IEEE 802.11-23 Decisions and Straw Polls

jan 2023 n.w
1 / 8
Embed
Share

Explore the proposed options and decisions related to IEEE 802.11-23 standards along with the Straw Polls and Motions put forward by Graham Smith from SR Technologies. The presentation discusses topics such as adopting non-encrypted ID schemes, MAC address selection processes for STAs, and the need for opt-in mechanisms. Dive into the details of SMA Same MAC Address, IRM MAC scheme, and more for a comprehensive understanding of the way ahead in IEEE 802.11-23 developments.

  • IEEE 802.11-23
  • Standards
  • Decisions
  • Options
  • Straw Polls

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Jan 2023 doc.: IEEE 802.11-23/0119r5 TG bh Way Ahead Decisions Date: 2023-01 Authors: Name Company Address Phone email Graham Smith SRT Group Sunrise , FL gsmith@srtrl.com Submission Slide 1 Graham Smith, SR Technologies

  2. Jan 2023 doc.: IEEE 802.11-23/0119r5 Based on presentation 22/2150r2 options and decisions were provided This presentation simply lists those options and proposes Straw Polls and Motions Submission Slide 2 Graham Smith, SR Technologies

  3. Jan 2023 doc.: IEEE 802.11-23/0119r5 Straw Polls/Motions 1. SMA Same MAC Address Similar to 11aq-like STA picks MAC to be used, as per present rules If non-AP STA wants to be identified, it uses same MAC address when communicating with the same ESS STA maintains list of ESS/SSIDs and MAC Addresses. AP maintains list of STA addresses May need a (standardized) opt-in mechanism (TBD)? (set a Capability bit or MIB variable?) Could opt in only for association and/or also include pre-association Indication bit? Or is it implementation detail? ADs Simple, easy to implement (similar is already deployed) Meets every Use Case No computations Compatible with existing schemes using MAC addresses as ID DIS As same address every time, trivial to copy and masquerade Easy to track (assuming ESS is widely used). Slide 3 Submission Graham Smith, SR Technologies

  4. Jan 2023 doc.: IEEE 802.11-23/0119r5 Straw Polls/Motions 2. IRM MAC scheme STA picks MAC to be used next time, as per present rules (local bit). STA tells AP the MAC address it will use for the next association STA maintains list of ESS/SSIDs and latest MAC Addresses. AP maintains list of STA addresses Needs an opt-in mechanism (Capability bit or MIB variable?)) ADs Simple, easy to implement. Very similar to the Same MAC for STA Similar level of privacy as RCM (random MAC address for listener) Network can track STA Provides good protection against copying Meets every Use Case No computations DIS STA is constrained to MAC it provided last time. Submission Slide 4 Graham Smith, SR Technologies

  5. Jan 2023 doc.: IEEE 802.11-23/0119r5 Straw Polls/Motions 3. Adopt non-encrypted ID in IE scheme STA adds ID in an IE that was provided to the AP at previous association new ID every association STA maintains list of ESS/SSIDs and IDs. AP maintains list. Needs an opt-in mechanism ADs Simple, easy to implement Provides good protection against copying Meets every Use Case No computations DIS Requires new IE Needs to specify some uniqueness to ID (6 octets?) Submission Slide 5 Graham Smith, SR Technologies

  6. Jan 2023 doc.: IEEE 802.11-23/0119r5 Straw Polls/Motions 3. Adopt non-encrypted ID in IE scheme STA adds ID in an IE that was provided to the AP at previous association new ID every association STA maintains list of ESS/SSIDs and IDs. AP maintains list. Needs an opt-in mechanism ADs Simple, easy to implement Provides good protection against copying Meets every Use Case No computations DIS Requires new IE Needs to specify some uniqueness to ID (6 octets?) Submission Slide 6 Graham Smith, SR Technologies

  7. Jan 2023 doc.: IEEE 802.11-23/0119r5 Straw Polls/Motions 4. Adopt a more complex scheme, ID Encoding, RRCM, IRMA Random MAC with encrypted identifier in an IE Keys exchanged or locally generated Range of computational complexity STA maintains list of ESS/SSIDs and latest ID/keys Needs an opt-in mechanism ADs Provides highest level protection/privacy Meet every Use Case DIS Requires computations Submission Slide 7 Graham Smith, SR Technologies

  8. Jan 2023 doc.: IEEE 802.11-23/0119r5 Straw Polls/Motion TGbh should adopt the following scheme: 1. SMA (slide 3) 2. IRM (slide 4) 3. Non-encrypted ID in IE (slide 5) 4. More complex scheme (slide 6) 9/13/3 6/16/4 4/19/2 9/13/4 Submission Slide 8 Graham Smith, SR Technologies

Related


More Related Content