+ All Categories
Home > Documents > Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC...

Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC...

Date post: 28-Dec-2015
Category:
Upload: shon-brooks
View: 213 times
Download: 0 times
Share this document with a friend
37
TKuri hara, TKst Slide 1 doc.: IEEE 802.11-03/0784r0 Submission September 2003 DSRC Security Project, P1556 T. M. Kurihara TKstds Management
Transcript
Page 1: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 1

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

DSRC Security Project, P1556

T. M. Kurihara

TKstds Management

Page 2: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 2

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Scope• DSRC Security for lower layers consistent with

ASTM E2213 DSRC and IEEE Standard 802.11

• DSRC Security for application layers that interfaces with lower layers

• DSRC Security Risk Assessment and Counter-measures for ITS

• Consistency with the National ITS Architecture, draft Version 5.0

• Consistency with IEEE 8021.11i and WEP Encryption Algorithm, as a minimum

Page 3: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 3

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Communication• Dual Sponsors in FHWA

– Security and communications– ITS Standards

• IEEE Sponsor - Standards Coordinating Committee 32, ITS

• Consistency with industry, national, and international security requirements

• Liaisons planned with NIST, ISO/IEC JTC 1 SC27, ISO TC204, IEEE 802.11 WG, ISOC/IETF, WEP,….

Page 4: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 4

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

DSRC Security - Important

• Regardless of how good a technical solution we develop, without satisfactory (i.e., excellent) security vehicle OEMs, public safety service providers and others will not support standards, sponsor applications or install equipment

• Without strong support from vehicle OEMs and others, 5.9 GHz DSRC is (probably) going nowhere

• THEREFORE, security is a GIANT issue and requires high-level attention

Page 5: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 5

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Operational Requirements• Control Channel doesn’t use 802.11 MAC

associations• 802.11i and WEP security features may be applied

in service channel operations• Low impact on overhead• Limited decrease in processing speed• Small memory requirements• Support scalability, interoperability across North

America– Interoperable with related standards, 5.9GHz Band

plan, ITS physical and logical architecture, IP interface

Page 6: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 6

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Operational Requirements• Ability to implement on chip set/smart card for

OBUs• Cannot rely on passwords, pass phrases, PINs,

biometrics for OBUs– Driving a vehicle – safety first

• Support vehicle speeds up to 120 mph• Support device to device distances up to 1000m• Maintain applications sessions and authentication

through intermittent contact with multiple RSUs along route of travel– Establishment of “Trust Chains”

Page 7: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 7

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Requirements• Low cost

• Proven technology– security community validation, acceptance

• Significant successful industry implementations

• Availability

• Non-proprietary solutions preferred

Page 8: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 8

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Risks• Wireless Threats

– Individual or group with possession of RSU equipment and ill intent and medium capability

– Individual with possession of OBU with ill intent and medium capability

– Individual with jamming capability and ill intent• Wireless Vulnerabilities

– Denial of Service– Identity theft, masquerading

• Leads to unauthorized access, compromised confidentiality– Eavesdropping

• Compromises confidentiality

• Threat + Vulnerability = Risk– Based on probability determined by capability + intent

Page 9: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 9

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Vehicle Security Risks

• Results drive detailed security requirements– Need for two-factor authentication vs. single

factor– Need for non-repudiation or not– Need for message integrity– Confidentiality – key strength

• Formal risk assessment to be funded– Requirements under definition– Start September 2003

Page 10: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 10

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Preliminary Derived Security Requirements

• Integrity– Control channel messages, OBU messages in upper layers

• Confidentiality – data• Availability• Authentication

– One-way authentication, either direction• Anonymity

– Random number generator for MAC Address– Tied to authentication

• Access control– To channel 184– From control channel to service channels– Access Control Lists (ACLs)

Page 11: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 11

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Room for Improvement

• Stronger Access Control• Mutual (Two-way) Authentication• Flexibility

– To support range of security requirements

• Mobile Security• Strong Confidentiality• Scalability

– Some applications may require more rapid and secure re-authentication in transit

Page 12: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 12

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Related Activities• IEEE 802.15 WG

– Developing Personal Area Network standards for short distance wireless personal area networks (WPAN) of mobile devices - PCs, PDAs, peripherals, cell phones, pagers, and consumer electronics

• http://ieee802.org/15/

• Zigbee Alliance– Non-profit industry alliance wireless standard activity; works

with IEEE 802.15.4– Requirements low-cost, interoperability of very small, very

low-power devices in the 915MHz range; up to 75 meters• www.zigbee.com

• Commercial Alternatives– LEAP, TLS, TTLS, PEAP

Page 13: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 13

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Approach

• High-level guidance provided by WG

• Application requirements generated by DSRC Security sub-group

• Security solution developed and integrated by security experts

• Solution quality and viability check performed by an independent evaluator

• Creating and editing draft standard by IEEE

Page 14: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 14

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Security Standards Process

ARINC

Principal consultants

Independent Evaluators

IEEE WG

5.9 GHz DSRC Security WG

IEEE standards process

step A

review review review

step B step C

results results results

results results results

management and technical oversight5.9GHz DSRC Security Committee

Management and technical oversight

Requirements definition, solution identification

Testing

Page 15: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 15

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

High-Level Guidance• Ultimate oversight remains with the WG

– Provide security task definitions

– Approve security requirements

– Receive regular progress reports throughout solution development, cross-check and integration activities.

– Approve results

– Set direction for standard development and approval of eventual standard

Page 16: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 16

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Application Requirements

• Identify threats to ITS DSRC assets

• Requirements-setting separated into safety and non-safety applications

– Safety applications addresses threats against safety of life or property

– Non-safety applications addresses threats common to e-commerce

– VSCC to assume oversight of safety applications

– Separate sub-group to address non-safety applications

• Requirements merged to create a requirements envelope

Page 17: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 17

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Develop Security Solution

• Expert(s) address both safety and non-safety areas

• Main tasks are to:

– Define threat model(s)

– Describe constraints, e.g., cost, complexity, computational & communications overhead

– Develop & integrate security solution(s)

Page 18: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 18

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Solution Audit

• Assumption – No one has a lock on ‘best security solutions’

• Separate security expert(s) engaged to do independent assessment of proposed solution(s).

• This evaluator responsible for regular reports to WG

Page 19: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 19

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Generate Standard• IEEE WG to oversee security standard

development (i.e., with expert editor)

• Editor conduct sense-check of the proposed solution and embed it into a draft security standard using accepted security tools, nomenclature, etc.

• Editor is responsible to record WG consensus for draft standard content

• Editor is responsible for addressing all comments received

Page 20: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 20

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

DSRC Security

Thomas M. KuriharaChair, IEEE WG P1556, DSRC Security

TKstds Management+1 703 516 9650

[email protected]

Page 21: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 21

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Supplemental Information

• Options– Integrity– One-way Hash– Anonymity– Authentication– Confidentiality

• Standards– Public Key Cryptography– IEEE 802.11i– IEEE 802.1x

Page 22: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 22

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Integrity• OBUs need to validate RSU message

– Not altered during transmission

• RSUs need to authenticate OBU message– Not altered during transmission– i.e., emergency vehicle validation

• Potential Solution: one-way secure hash function– Must be collision-resistant– Must be “claw-free” (i.e., not susceptible to “birthday”

attacks)– Provides processing improvement over digital signature

and other asymmetric cryptographic operations• Up to 3 to 4 orders of magnitude

Page 23: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 23

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

One-Way Secure Hash Options• SHA-1

– 160-bit output (FIPS 180-1)– 20-byte overhead – 80 processing steps– Robust algorithm with greatest life cycle– Permits digital signature– Permits one-way, non-interactive public

keying – Permits usage in electronic commerce– NIST Recommended

Page 24: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 24

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

One-Way Secure Hash Options

• MD5– 128 bit (RFC1321)– 16 bytes overhead– Faster to process

• FIPS pub 198 specifies a Hash Message Authentication Code – HMAC, constructed from a hash function vs. a block cipher algorithm– May be more convenient to implement

block cipher than hash code

Page 25: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 25

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Anonymity Options• Anonymous User Digital Certificates

– Allows authorization without user identity information– No user identity information on certificate– Separate certificate issued for user authentication

• Contains user identity information– Both certificates contain a user’s public key

• Ultra Information Systems Anonymous Key Technology v1.0– AES Validated Implementation

• Anonymity based on biometric identification– Biometric template, i.e., fingerprint or other, passed vs. any

identification data– Difficult to distribute and manage biometric data

Page 26: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 26

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Authentication, Confidentiality, Integrity, Non-repudiation Options

• PKI – Authentication – Digital signature, key pair match– Message integrity – Secure message hash– Non-repudiation – Digital signature (identity verified

by trusted 3rd party)– Interoperability - Established key management

infrastructure – Scalability – Public keys stored in public repository– Flexibility – Choice of Algorithms - Public Key,

symmetric for encryption, digital signature, message hash

Page 27: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 27

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Confidentiality• Global Special Mobile (GSM)

– Weak encryption, proprietary algorithm, slow

• VPNs, VLANs– require excessive switching, does not address

roaming, scaling issues

• Broadcast Encryption – Designed to deny services to unauthorized

receiver– DSRC safety applications need reverse of this

approach – allow services to masses vs. denying to few

Page 28: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 28

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Confidentiality - AES• Draft NIST Special Publication 800-38b (Nov 5, 2002)• 44 implementations tested by NVLAP-Accredited

Cryptographic Module Testing (CMT) Laboratories• Algorithm Validation list can be found at

– http://csrc.nist.gov/cryptval/aes/aesval.html

• Key Length Requirements– Encrypt using 128, 192, 256, bit keys– Decrypt in 128 bit block– http://csrc.nist.gov/encryption/aes/aesfact.html

• Recommendation for Block Cipher Modes of Operation: The RMAC Authentication Code– http://csrc.nist.gov/publications/drafts.html

• Provides data origin authentication and thus, data integrity• Thwarts: exhaustive key search, general forgery and

extension forgery based on collision• Being implemented by Atheros (256 bit)

Page 29: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 29

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Anonymity• MAC Address Generation

– Through Use of Random Number Generator

– Recommend one of, or all Four FIPS-Approved Methods• Deterministic Generators

• FIPS 186 (DSS) Appendices 3.1 and 3.2

• ANSI X9.31 Appendix A.2.4

• ANSI X9.62-1998 Annex A.4

• Recommend Following NIST ITL Bulletin: Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; December 2000

• Provides a package of 16 tests that were developed to test the randomness of binary sequences produced by random or pseudorandom number generators. (Described in NIST SP 800-22)

Page 30: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 30

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

Standard Specifications for Public-Key Cryptography (IEEE Std 1363)

• Developing standard public-key cryptography standards– Digital signature and key establishment schemes based on :

• RSA – PKCS#1,• Digital Signature Algorithm (DSA) - FIPS 186-2

– ANSI X9.31 banking standard for RSA signatures require min 1024 bits for an minimum level of security

• Elliptic Curve Cryptography (ECC) – ECDSA - ANSI X9.62, 2 – Offers lower latency by using shorter key lengths – Variety of key lengths available– ECC used in many wireless applications and devices

• PDAs, Mobile phones, etc– Lattice-Based Public-Key Cryptography

• Encryption (e.g. NTRU) and digital signature (e.g. NSS) schemes– Others

Page 31: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 31

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

IEEE 802.11i Security (1 of 3)• 802.11i – 802.1x authentication + AES-based

protection + enhanced key management• Robust Security Network (RSN)

– Port-based network access control• Restricts network connection to authorized entities via 802.1x• Network port is an association between the access point and a

station• Based on 802.1x

• 802.1x– Employs the Extensible Authentication Protocol (EAP)

• Uses Challenge-Response• No integrity or privacy features provided• No message authentication

– “An Initial Security Analysis of the IEE 802.1x Standard”• http://www.cs.umd.edu/~waa/1x.pdf

Page 32: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 32

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

IEEE 802.11 Security (2 of 3)• Provides four cryptographic algorithms to protect data

traffic– Two based on RC4 - WEP,TKIP– Two are based on AES – WRAP, CCMP

• A means is provided for stations to select the algorithm to be used for a given association

• In an IBSS each STA defines, implements its own security model– Each STA must trust the other STAs security model if

compatible with its own– STA must be prepared for other STAs to initiate communications– STA in an IBSS can negotiate the security algorithms it desires

to use when it accepts an association initiated by another station• In an ESS the AP enforces a uniform security model

– STA initiates all associations– The AP always chooses the security suite being used

Page 33: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 33

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

IEEE 802.11 Security (3 of 3)• The Temporal Key Integrity Protocol (TKIP) is a cipher

suite enhancing the WEP protocol on pre-RSN hardware

• This protocol uses WEP TKIP surrounds WEP with new algorithms

• CCMP shall be mandatory-to-implement in all IEEE 802.11 equipment claiming RSN compliance

• Implementation of TKIP and WRAP optional for RSN compliance

• Pre-RSN devices may be patched to implement TKIP, to interoperate with RSN-compliant devices that also implement TKIP

• Use of any of the privacy algorithms depends on local policies

Page 34: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 34

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

IEEE 802.1x Features• Open- System

– Shared key authentication

– Mandatory Access Control (MAC) access control lists

– One-way authentication • Extensible Authentication Protocol (EAP)

• Based on Challenge-response

• Device to access point

– Encryption optional

• Authentication– Lack of message authentication

– Entity authentication is via an open-system, shared-key

• Access Control Lists– Medium Access Control (MAC) address-based

• Lack of state machine synchronization

Page 35: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 35

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

IEEE 802.1x Features Pros/Cons• Pros

– Provides encryption– Provides authentication

• one-way – client authenticated to access point

• Cons– Susceptible to session hijacking– Susceptible to “man-in-the-middle” attacks– Vulnerable to:

• Session Hi-jacking• Man-in-the-middle attacks• Denial of service attacks

Page 36: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 36

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

IEEE 802.1x Summary (1 of 2)

• Port Access Entity operates the Algorithms and Protocols associated with the authentication mechanisms for a given port of the system

• Supplicant PAE– In the Supplicant role, the PAE is responsible for

responding to requests from an Authenticator for information that will establish its credentials 

Page 37: Doc.: IEEE 802.11-03/0784r0 Submission September 2003 TKurihara, TKstds ManagementSlide 1 DSRC Security Project, P1556 T. M. Kurihara TKstds Management.

TKurihara, TKstds Management

Slide 37

doc.: IEEE 802.11-03/0784r0

Submission

September 2003

IEEE 802.1x Summary (2 of 2)

• Authenticator PAE– Controls the authorized/unauthorized stat of its

controlled port

• EAP Authentication

• STAs mutually authenticate to APs to detect and prevent replay attacks.

• Both the AP and STA block general 802.11 data packets to allow only 802.1X EAP packets.


Recommended