an access authorized message. The access authorized message includes –Session Key Delivery Data (generated from the session key seed, User- key, AP-key and ICV) –ICV (included in the access request) –Authenticator (generated from the access authorized message itself)

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 12 Authentication Success Message When the AP receives the access authorized message, it checks the integrity of the message by the authenticator and the AP-key. Then it sends the authentication success message to the STA. The authentication success message includes –ICV (generated from the session key delivering data, ICV in the access authorized message, AP-key and the authentication success message itself) –Network Information (Optional) When the STA receives the authentication message, it checks the integrity of the message by the ICV,

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 13 Authentication APASSTA Authentication Request Message Authentication Data (16byte) ICV (16byte) MD5 HMAC-MD5 (User-key) Authentication Request Message Authentication Data (16byte) Access Request Message ICV (16byte) Extract Authenticator (16byte) MD5 HMAC-MD5 (AP-key) Access Request Message Authenticator (16byte) Authentication Data (16byte) ICV (16byte) Authenticator (16byte) ICV (16byte) Extract HMAC-MD5 (AP-key) HMAC-MD5 (User-key) Compare Probe Response Probe Response Seed User ID Check Timestamp Transmit Timestamp SSPN ID Check SSPN ID AP ID STA-AP security type: HMAC-MD5/AES-CBC-128bit, AP-AS security type : HMAC-MD5

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 14 Authentication (Cont.) APASSTA Authentication Success Message Authentication Data (16byte) ICV (16byte) MD5 HMAC-MD5 Authenticator (16byte) Access Request Message Seed (16byte) Session Key (16byte) ICV (16byte) Extract HMAC-MD5 (User-key) Extract HMAC-MD5 (AP-key) Hashed ICV (16byte) Session Key DD (16byte) XOR Access Approval Message Authenticator (16byte) HMAC-MD5 (AP-key) Access Approval Message Authenticator (16byte) Compare Extract HMAC-MD5 (AP-key) ICV (16byte) Hashed ICV (16byte) Extract HMAC-MD5 (AP-key) Session Key DD (16byte) Session Key (16byte) Extract XOR Authentication Success Message Authentication Data (16byte) ICV (16byte) MD5 HMAC-MD5 ICV (16byte) Seed (16byte) Session Key (16byte) HMAC-MD5 (User-key) Compare Extract Network Info (Optional) Transmit

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 15 Data Message Format (HMAC-MD5/AES-CBC-128bit) IVh Payload Padding (variable length) ICV Encrypted Portion IVh: Upper 8 octets of the Initialization Vector for AES-CBC Payload: A packet data of the upper protocol Padding: It makes the payload multiple of 16 octets IEEE Header Expansion of the IEEE header will be needed.

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 16 Encryption, Decryption and Message Authentication (AES-CBC-128bit) ReceiverSender Data Message 1. 8 octet IVh is randomly generated. 2. Each octet of the IVh rotate 1bit left. It is IVl. 3. Concatenate IVh and IVl. It is IV. 4. ICV is upper 6 octet of IVh. 5. Encrypt the payload, padding and the ICV by AES-CBC. 6. Make the message by adding IEEE header and the IVh. IVh IVl ICV Data Message 1. Extract the IVh from the data message. 2. Each octet of the IVh rotate 1bit left. It is IVl. 3. Join IVh and IVl. It is IV. 4. ICV is upper 6 octet of IVh. 5. Decrypt the data message. 6. Extract the ICV from the decrypted message and compare it to the ICV calculated in 4 to confirm validity. Transmit

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 17 Session Key Updating Time Key A Key B Authentication The session key is identified by the flag in the extended IEEE header. The session key updating interval should be discussed.

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 18 Multiple SSPN support Base Router (BR) AS SSPN: A AS SSPN: B Access Request for SSPN B Access Request for SSPN A Access Reply Access Reply Base Router (BR) AS Domain: foo AS Domain: bar Access Request for Domain bar and foo Access Reply Access Reply Access Request for Domain foo (a) By BR configuration(b) By AS proxy

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 19 Power Consumption Consideration (R3M1) The STA must send at least 1 probe request in each channel. It means the power consumption of the STA is higher than passive scan. The STA sends only 1 frame for authentication and session key exchange. It means the power consumption is lower than authentication method like EAP.

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 20 Security Consideration (R3M3) Eavesdropping –Protected by cipher Fake AP –Protected by mutual authentication Session Hijack (R3P2) –Protected by authentication of all frames

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 21 Requirements R3N1 –Solved by probe request and probe response R3N3 –This framework allows authentication with multiple SSPNs R3P2 –Solved by authentication of every frame R3S1 –Described R3S2 –Described R3M1 –Described R3M3 –Described

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 22 Future Work Designing the extended IEEE header Designing the formats of the messages Adapting the proposal to the requirements

doc.: IEEE /1093r0 Submission November 2005 Hitoshi MORIOKA, ROOT Inc.Slide 23 Questions and Comments?