IEEE 802.11w
   HOME

TheInfoList



OR:

IEEE 802.11w-2009 is an approved amendment to the
IEEE 802.11 IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer commun ...
standard to increase the security of its management frames.


Protected management frames

Current 802.11 standard defines "frame" types for use in management and control of wireless links. IEEE 802.11w is the Protected Management Frames standard for the
IEEE 802.11 IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer commun ...
family of standards. Task Group 'w' worked on improving the
IEEE 802.11 IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer commun ...
Medium Access Control layer. Its objective was to increase security by providing data confidentiality of management frames, mechanisms that enable data integrity, data origin authenticity, and replay protection. These extensions interact with
IEEE 802.11r IEEE 802.11r-2008 or fast BSS transition (FT), is an amendment to the IEEE 802.11 standard to permit continuous connectivity aboard wireless devices in motion, with fast and secure client transitions from one Basic Service Set (abbreviated BSS, an ...
and IEEE 802.11u.


Overview

* Single and unified solution needed for all IEEE 802.11 Protection-capable Management Frames. * It uses the existing security mechanisms rather than creating new security scheme or new management frame format. * It is an optional feature in 802.11 and is required for 802.11 implementations that support TKIP or CCMP. * Its use is optional and can be negotiable between STAs.


Classes

* Class 1 ** Beacon and probe request/response ** Authentication and de-authentication ** Announcement traffic indication message (ATIM) ** Spectrum management action ** Radio measurement action between STAs in IBSS * Class 2 ** Association request/response ** Re-association request/response ** Disassociation * Class 3 ** Disassociation/de-authentication ** QoS action frame ** Radio measurement action in infrastructure BSS ** Future 11v management frames


Unprotected frames

It is infeasible/not possible to protect the frame sent before four-ways handshake because it is sent prior to key establishment. The management frames, which are sent after key establishment, can be protected. Infeasible to protect: * Beacon and probe request/response * Announcement traffic indication message (ATIM) * Authentication * Association request/response * Spectrum management action


Protected frames

Protection-capable management frames are those sent after key establishment that can be protected using existing protection key hierarchy in 802.11 and its amendments. Only TKIP/AES frames are protected and WEP/open frames are not protected. The following management frames can be protected: * Disassociate * Deauthenticate * Action Frames: Block ACK Request/Response (AddBA), QoS Admission Control, Radio Measurement, Spectrum Management, Fast BSS Transition * Channel Switch Announcement directed to a client (Unicast) Management frames that are required before AP and client have exchanged the transmission keys via the 4 way handshake remain unprotected: * Beacons * Probes * Authentication * Association * Announcement Traffic Indication Message * Channel Switch Announcement as Broadcast Uni-cast Protection-capable Management Frames are protected by the same cipher suite as an ordinary data MPDU. * MPDU payload is TKIP or CCMP encrypted. * MPDU payload and header are TKIP or CCMP integrity protected. * Protected frame field of frame control field is set. * Only cipher suites already implemented are required. * Sender's pairwise temporal key (PTK) protects unicast management frame. Broad-/Multicast Robust Management Frames are protected using Broadcast/multicast integrity protocol (BIP) * Use Integrity Group Temporal Key (IGTK) received during WPA key handshake * Use Information Element: Management MIC IE with Sequence Number + Cryptographic Hash (AES128-CMAC based)


Replay protection

Replay protection is provided by already existing mechanisms. Specifically, there is a (per-station, per-key, per-priority) counter for each transmitted frame; this is used as a nonce/initialization vector (IV) in cryptographic encapsulation/decapsulation, and the receiving station ensures that the received counter is increasing.


Usage

The 802.11w amendment is implemented in Linux and BSD's as part of the 80211mac driver code base, which is used by several wireless driver interfaces; i.e., ath9k. The feature is easily enabled in most recent kernels and Linux OS's using these combinations. OpenWrt in particular provides an easy toggle as part of the base distribution. The feature has been implemented for the first time into
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washing ...
operating systems An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also inc ...
in Windows 8. This has caused a number of compatibility issues particularly with wireless access points that are not compatible with the standard. Rolling back the wireless adapter driver to one from Windows 7 usually fixes the issue.
Wireless LAN A wireless LAN (WLAN) is a wireless computer network A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking is a method by which homes, telecommunications networks and bus ...
s without this standard send system management information in unprotected frames, which makes them vulnerable. This standard protects against network disruption caused by malicious systems that forge disassociation requests (deauth) that appear to be sent by valid equipment http://www.ieee802.org/21/doctree/2005_Meeting_Docs/2005-09_meeting_docs/21-05-0381-00-0000-802-11-liaison-September05.ppt such as Evil Twin attacks.


See also

*
IEEE 802.11i IEEE 802.11i-2004, or 802.11i for short, is an amendment to the original IEEE 802.11, implemented as Wi-Fi Protected Access II (WPA2). The draft standard was ratified on 24 June 2004. This standard specifies security mechanisms for wireless networ ...
Enhanced Security *
IEEE 802.11r IEEE 802.11r-2008 or fast BSS transition (FT), is an amendment to the IEEE 802.11 standard to permit continuous connectivity aboard wireless devices in motion, with fast and secure client transitions from one Basic Service Set (abbreviated BSS, an ...
Fast BSS Transition * IEEE 802.11u Interworking with non-802.11 networks


References


External links


Status of the project 802.11w
IEEE Task Group w (TGw)
Tutorial on 802.11w
*Cisco 802.11r, 802.11k, and 802.11w Deployment Guide, Cisco IOS-XE Release 3.

{{DEFAULTSORT:Ieee 802.11w-2009 W pl:802.11w