1 / 13

Simplified 11k Security

May 2004. doc: IEEE 802.11-04/552r0. Simplified 11k Security. Joe Kwak InterDigital Communications Corporation. Problem statement. For the purpose of optimizing O&M and radio performance, 802.11k, Introduces many new MAC management action frames

rjuan
Download Presentation

Simplified 11k Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. May 2004 doc: IEEE 802.11-04/552r0 Simplified 11k Security Joe Kwak InterDigital Communications Corporation Joe Kwak, InterDigital

  2. Problem statement • For the purpose of optimizing O&M and radio performance, 802.11k, • Introduces many new MAC management action frames • Adds couple of new IEs to several existing frames • Those new 11k contents exchanged over the air currently do not provide any security (source integrity, encryption) • It is thinkable that this may become a security threat to 11k enabled WLAN in the future, • Threat 1: No security, 11k may repeat another WEP experience • Threat 2: Resolution of 11k security issue delays 11k as a whole • Threat 3: 11k solution too complex to implement and/or not aligned with 11i hardware changes • Requirement to create a mechanism that (optionally) provides security of the new TGk information contents Joe Kwak, InterDigital

  3. Some thoughts… • We anticipate there is a potential security problem if 11k specification does not provide any source integrity and encryption • But it is unclear if there is a real danger and if yes, to which extent it would jeopardize system operation • 11k security will need to operate in the general framework given by WPA and 11i • No need to have a tighter security concept in 11k than in WPA and 11i • 11k security must not preclude operation of WPA or 11i security Joe Kwak, InterDigital

  4. Options to solve the problem 1. Do nothing (like 11h, and let some other group address this issue when/if it becomes problem) 2. Try to address the 11k security issue: 802.11-04/1003r2 Nokia, 01/04 802.11-04/0264r2 Intel, 03/04 3. Simplify the security issues using elements from the above two proposals • InterDigital believes the third option is possible. Joe Kwak, InterDigital

  5. InterDigital’s perception • 11k should provide security more for future-proofness than for any actual perceived threat from disclosing or forging radio resource measurement information • For 11k, providing source/message integrity protection is the most important security mechanism and should be required: • Source integrity comes at relatively low cost, compute and append TKIP MIC • Offers the most basic of all protection mechanisms, “if someone tampered with the frame contents, then discard” • Encryption should be optional for all frames using Nokia or Intel proposal • Legacy or not-yet-authenticated STAs can still read unencrypted information on broadcast frames and will ignore the TKIP MIC • Nokia proposal for encryption is more flexible but seems to be misaligned with 11i and the 11i per-frame encryption engine • Intel proposal is straightforward (works like for data frames in 11i, so encryption engine the same), but it may not address all scenarios Joe Kwak, InterDigital

  6. Simplifying Assumptions • IEEE802.11i is completed as per current draft 10.0 and provides the mechanisms (but not to forget WPA…) • Good keys are available and managed under IEEE802.11i • Group key (common key) • Session keys (STA-specific) • A STA does not know any key before it gets authenticated • Any authenticated STA can be trusted, therefore, group keys are useful and used for all broadcast/multicast • 11k security is an optional feature • Must be implemented in all TGk STAs, but can be enabled or disabled based on local BSS policy Joe Kwak, InterDigital

  7. Simplified Proposal for TGk Security • 1. Require TKIP MIC in all action frames: • Transmitting STA computes/encrypts/appends TKIP MIC to allow receiving STA to authenticate both message and sender before acting on contents of received frame. • TKIP MIC mechanism is modified for use with group key(s) for broadcast/multicast frames. • 2. Use frame-based encryption as option for all action frames: • New security header bit indicates encrypted/unencrypted. All frame formats include security header and TKIP MIC. • Frames which carry useful information for STAs not yet associated should not be encrypted, e.g. Beacons, Probe Responses, Site Report, new System Information, etc. • The transmitter of the action frame decides when to encrypt. • The receiver of the action frame uses TKIP MIC to decides whether to respond or take any action. Joe Kwak, InterDigital

  8. Extend TKIP MIC to Broadcast/Multicast • Need to accept limitations of defined 11i mechanisms: • 11i 5.4.3.5: “Data origin authenticity is only applicable to unicast data frames. The protocols do not guarantee data origin authenticity for broadcast/multicast data frames, as this cannot be accomplished using symmetric keys, and public key methods are too computationally expensive.” • 11i 8.3.2.3.1: “It should be noted that a MIC alone cannot provide complete forgery protection, as it cannot defend against replay attacks. TKIP provides replay detection by TSC sequencing and ICV validation. Furthermore, if TKIP is utilized with a group key, an “insider” STA can masquerade as any other STA belonging to the group.” • Run 11i encryption engine on frame using group key to compute and encrypt TKIP MIC for every broadcast/multicast action frame. • Encryption engine also produces encrypted frame using group key. • The encrypted frame body is discarded when transmitting unencrypted action frame with TKIP MIC. Joe Kwak, InterDigital

  9. Benefits of Proposal • Avoids discussions/disagreements concerning mandatory data encryption: • Do not need to poll/vote on encryption of each action frame type or IE and conditions in which encryption should be used. • Do not need to “impose” encryption on operators or users. • Relies on integrity of existing security protocols: • Uses 802.x for strong authentication and key distribution at association time, STA is trusted thereafter. • Uses defined 11i mechanisms with extension for TKIP MIC with group key for broadcast/multicast. • Relatively easy to draft text: • All TGK action frames and frame formats treated identically. • Procedures section describes intended use of data encryption but includes no requirement “shalls”. Joe Kwak, InterDigital

  10. Proposal for a way forward • Strawpoll to agree on two security decisions: • Require security header and TKIP MIC on all 11k action frames • Security header shall contain Encrypted/Clear bit to permit optional encryption of frame body for all 11k action frames • Drafting group to produce normative text this week. • Vote on normative text on Thursday, if possible. • Extending these 11k decisions to 11h to be discussed for next meeting. Joe Kwak, InterDigital

  11. Security Question #1 • Should TGk require a security header and TKIP MIC on all 11k action frames ? • YES _______ • NO _______ • ABSTAIN _______ Joe Kwak, InterDigital

  12. Security Question #2 • Should the TGk security header contain an Encrypted/Clear bit to permit optional encryption of frame body for all 11k action frames? • YES _______ • NO _______ • ABSTAIN _______ Joe Kwak, InterDigital

  13. Joe Kwak, InterDigital

More Related