Doc.: IEEE 802.11-09/1147r1 Submission November 2009 David Halasz, AclaraSlide 1 Path Protection Date: 2009-11-08 Authors:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0204r2 Submission March 2010 David Halasz, AclaraSlide 1 Comments on Sub 1 GHz license-exempt operation Date: Authors:
Advertisements

Doc.: IEEE /0413r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 A Study Group for Enhanced Security Date: Authors:
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Doc.: IEEE /0877r0 Submission June WG Slide 1 TGs response to CN NB comments Date: Authors:
Doc.: IEEE /770r0 Submission July 2009 Slide 1 TGs Authenticated Encryption Function Date: Authors: Russ Housley (Vigil Security), et.
Design of a Fault-Tolerant Link Establishment Protocol Stephen Horan and Giriprassad Deivasigamani Telemetering Center Klipsch School of Electrical and.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Centre for Wireless Communications University of Oulu, Finland
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Secure Routing in Ad Hoc Wireless Networks
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
ITIS 6010/8010: Wireless Network Security Weichao Wang.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Doc.: IEEE /1066r2 Submission July 2011 Robert Moskowitz, VerizonSlide 1 Link Setup Flow Date: Authors: NameCompanyAddressPhone .
Trust and Reputation Based mechanisms for CIP Uniparthenope, UniRC, Polito (Fai della Paganella, Febbraio 2014)
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
Doc.: IEEE /1308r0 Submission November 2009 Donald Eastlake 3rd, Stellar SwitchesSlide 1 Editorial remarks for Draft 3.05 Date: Author:
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
Doc.: IEEE /1288r1 Submission November 2010 Sameer Vermani, QualcommSlide 1 Frame Format for GroupID Management Date: Authors:
Doc.: IEEE e Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security.
Doc.: IEEE /0636r0 Submission April 2008 L. Chu Etc.Slide 1 Symmetrical Airtime Link Metric Report and Path Loop Avoidance Date: Authors:
Doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 1 Enhanced Security Date: Authors:
Doc.: IEEE Submission Aug Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Ordering in Time: A New Routing Approach for Wireless Networks Stephen Dabideen and J.J. Garcia-Luna-Aceves Department of Computer Engineering University.
Routing Information Protocol
Doc.: IEEE /0278r5 Submission March 2008 Javier Cardona et al. Avoiding Interactions with Lazy-WDS Equipment Date:
November 2011 Jin-Meng Ho and David Davenport. doc.: IEEE Slide 1Submission Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /0964r0 Submission September 2010 David Halasz, AclaraSlide 1 Smart Grid and Key Lengths Date: Authors:
Doc.: IEEE /1468r1 Submission Jan 09 Ashish Shukla, Marvell SemiconductorSlide 1 ERP Protection in IEEE s Mesh Network Date:
Doc.: IEEE /r0 Submission November 2005 Xin Yu and Hang LiuSlide 1 Implementation and Evaluation of AODV with Proactive Route Announcements.
Doc.: IEEE /1893r0 Submission December 2006 Marc Mosko, PARCSlide 1 [HWMP Routing Loops] Notice: This document has been prepared to assist IEEE.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
Doc.: IEEE /1115r2 Submission J Chhabra, A. R. Prasad, J. Walker, H. AokiSlide s Security concepts Jasmeet Chhabra, Intel
Doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 1 Protection of Action Frames Jon Edney Nokia
Submission doc.: IEEE /838r0 July 2016 Guido R. Hiertz, EricssonSlide 1 Resolution to CID 8291 Date: Authors:
Enhanced Security Features for
June 2005 doc.: IEEE /0593r0 July 2005 Summary Presentation Proposal L:19 Siemens Proposal for WLAN Mesh Networking Date: Authors:
Enhanced Security Features for
March 2012 doc.: IEEE March 2012 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Secure PSK Authentication
IGTK Switch Announcement
IEEE i Dohwan Kim.
IGTK Switch Announcement
doc.: IEEE <doc#>
ITIS 6010/8010 Wireless Network Security
Traffic Class Control in MBSS
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
December 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security considerations for 15.3e] Date.
IEEE ah Timeline Projection
doc.: IEEE <doc#>
802.1X in s Discussion Date: Authors: March 2011
RFI Update Munich Meeting
Beacon Protection Date: Authors: July 2018 July 2018
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Response to PAR and 5C Comments.
Relationship between peer link and physical link
Overview of Improvements to Key Holder Protocols
Beacon Protection Date: Authors: May 2018 January 2018
Overview of Improvements to Key Holder Protocols
Some feedback from editor
RFI Update Munich Meeting
Potential L2 security options for UL BCS
A Better Way to Protect APE Messages
RFI Update Munich Meeting
Presentation transcript:

doc.: IEEE /1147r1 Submission November 2009 David Halasz, AclaraSlide 1 Path Protection Date: Authors:

doc.: IEEE /1147r1 Submission November 2009 David Halasz, AclaraSlide 2 Abstract The path selection protocol has similar security concerns of path messages in AODV. Since the path selection messages use Multihop Action frames, the Multihop Action frames should be protected with IEEE w mechanisms. This will protect path messages on a link- to-link basis and not end-to-end. As of s draft 3.04, this presentation has already been addressed with the exception of updating the PICS.

doc.: IEEE /1147r1 Submission From RFC3561 – AODV 11 Security Considerations “… Route protocols, however, are prime targets for impersonation attacks. … … However, when the network membership is known and there is a danger of such attacks, AODV control messages must be protected by use of authentication techniques, such as those involving generation of unforgeable and cryptographically strong message digests or digital signatures. …” November 2009 David Halasz, AclaraSlide 3

doc.: IEEE /1147r1 Submission Areas that need attention from IEEE Clause CTR with CBC-MAC Protocol (CCMP) –Propose no change to CCMP. Mesh control field will be encrypted. November 2009 David Halasz, AclaraSlide 4

doc.: IEEE /1147r1 Submission Areas that need attention from IEEE w Clause The Broadcast/Multicast Integrity Protocol –CCMP issue doesn’t apply since not encrypting payload. Clause Action field –Add “Robust” column to s draft table 7-24 Already modified on D3.04 November 2009 David Halasz, AclaraSlide 5

doc.: IEEE /1147r1 Submission Areas that need attention from IEEE s draft PICS –If Mesh and SAE then must protect the management frames November 2009 David Halasz, AclaraSlide 6

doc.: IEEE /1147r1 Submission References [1] Perkins, C., Royer, E. and S. Das, " Ad hoc On- Demand Distance Vector (AODV) Routing", RFC 3561, July November 2009 David Halasz, AclaraSlide 7