6
May 2004 Tyan-Shu Jou, et al., Janusys Networks Slide 1 doc.: IEEE 802.11-04/599r0 Submission On ESS Mesh Device Discovery Tyan-Shu Jou, Ted Kuo, and Ming Sheu Janusys Networks, Inc. May 11, 2004

On ESS Mesh Device Discovery

  • Upload
    sine

  • View
    39

  • Download
    0

Embed Size (px)

DESCRIPTION

On ESS Mesh Device Discovery. Tyan-Shu Jou, Ted Kuo, and Ming Sheu Janusys Networks, Inc. May 11, 2004. General Requirements. Automatic establishment of WDS “connections” between mesh nodes Mutual authentication between mesh nodes - PowerPoint PPT Presentation

Citation preview

Page 1: On ESS Mesh Device Discovery

May 2004

Tyan-Shu Jou, et al., Janusys NetworksSlide 1

doc.: IEEE 802.11-04/599r0

Submission

On ESS Mesh Device Discovery

Tyan-Shu Jou, Ted Kuo, and Ming Sheu

Janusys Networks, Inc.

May 11, 2004

Page 2: On ESS Mesh Device Discovery

May 2004

Tyan-Shu Jou, et al., Janusys NetworksSlide 2

doc.: IEEE 802.11-04/599r0

Submission

General Requirements

• Automatic establishment of WDS “connections” between mesh nodes

• Mutual authentication between mesh nodes

• Negotiation of encryption protection between mesh nodes based on policies

Page 3: On ESS Mesh Device Discovery

May 2004

Tyan-Shu Jou, et al., Janusys NetworksSlide 3

doc.: IEEE 802.11-04/599r0

Submission

Discovery Models: Advertising vs. Probing

• Advertising:– Advertising ESS Mesh capability in beacons– A mesh-capable device scans all possible

channels for beacons and joins mesh network

• Probing:– A mesh-capable device sends out “Hello”

messages in multiple channels– Others that are willing to accept new mesh

node respond with “Hello-Reply”

Page 4: On ESS Mesh Device Discovery

May 2004

Tyan-Shu Jou, et al., Janusys NetworksSlide 4

doc.: IEEE 802.11-04/599r0

Submission

Authentication Methods

• Mutual authentication should be performed between neighboring nodes

• Possible authentication methods:– Open– Pre-shared Key– Certificates

Page 5: On ESS Mesh Device Discovery

May 2004

Tyan-Shu Jou, et al., Janusys NetworksSlide 5

doc.: IEEE 802.11-04/599r0

Submission

Security Negotiation

• Encryption protection should be negotiated after mutual authentication is done

• A unique pair-wise key between two mesh nodes should be derived for transmitting uni-cast frames in between these two nodes

• Group key is needed if broadcast WDS-frames are to be used

• Encryption on data traffic between mesh nodes should be independent from encryption between mesh nodes and their client stations

Page 6: On ESS Mesh Device Discovery

May 2004

Tyan-Shu Jou, et al., Janusys NetworksSlide 6

doc.: IEEE 802.11-04/599r0

Submission

Other Issues

• Dynamic discovery– A node may moves in-and-out of range– Continuous discovery is needed to discover neighbors

now in range– Re-authentication is necessary

• Re-key– Pair-wise key between two mesh nodes should be

replaced after a certain lifetime

• Group Key– Generation and renew