IEEE 802.11i
Also known as WPA2 is an amendment to the 802.11 standard specifying security mechanisms for wireless networks and supersedes the previous security specification, Wired Equivalent Privacy (WEP), which was shown to have severe security weaknesses.
Wi-Fi Protected Access (WPA) had previously been introduced by the Wi-Fi Alliance as an intermediate solution to WEP insecurities. WPA implemented a subset of 802.11i. The Wi-Fi Alliance refers to their approved, interoperable implementation of the full 802.11i as WPA2. 802.11i makes use of the Advanced Encryption Standard (AES) block cipher; WEP and WPA use the RC4 stream cipher.
The 802.11i architecture contains the following components: 802.1X for authentication (entailing the use of EAP and an authentication server), RSN for keeping track of associations, and AES-based CCMP to provide confidentiality, integrity and origin authentication. Another important element of the authentication process is the four-way handshake.
IEEE 802.11r
The original IEEE 802.11 standards were fashioned with single access points (APs), but that is not the case in offices, where multiple APs are required. In this new standard, devices are designed to jump from one AP to another very swiftly compared to the earlier standard. 802.11r minimizes handoff delays linked with 802.1X authentication by reducing the time taken to re-establish connectivity after a client moves between 802.11 APs while roaming.
The 802.11r have included typical QoS mechanisms, such as packet prioritization and call admission control (CAC), to enhance the operation of real-time voice applications. Using three MAC-layer enhancements, the standard was able to lower the handoff time, but at the same time maintains high levels of security.
The first of the three enhancements was the elimination of the 802.1X key exchange because it was not required during handoffs between APs within the same “mobility domain.” A mobility domain is a set of APs built to execute fast transitions between them.
The second improvement was the addition of a four-way handshake. This was essential for session key establishment and was also integrated in the previously active 802.11 authentication/association messages. This reduced the delay after re-association pending the completion of the security negotiation and allowed data transmissions to resume faster. The final enhancement packages all call resource requests into new authentication messages exchanged before the re-association.
Until recently, vendors have implemented lower security alternatives such as Wired Equivalent Privacy (WEP) encryption on their Wi-Fi VoIP networks. They have also placed VoIP traffic on different Virtual LANs (VLANs) to keep the rest of the network protected.
IEEE 802.11k
Define radio resource measurement (RRM) parameters for network management and performance enhancement provide mechanisms to higher layers for radio and network measurements
Make measurements from layer 1 and 2 of OSI protocol stack
· Statical Measurement
o Characterize the radio environment in long-term statistical sense
· Identity Measurements
o Identify stations that affect each other’s performance
Currently APs and clients cannot share channel information
With 802.11k...
ü Noise histogram
ü Channel load
ü Time histogram
AP will know is the channel quality good enough
Clients or APs that other clients or access points can’t hear
With 802.11k...
Clients track hidden nodes and access points query clients with those lists
APs knows now about clients who are on the edge of their cells
Currently are limited to statistics APs maintain
With 802.11k
802.11 MAC statistics
Counts of MSDUs/MPDUs received/transmitted
Counts of Channel utilization in rx & tx direction
Data rate & modulation of last rx and tx
RSSI, RCPI, and signal quality
How it works
1. Client is moving away AP1, so AP1 informs the client prepare to move to another access point
2. The Client asks the AP1 to provide it with a list of preferred access points nearby
3. AP1 responds with a site report
4. Client moves to the channel of best access point listed in the site report and connects it
IEEE 802.11w
The IEEE 802.11w wireless encryption standard builds on the 802.11i framework to protect against subtle attacks on wireless LAN (WLAN) management frames. It will increase the confidence of network managers that applications such as wireless VoIP can be depended upon to provide adequate call quality and availability while ensuring wireless security.
The need for strong encryption and authentication for wireless LAN data was recognized as early as 2000.
The IEEE Standards Board has ratified IEEE 802.11w-2009, Standard for Information Technology-Telecommunications and Information Exchange between systems-Local and Metropolitan networks-Specific requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Protected Management Frames Amendment.
Defining mechanisms that provide enhanced protection for WLANs, this new amendment to the IEEE 802.11 base standard will help the data communications industry address the escalating security demands placed on WLANs by providing added protection to management frames. IEEE 802.11w defines enhancements such as data integrity, data origin authenticity, replay protection, and data confidentiality.
The IEEE 802.11 standard defines protocols that can be used by interoperable WLAN equipment to provide a variety of capabilities including a wide range of data rates, quality of service, reliability, range optimization, device link options, network management and security.
Defining mechanisms that provide enhanced protection for WLANs, this new amendment to the IEEE 802.11 base standard will help the data communications industry address the escalating security demands placed on WLANs by providing added protection to management frames. IEEE 802.11w defines enhancements such as data integrity, data origin authenticity, replay protection, and data confidentiality.
The IEEE 802.11 standard defines protocols that can be used by interoperable WLAN equipment to provide a variety of capabilities including a wide range of data rates, quality of service, reliability, range optimization, device link options, network management and security.