WLAN
WLAN
11
Wi-Fi Alliance
If the MSDU is too large to be transmitted in a single MPDU, it may be fragmented and transmitted in a series of
MPDUs.
Association, Reassociation, Disassociation, Distribution, Integration and MSDU delivery
MSDU delivery, basic service, in which the information that is delivered as a unit between MAC users.
Distribution, the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to
get from a station in one BSS to a station in another BSS.
Integration, enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated
(wired) IEEE 802.x LAN. To deliver a message within a DS, the distribution service needs to know where the
destination station is located.
Reassociation, enables an established association to be transferred from one AP to another, allowing a mobile
station to move from one BSS to another.
Wireless LANs traffic can be monitored by any radio in range, not physically connected as in Wired LANs
Original 802.11 spec had security features for privacy and authentication.
Wired Equivalent Privacy (WEP) algorithm, but contained major weaknesses\
802.11i group developed capabilities for WLAN security issues
Wi-Fi Alliance Wi-Fi Protected Access (WPA)
WPA is a set of security mechanisms that eliminates most 802.11 security issues and was based on the
current state of the 802.11i standard.
final 802.11i Robust Security Network (RSN)
Authentication: A protocol is used to define an exchange between a user and AS that provides mutual
authentication and generates temporary keys to be used between the client and the AP over the wireless link.
Access control: Enforces the use of the authentication function, routes the messages properly, and facilitates
key exchange. It can work with a variety of authentication protocols.
Privacy with message integrity: MAC-level data (e.g., an LLC PDU) are encrypted, along with a message integrity
code that ensures that the data have not been altered.
IEEE 802.11i RSN operation can be broken down into five distinct phases of operation
Discovery: AP uses messages called Beacons and Probe Responses to advertise its IEEE802.11i security policy.
STA uses these to identify AP for a WLAN with which it wishes to communicate. STA associates AP, which it uses
to select the cipher suite and authentication mechanism when Beacons and Probe Responses present a choice.
Authentication: STA and AS prove their identities to each other. AP blocks non-authentication traffic between
STA and AS until the authentication transaction is successful. AP does not participate in the authentication
transaction other than forwarding traffic between STA & AS.
Key generation and distribution: AP and STA perform several operations that cause cryptographic keys to be
generated and placed on AP and STA. Frames are exchanged between AP and STA only
Protected data transfer: Frames are exchanged between STA and end station through AP. As denoted by the
shading and the encryption module icon, secure data transfer occurs between STA and AP only; security is not
provided end-to-end.
Connection termination: AP and STA exchange frames. During this phase, the secure connection is torn down
and the connection is restored to the original state.
The Discovery phase is for an STA and an AP to recognize each other, agree on a set of security capabilities, and
establish an association for future communication.
It consists of three exchanges: Network and security capability discovery, Open system authentication,
and Association.
The authentication phase enables mutual authentication between an STA and an authentication server (AS)
located in the DS.
Authentication is designed to allow only authorized stations to use the network and to provide the STA with
assurance that it is communicating with a legitimate network.
IEEE 802.11i uses the Extensible Authentication Protocol (EAP). Before wireless station (STA) is authenticated by
AS, the (AP) only passes control or authentication messages between STA and AS.
The 802.1X control channel is unblocked but the 802.11 data channel is blocked.
Once STA is authenticated and keys are provided, the AS can forward data from STA, subject to predefined
access control limitations for STA to the network and the data channel is unblocked.
802.11i Key Management Phase
AP controlled ports remain blocked until the temporal keys are installed in the STA and AP, which occurs during
the 4-Way Handshake.
A variety of cryptographic keys are generated and distributed to STAs.
There are two types of keys:
Pairwise keys, used for communication between STA and AP; and
Group keys, for multicast communication.
Pairwise keys form a hierarchy, beginning with a master key from which other keys are derived dynamically and
used for a limited period of time.
Pre-shared key (PSK) A secret key shared by AP and STA
Master session key (MSK), also known AAAK, which is generated using the IEEE 802.1X protocol during the
authentication phase,
Pairwise master key (PMK) is derived from the master key as follows:
If PSK is used, then PSK is used as the PMK;
If MSK is used, then PMK is derived from MSK. By the end of the authentication phase both AP and STA have a
copy of their shared PMK.
PMK is used to generate pairwise transient key (PTK), which in fact consists of three keys to be used for
communication between an STA and AP after they have mutually authenticated.
Pairwise Keys
4-way handshake exchange MPDU for distributing pairwise keys. STA and SP confirm the existence of the PMK,
verify the selection of the cipher suite, and derive a fresh PTK for the following data session.
For group key distribution, the AP generates a GTK and distributes it to each STA in a multicast group.
802.11i Protected Data Transfer Phase