23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

48-10 Industrial Communication Systems<br />

Loss of connection<br />

Roaming-trigger/<br />

search phase<br />

Open <strong>systems</strong><br />

authentication<br />

Association<br />

Robust security<br />

network association<br />

Client<br />

(mobile station)<br />

Old AP New AP<br />

Secure association and data exchange<br />

Probe request Ch 1/probe response Ch 1<br />

t Search<br />

Probe request Ch n/probe response Ch n<br />

802.11 Authentication request/response<br />

t Auth<br />

t Asso<br />

(Re) Association request/response<br />

Secure authentication<br />

Key negotiation (4-Way-handshake)<br />

Secure association and data exchange<br />

Authentication<br />

server (e.g., radius)<br />

t<br />

FIGURE 48.4<br />

Handover procedure in 802.11 WLANs.<br />

open authentication phase, the association phase, and the robust security network association (RSNA)<br />

phase as shown in Figure 48.4. First, the connection loss will be detected and the search phase starts by<br />

means of scanning all channels for available APs. Whenever a suitable new AP is found, the client starts<br />

the authentication frame exchange followed by the association. Finally, RSNA is established and data<br />

can be transmitted again using a secure connection.<br />

In order to minimize the overall handover duration, either the search phase or RSNA can be optimized.<br />

RSNA depends mainly on the AP side, whereas the search phase is determined by the client side. In [PCK07],<br />

a good survey of recent works in the area of fast handover and currently achievable times is provided.<br />

48.7.1 Mechanisms on the AP Side<br />

The mechanisms on the AP side mainly address a reduction of RSNA. In order to reduce time-consuming<br />

authentication against an authentication server, the IEEE 802.11i [IEE04i] standard amendment specifies<br />

a preauthentication mechanism and allows a caching of the corresponding pair-wise master keys<br />

(PMKs). Preauthentication provides an option for the client to perform a full IEEE 802.1X authentication<br />

with other APs in range, while it is still associated to its current AP. The PMK caching feature allows<br />

both AP and the client to store the results of a first full 802.1X authentication. In other words, whenever<br />

the client roams back to an AP it had been previously associated to, only a four-way handshake is necessary<br />

to establish the temporal keys for encryption.<br />

A further improvement is achieved by methods specified in the 802.11r standard amendment [IEE08r]<br />

for a fast BSS transition. Once a station joins the wireless network, a full 802.1X authentication is done<br />

with the result of a generated PMK that is then distributed to all APs within the same mobility domain<br />

(MD). Hence, when a station decides to handover to a new AP, PMK can be assumed to be already present.<br />

However, the important question of a feasible key distribution has been left open by the amendment. After<br />

this the four-way handshake and the resource reservation for QoS are embedded into the mandatory<br />

reassociation procedure. To sum up, three enhancements can be identified in the 802.11r amendment.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!