Abstract:
A method and apparatus for establishing security associations between nodes of an ad hoc wireless network includes two authentication steps: an initial first contact step (authentication, authorization, and accounting (AAA)-based authentication), and a "light-weight" step that reuses key material generated during first contact. A mesh authenticator within the network provides two roles. The first role is to implement an 802.1X port access entity (PAE), derive transient keys used for encryption with a supplicant mesh point via a four-way handshake and take care of back end communications with a key distributor. The second role is as a key distributor that implements a AAA-client and derives keys used to authenticate a mesh point during first contact or fast security association. The key distributor and the on-line authentication server can communicate to one another without these messages being transported over mesh links.
Abstract:
Un método y aparato para establecer asociaciones de seguridad entre nodos de una red inalámbrica ad hoc incluye dos pasos de autenticación: un primer paso de contacto inicial (autenticación, autorización y autenticación basada en estadística (AJA - authentication, authorization, and accounting-based authentication)), y un paso "de peso ligero" que reutilizar el material de claves generado durante el primer contacto. Un autenticador de malla dentro de la red proporciona dos roles. El primer rol es implementar una entidad de acceso de puerto 802.lX (PAE - port access entity), derivar las claves transitorias utilizadas para la encriptación con un punto de malla solicitante mediante una sincronización inicial de cuatro vías y se encarga de las comunicaciones posteriores con un distribuidor de claves. El segundo rol es un distribuidor de claves que implementa un cliente A?IA y deriva las claves utilizadas para autenticar un punto de mella durante el primer contacto o asociación de seguridad rápida. El distribuidor de claves y el servidor de autenticacián en línea pueden comunicarse uno con otro sin que estos mensajes sean transportados por los enlaces de malla.
Abstract:
The disclosure relates to techniques and technologies for establishing a secure link between a mesh authenticator and a mesh key distributor for tran sporting security association messages. The secure link can allow the mesh k ey distributor to communicate results of an authentication process to the me sh authenticator.
Abstract:
A method and system for secure processing of authentication key material in an ad hoc wireless network enables secure distribution of the authenticat ion key material between a mesh authenticator (110) and a mesh key distribut or (115), which may be separated by multiple wireless links. The method incl udes deriving a pairwise transient key for key distribution (PTK-KD) using a mesh key holder security information element (MKHSIE). A mesh authenticator pairwise master key (PMK-MA) is then requested using a first mesh encrypted key information element (MEKIE) that includes data origin information. Usin g the pairwise transient key for key distribution (PTK-KD), a second mesh en crypted key information element (MEKIE) is then decrypted to obtain the mesh authenticator pairwise master key (PMK-MA).
Abstract:
The disclosure relates to techniques and technologies for establishing a secure link between a mesh authenticator and a mesh key distributor for transporting security association messages. The secure link can allow the mesh key distributor to communicate results of an authentication process to the mesh authenticator.
Abstract:
A method and apparatus for establishing security associations between nodes of an ad hoc wireless network includes two authentication steps: an initial first contact step (authentication, authorization, and accounting (AAA)-based authentication), and a "light-weight" step that reuses key material generated during first contact. A mesh authenticator within the network provides two roles. The first role is to implement an 802.1X port access entity (PAE), derive transient keys used for encryption with a supplicant mesh point via a four-way handshake and take care of back end communications with a key distributor. The second role is as a key distributor that implements a AAA-client and derives keys used to authenticate a mesh point during first contact or fast security association. The key distributor and the on-line authentication server can communicate to one another without these messages being transported over mesh links.
Abstract:
A method of communication between a transmitter node and a receiver node in a multi-hop communication network (100), comprising: formatting information into a data structure to generate a mesh action frame (400), wherein the mesh action frame (400) comprises a header (420) comprising a source address (SA) that identifies such a node, a destination address (DA) that identifies a recipient node, a transmitter address (TA) that identifies a sender node, and a receiver address (RA) that identifies a receiver node; and a body field (430) comprising a mesh action data unit (434); and sending the mesh action action frame from the transmitter node.
Abstract:
A wireless local area network system (100) supporting mobile radio telephony reduces the time to complete an authenticated handover from one access point (104) to another (108) by a mobile station (102) by performing some of the steps normally performed upon leaving one access point while still associated with that access point. More particularly, the mobile station causes a cryptographic key (204) to be preestablished (212) for use when handing over to a new access point. The cryptographic key is derived at the mobile station, and is also derived in the WLAN infrastructure and stored until the mobile station initiates a handover.
Abstract:
The disclosure relates to techniques and technologies for efficiently transporting management information between mesh nodes across multiple hops or "mesh links" in a multi-hop mesh network. These techniques and technologies are general purpose and provide an extensible mechanism for transporting management traffic across a mesh network. These techniques and technologies can be applied in a number of applications relating, for example, to security, routing, radio measurements, mesh node management, etc.