Download presentation
Presentation is loading. Please wait.
1
doc.: IEEE 802.11-01/454r0 Bob Beach Symbol Technologies
July 2001 doc.: IEEE /454r0 July 2001 IBSS and ESN Bob Beach Symbol Technologies Bob Beach Bob Beach
2
IBSS and ESN Current baseline really does not address IBSS networks
July 2001 IBSS and ESN Current baseline really does not address IBSS networks Most of the assumptions of baseline are absent in IBSS No AP to advertise/negotiate cypher and authentication suites No AP to respond to probes (any station can respond) No associations – stations can transmit whenever they like No place for 802.1x port control Assume manual configuration for IBSS is not sufficient E.g. write cypher suite and encryption key on blackboard and have each user enter the information manually Maximize commonality between IBSS and ESS modes Bob Beach
3
Review of IBSS Operation
July 2001 Review of IBSS Operation In 1999 specification only Station Services supported Authentication, Deauthentication, Privacy, MSDU delivery IBSS is indicated by bit in capability field of beacon WEP is also so indicated All stations in an IBSS generate a beacon on regular basis First STA in IBSS sets beacon interval Stations update local configuration based upon last beacon received Stations may generate probe requests Station that transmitted last beacon responds to probe Stations can transmit whenever they want per DCF Bob Beach
4
Desired Functionality for ESN IBSS
July 2001 Desired Functionality for ESN IBSS Key Distribution All stations use same session key May have separate broadcast key Key Derivation Need to derive actual keys for AES use from session Yields set of keys per station pair Cypher Suite Assumption: one suite for all stations Bob Beach
5
Basic Model -1 Per baseline, no MAC layer Authentication
July 2001 Basic Model -1 Per baseline, no MAC layer Authentication E.g. no authentication, deauthentication services Any station can send data packets whenever it wants Most of 802.1x functionality is not used No entity to act as port controller Request/response packets are used to carry authentication packets One station acts as Security Coordinator for IBSS Specifies Cypher suite and authentication suite for IBSS Allocates encryption key using authentication suite Bob Beach
6
July 2001 Basic Model -2 Stations use Probe/Probe Response messages to derive AES keys much like BSS model uses association packets Done between each pair of stations that want to exchange data Bob Beach
7
Security Coordinator (SC) -1
July 2001 Security Coordinator (SC) -1 Any station can perform the SC functions Need not be station that instantiates the IBSS Application that runs above the MAC layer Generates beacons as do other stations in IBSS but they contain additional information Only its beacons contain ESN bit (other stations’ beacons don’t) Contain cypher suite and authentication suite for IBSS using elements defined in ESN Specifies only one option for each. Use of indicated suites is mandatory for particular IBSS Bob Beach
8
Security Coordinator (SC) -2
July 2001 Security Coordinator (SC) -2 Key Distribution uses authentication algorithm Authentication packets are carried inside 802.lx request and response packets Addressed to station generating ESN tagged beacon Baseline authentication algorithm is used (e.g. Kerberos) Bob Beach
9
July 2001 Kerberos Usage in IBSS Security Coordinator station operates as Mini-KDC Stations do regular Kerberos handshake using information in ESN tagged beacons Mini-KDC allocates same session key to all stations using Kerberos packet exchanges Users share common password distributed manually or agree upon some password derivation model (password = username) SC application may have user interface that allows manual user approval I.e. authenticate “George”? “Yes/no ?” Allows membership in IBSS to be known Bob Beach
10
Key Derivation Need to derive AES keys from session key
July 2001 Key Derivation Need to derive AES keys from session key Add nonce to probe/probe response packets When a station needs to send a data packet to another station for the first time it sends a probe packet to it containing the nonce. The target station replies with a probe response containing its nonce Both stations compute AES key using the contents of the probe/probe response packets Bob Beach
11
July 2001 Proposed Motions Proposed: The model of IBSS ESN operation contained in this document be added to the Tgi baseline. Proposed: Tgi instruct the author of this document to prepare text for incorporation into the next revision of the Draft specification. Bob Beach
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.