Doc.: IEEE 802.11-03/552r0 Submission July 2003 Jon Edney, NokiaSlide 1 Protection of Action Frames Jon Edney Nokia

Slides:



Advertisements
Similar presentations
Doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks.
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Doc.: IEEE /684r0 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks.
Doc.: IEEE /1206r0 Submission Oct 2004 Black, NokiaSlide 1 TGk LB71 Parallel category comment resolution Simon Black (Nokia)
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
Doc.: IEEE /109r1 Submission July 2002 J. Edney, H. Haverinen, J-P Honkanen, P. Orava, Nokia Slide 1 Temporary MAC Addresses for Anonymity Jon.
Doc.: IEEE /0110r3 SubmissionLiwen Chu Etc.Slide 1 Frame Header Compression Date: Authors: Date: Jan, 2012.
Submission Page 1 January 2003 doc.: IEEE /029r0 Daryl Kaiser, Cisco Systems New Radio Measurement Actions within the h Framework Daryl.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
Doc.: IEEE k Submission July 2004 Bernard Aboba, MicrosoftSlide 1 IEEE k Security: A Conceptual Model Bernard Aboba Microsoft.
Doc.: IEEE /1147r1 Submission November 2009 David Halasz, AclaraSlide 1 Path Protection Date: Authors:
TGaq Transaction Protocol
November 2010 doc.: IEEE e Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: LB60 comment.
Security Enhancement to FTM
WEP & WPA Mandy Kershishnik.
Standardizing for Change
Service discovery architecture for TGaq
Header Compression Date: Authors: May 2012 Month Year
Extended Usage of STKSA
Issues of MAC Management Security
Broadcast and Unicast Management Protection (BUMP)
Martin Lefkowitz Trapeze Networks
Key Descriptor Version in EAPOL Key Frames
Extra MIC for use in Public Access WLAN
Mesh Frame Format and Addressing
doc.: IEEE <02/139r0> <January 2002> May, 2009
Consideration on Wake-Up Receiver Security
IGTK Switch Announcement
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Call for Proposals] Date Submitted:
Limiting Degrees of Freedom for Measurement Requests
December 7, 2018 doc.: IEEE r0 July, 2003
Broadcast and Unicast Management Protection (BUMP)
Stefan Rommer, Mats Näslund, András Méhes (Ericsson)
Broadcast and Unicast Management Protection (BUMP)
May 2009 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [ 1-octet MAC Header frame types ] Date Submitted:
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
Security for Measurement Requests and Information
Security for Measurement Requests and Information
Existence Indication of Attacker or Jammer in LMR
Proposal for Extensible Security
Security for Measurement Requests and Information
2/4/2019May 2008 November 2007 doc.: IEEE /2752r1
November 2009 doc.: IEEE /0825r0 November 2009
AP Power Down Notification
AP Power Down Notification
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Frame signaling options for Security.
February 24, 2019 doc.: IEEE r0 July, 2003
Multicast Replay Detection Fred Stivers, Texas Instruments
<author>, <company>
CID#89-Directed Multicast Service (DMS)
f- 433 MHz PHY and MAC for TG4f - Preliminary Proposal July 2009 Project: IEEE P Working Group for Wireless Personal.
Beacon Protection Date: Authors: July 2018 July 2018
Measurement reporting in TGh
Overview of Improvements to Key Holder Protocols
Clause 7 Comment Resolutions
Beacon Protection Date: Authors: May 2018 January 2018
Overview of Improvements to Key Holder Protocols
<author>, <company>
Use of EAPOL-Key messages
Use of More Data Field Date: Authors: Nov 2005 Month Year
doc.: IEEE < IETF>
Use of More Data Field Date: Authors: Jan 2006 Jan 2006
WPA Coordination Changes
Extended Usage of STKSA
Encrypting Management Frames
Presentation transcript:

doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 1 Protection of Action Frames Jon Edney Nokia

doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 2 Issue Action management frame has been defined and used in TGh. Also proposed for use in TGe & TGk Currently there is no security protection for action frame: –No integrity protection –No privacy

doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 3 What is Action Frame? It is a management frame with an open payload. The format / meaning of the payload depends on the application and is different between task groups. Basic format: CATEGORYACTION DETAILS 1 octetN octets 0 : Spectrum management 1 – 127 : reserved for other applications 128 – 255 : Error

doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 4 Why is protection needed? TGk plan to use the action frame to send data about the current status of stations and access points. This information should be private to the network. External monitoring can reveal information such as the location of stations in a building Forging of action frames could cause unwanted network behaviour – active attacks may be possible Very likely that other task groups in future will need both integrity and privacy for the information they wish to pass in action frames

doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 5 Problem If TGi does not propose a solution for Action Frames then the other groups are likely to make an attempt to provide their own security - This is probably bad

doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 6 Suggested approaches Protect using key derived from group key using separate sequence counter Treat action frame like a data frame and use existing pairwise or group keys with existing sequence counter

doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 7 Frame coding Use upper bit of category to indicate protected payload Add appropriate security header at start of payload and MIC at end CategorySecurity HeaderPayloadMIC 1 0 : Spectrum Management : reserved Similar format to TKIP header or CCMP header: KeyID bits & IV Encrypted

doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 8 Conclusion There is definitely a need to protect the Action Management Frame If TGi doesn’t provide a solution individual task groups will have to do it Straw poll: –Does TGi feel that it can/should propose a protection mechanism for action frames