Protecting MAC Header for IEEE 802.11-23/1997r1 - Insights & Recommendations

doc ieee 802 11 23 1997r1 n.w
1 / 16
Embed
Share

Explore the importance of MAC header protection for IEEE 802.11-23/1997r1 in this insightful presentation. Learn about the security concerns, attack models, and proposed solutions. Discover why focusing on basic forgery attacks and implementing GMAC-256 GCMP-256 is crucial for enhanced network security.

  • IEEE standards
  • MAC header protection
  • network security
  • forgery attack
  • GMAC-256

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. doc.: IEEE 802.11-23/1997r1 MAC Header Protection Date: 2023-11-09 Authors: Name Affiliations Address Phone Email Po-Kai Huang Daniel F Bravo Ido Ouzieli Intel Johannes Berg Ilan Peer Danny Alexander Submission Slide 1 Po-Kai Huang (Intel)

  2. doc.: IEEE 802.11-23/1997r1 Abstract Protection of MAC header has been discussed [1] We provide our thoughts in this presentation Submission Slide 2 Po-Kai Huang (Intel)

  3. doc.: IEEE 802.11-23/1997r1 Need for MAC Header Protection Several fields in the MAC header today are masked out and not protected by the frame body protection Due to possibility of value change during retransmission and the need to reuse a PN However, those masked out fields do introduce security concern PM bit as discussed in [2] SN field due to BA protocol attack to complete the protection of BA protocol attack HT control due to various information that maybe piggybacked Hence, it is indeed useful to protect MAC header Submission Slide 3 Po-Kai Huang (Intel)

  4. doc.: IEEE 802.11-23/1997r1 Protect MAC header of which frame The problem we have in hand (ex, PM, SN, HT Control) are in the MAC header of data and management. Further, those problems (PM, BA protocol, HT Control) are specific to individually addressed data and management frame. Introduce MAC header protection for group addressed data and management frame likely have backward compatibility issues or blow out the group addressed transmission over the air It then makes sense for 11bn to focus the design of MAC Header protection on individually addressed data and management frame Slide 4 Submission Po-Kai Huang (Intel)

  5. doc.: IEEE 802.11-23/1997r1 Attack model The basic attack model is forgery attack, where an attacker can achieve the attack by simply forging one frame rather than other more involved attack methods Preventing this basic attack model only needs integrity check For other attack models, privacy attack may require encryption and introduce higher implementation complexity jam/record/replay attack is more involved and also requires more complicated mechanism to resolve Suggest to focus on basic forgery attack model and use GMAC-256 GCMP-256 is supported by every 11be device The best we have and no need for negotiation or rules Submission Slide 5 Po-Kai Huang (Intel)

  6. doc.: IEEE 802.11-23/1997r1 Consideration with existing Framebody protection To accommodate the possibility of MAC header change during retransmission, MAC header protection and Frame body protection needs to be MIC separately Imply separate key different from frame body protection Imply separate PN field different from frame body protection Imply separate MIC computation different from frame body protection Propose to have additional Key ID, PN and MIC fields to protect MAC header of individually addressed data frame and management frame Submission Slide 6 Po-Kai Huang (Intel)

  7. doc.: IEEE 802.11-23/1997r1 Consideration of key Since the scope is on individually addressed frame, it is natural to have the key as part of the PTKSA between MLDs However, given that the MIC check is likely lower layer, we may want to have per link PN and replay counter to avoid coordination of PN across links Further to avoid nonce reuse, we will need the nonce construction to be based on STA MAC address identified in A2 Submission Slide 7 Po-Kai Huang (Intel)

  8. doc.: IEEE 802.11-23/1997r1 Consideration on Acknowledgement Response Today acknowledgement is sent to individually addressed data/management frame after FCS check With MAC header protection, better to do MIC check before sending acknowledgement If Acknowledgement is sent without MIC check of MAC header, then a valid acknowledgement is sent even the frame is eventually dropped due to MIC check failure More mechanisms maybe required to tolerated MIC check after sending acknowledgement Suggest to at least allow receiver to do MIC check before sending acknowledgement Submission Slide 8 Po-Kai Huang (Intel)

  9. doc.: IEEE 802.11-23/1997r1 Fields to be Protected Fields like PM, SN, HT Control should naturally be protected Fields like Duration need separate discussion Recall Duration from any 3rd party CTS is not protected, and is difficult to be protect if feasible at all A natural argument is to basically protect everything of MAC header fields instead of regretting later If the argument is to simply protect everything, then suggest to protect also security header of frame body, so we protect everything in the header Submission Slide 9 Po-Kai Huang (Intel)

  10. doc.: IEEE 802.11-23/1997r1 Conclusion We think MAC header protection is an important feature for 11bn Focus on individually addressed data and management frame Use GMAC-256 to prevent basic forgery attack Have separate key, PN field, MIC calculation different from frame body protection Have pairwise key between MLD but per link PN and replay counter with nonce construction based on STA MAC address Allow sending response after checking FCS and MIC of MAC header protection Simply protect everything including security header of framebody Submission Slide 10 Po-Kai Huang (Intel)

  11. doc.: IEEE 802.11-23/1997r1 SP #1 Do you support to define MAC header protection for individually addressed data and management in 11bn? Submission Slide 11 Po-Kai Huang (Intel)

  12. doc.: IEEE 802.11-23/1997r1 SP #2 Do you support to use GMAC-256 to protect MAC header of individually addressed data frame and management frame? Submission Slide 12 Po-Kai Huang (Intel)

  13. doc.: IEEE 802.11-23/1997r1 SP #3 Do you support to have additional Key ID, PN and MIC fields to protect MAC header of individually addressed data frame and management frame? Submission Slide 13 Po-Kai Huang (Intel)

  14. doc.: IEEE 802.11-23/1997r1 SP #4 Do you support to have a pairwise key between an AP MLD and a non-AP MLD with per link PN and replay counter to protect MAC header of individually addressed data and management frame? Submission Slide 14 Po-Kai Huang (Intel)

  15. doc.: IEEE 802.11-23/1997r1 SP #5 Do you support that nonce construction for the MAC header protection will use STA MAC address identified by A2? Submission Slide 15 Po-Kai Huang (Intel)

  16. doc.: IEEE 802.11-23/1997r1 Reference [1] 11-23-1888 MAC Header Protection follow up [2] Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues Submission Slide 16 Po-Kai Huang (Intel)

Related


More Related Content