欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    IEEE 802 21A-2012 en Local and metropolitan area networks-Part 21 Media Independent Handover Services Amendment 1 Security Extensions to Media Independent Hando.pdf

    • 资源ID:1248912       资源大小:632.63KB        全文页数:92页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    IEEE 802 21A-2012 en Local and metropolitan area networks-Part 21 Media Independent Handover Services Amendment 1 Security Extensions to Media Independent Hando.pdf

    1、 Part 21: Media Independent Handover ServicesAmendment 1: Security Extensions to Media Independent Handover Services and Protocol Sponsored by the LAN/MAN Standards Committee IEEE 3 Park Avenue New York, NY 10016-5997 USA 3 May 2012 IEEE Computer Society IEEE Std 802.21a-2012(Amendment to IEEE Std 8

    2、02.21-2008) IEEE Standard for Local and metropolitan area networks IEEE Standard for Local and metropolitan area networks Part 21: Media Independent Handover Services Amendment 1: Security Extensions to Media Independent Handover Services and ProtocolSponsorLAN/MAN Standards Committeeof theIEEE Comp

    3、uter SocietyApproved 29 March 2012IEEE-SA Standards BoardIEEE Std 802.21a-2012(Amendment toIEEE Std 802.21-2008)ii Copyright 2012 IEEE. All rights reserved.Abstract: Extensions to IEEE Std 802.21-2008 are provided for security mechanisms to protectmedia independent handover services and mechanisms t

    4、o use MIH to assist proactiveauthentication to reduce the latency due to media access authentication and key establishment withthe target network. Keywords: IEEE 802.21, IEEE 802.21a, proactive authentication, service access authentication,security protection The Institute of Electrical and Electron

    5、ics Engineers, Inc. 3 Park Avenue, New York, NY 10016-5997, USA Copyright 2012 by the Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Published 3 May 2012. Printed in the United States of America. IEEE and 802 are registered trademarks in the U.S. Patent +1 978 750 8400.

    6、 Permission to photocopy portions of any individual standard for educational classroom use can also be obtained through the Copyright Clearance Center.iv Copyright 2012 IEEE. All rights reserved.Notice to usersLaws and regulationsUsers of IEEE Standards documents should consult all applicable laws a

    7、nd regulations. Compliance with the provisions of any IEEE Standards document does not imply compliance to any applicable regulatory requirements. Implementers of the standard are responsible for observing or referring to the applicable regulatory requirements. IEEE does not, by the publication of i

    8、ts standards, intend to urge action that is not in compliance with applicable laws, and these documents may not be construed as doing so.CopyrightsThis document is copyrighted by the IEEE. It is made available for a wide variety of both public and private uses. These include both use, by reference,

    9、in laws and regulations, and use in private self-regulation, standardization, and the promotion of engineering practices and methods. By making this document available for use and adoption by public authorities and private users, the IEEE does not waive any rights in copyright to this document.Updat

    10、ing of IEEE documentsUsers of IEEE Standards documents should be aware that these documents may be superseded at any time by the issuance of new editions or may be amended from time to time through the issuance of amendments, corrigenda, or errata. An official IEEE document at any point in time cons

    11、ists of the current edition of the document together with any amendments, corrigenda, or errata then in effect. In order to determine whether a given document is the current edition and whether it has been amended through the issuance of amendments, corrigenda, or errata, visit the IEEE-SA Website o

    12、r contact the IEEE at the address listed previously. For more information about the IEEE Standards Association or the IEEE standards development process, visit the IEEE-SA Website.ErrataErrata, if any, for this and all other standards can be accessed at the following URL: http:/standards.ieee.org/fi

    13、ndstds/errata/index.html. Users are encouraged to check this URL for errata periodically.Copyright 2012 IEEE. All rights reserved. vPatentsAttention is called to the possibility that implementation of this standard may require use of subject matter covered by patent rights. By publication of this st

    14、andard, no position is taken by the IEEE with respect to the existence or validity of any patent rights in connection therewith. If a patent holder or patent applicant has filed a statement of assurance via an Accepted Letter of Assurance, then the statement is listed on the IEEE-SA Website . Letter

    15、s of Assurance may indicate whether the Submitter is willing or unwilling to grant licenses under patent rights without compensation or under reasonable rates, with reasonable terms and conditions that are demonstrably free of any unfair discrimination to applicants desiring to obtain such licenses.

    16、Essential Patent Claims may exist for which a Letter of Assurance has not been received. The IEEE is not responsible for identifying Essential Patent Claims for which a license may be required, for conducting inquiries into the legal validity or scope of Patents Claims, or determining whether any li

    17、censing terms or conditions provided in connection with submission of a Letter of Assurance, if any, or in any licensing agreements are reasonable or non-discriminatory. Users of this standard are expressly advised that determination of the validity of any patent rights, and the risk of infringement

    18、 of such rights, is entirely their own responsibility. Further information may be obtained from the IEEE Standards Association.vi Copyright 2012 IEEE. All rights reserved.ParticipantsAt the time this amendment was submitted to the IEEE-SA for approval, the IEEE 802.21 Working Grouphad the following

    19、officers:Subir Das, ChairJuan Carlos Zuniga, Vice-chairDavid Cypher, Technical EditorH. Anthony Chan, SecretaryAt the time this amendment was submitted to sponsor ballot, Security in Media Independent Handover task group had the following officers:Yoshihiro Ohba, ChairLidong Chen, Technical EditorWh

    20、en the IEEE 802.21 Working Group approved this amendment, the Working Group had the followingmembership: Major contributions were recieved from the following individuals:Yoon Young AnClint ChaplinLidong ChenH. Anthony ChanSubir DasAntonio De la Oliva Delgado Peretz FederJunghoon JeeHongseok JeonLee

    21、JinFarrokh KhatibiDapeng LiuMichael LynchRoger B. MarksPaul NikolichChristian NiephausYoshihiro OhbaChangmin ParkHyundo ParkCharlie PerkinsAjay RajkumarKaren RandallStephen ShellhammerAlbert VidalJuan Carlos ZunigaTeodor BuburuzanJohannes LessmannCatherine LivetMichelle PerrasCopyright 2012 IEEE. Al

    22、l rights reserved. viiThe following members of the individual balloting committee voted on this standard. Balloters may have voted for approval, disapproval, or abstention.When the IEEE-SA Standards Board approved this standard on 29 March 2012, it had the following membership:Richard H. Hulett, Cha

    23、irJohn Kulick, Vice ChairRobert M. Grow, Past ChairJudith Gorman, Secretary*Member EmeritusAlso included are the following nonvoting IEEE-SA Standards Board liaisons:Richard DeBlasio, DOE RepresentativeMichael Janezic, NIST RepresentativeMichelle TurnerIEEE Standards Senior Program Manager, Document

    24、 DevelopmentLisa PerryIEEE Standards Program Manager, Technical Program DevelopmentGeorge BabutNancy BravinWilliam ByrdRadhakrishna CanchiAnthony ChanClint ChaplinKeith ChowCharles CookSubir DasAntonio De la Oliva DelgadoThomas DineenSourav DuttaRichard EdgarPieter-Paul GiesbertsReinhard GlogerRon G

    25、reenthalerRandall GrovesMichael GundlachDavid HunterIchirou IdaNoriyuki IkeuchiAtsushi ItoJunghoon JeeShinkyo KakuStuart KerryFarrokh KhatibiBrian KiernanYongbum KimBruce KraemerJoseph KwakPaul LambertJan-Ray LiaoGreg LuriMichael LynchElvis MaculubaWayne MangesRoger B. MarksGary MichelRonald MuriasM

    26、ichael S. NewmanYoshihiro OhbaSatoshi OyamaVenkatesha PrasadKaren RandallMaximilian RiegelRobert RobinsonBenjamin RolfeRichard RoyRandall SafierPeter SaundersonBartien SayogoJohn ShortGil ShultzKapil SoodThomas StaraiRene StruikWalter StrupplerJun Ichi TakadaSteven TildenMark-Rene UchidaDmitri Varsa

    27、nofievPrabodh VarshneyJohn VergisLei WangStanley WangHung-Yu WeiOren YuenJuan Carlos ZunigaSatish AggarwalMasayuki Ariyoshi Peter BalmaWilliam Bartley Ted Burse Clint Chaplin Wael Diab Jean-Philippe Faure Alexander Gelman Paul Houz Jim HughesYoung Kyun KimJoseph L. Koepfinger* David J. Law Thomas Le

    28、e Hung Ling Oleg Logvinov Ted OlsenGary Robinson Jon Walter Rosdahl Mike Seavey Yatin TrivediPhil Winston Yu Yuanviii Copyright 2012 IEEE. All rights reserved.IntroductionThis amendment specifies the extensions to IEEE Std 802.21-2008 for security mechanisms to protect media independent handover ser

    29、vices and mechanisms to use Media Independent Handover (MIH) to assist proactive authentications to reduce the latency due to media access authentication and key establishment with the target network. This introduction is not part of IEEE Std 802.21-2012, IEEE Standard for Local and metropolitan are

    30、a networksPart 21: Media Independent Handover ServiceAmendment 1: Security Extensions to Media Independent Handover Services and Protocol.Copyright 2012 IEEE. All rights reserved. ixContents1. Overview 21.3 General. 22. Normative references. 23. Definitions . 34. Abbreviations and acronyms . 55. Gen

    31、eral architecture. 55.1 Introduction 55.1.9 Proactive authentication and key establishment 56. MIH service . 66.2 Service management 66.2.1 General. 66.2.2 Service management primitives. 66.5 Media independent event service. 66.5.4 Information elements .67. Service access point (SAP) and primitives

    32、77.4 MIH_SAP primitives . 77.4.1 MIH_Capability_Discover. 77.4.1.1 MIH_Capability_Discover.request 77.4.1.1.2Semantics of service primitives . 77.4.1.2 MIH_Capability_Discover.indication 77.4.1.2.2Semantics of service primitive. 77.4.1.3 MIH_Capability_Discover.response 87.4.1.3.2Semantics of servic

    33、e primitive. 87.4.1.4 MIH_Capability_Discover.confirm. 87.4.1.4.2Semantics of service primitive. 87.4.17 MIH_Net_HO_Candidate_Query 97.4.17.2 MIH_Net_HO_Candidate_Query.request . 97.4.17.2.2Semantics of service primitive. 97.4.17.3 MIH_Net_HO_Candidate_Query.indication. 97.4.17.3.2Semantics of servi

    34、ce primitive. 97.4.17.4 MIH_Net_HO_Candidate_Query.response. 107.4.17.4.1Function . 107.4.17.4.2Semantics of service primitive. 107.4.17.5 MIH_Net_HO_Candidate_Query.confirm 107.4.17.5.2Semantics of service primitive. 107.4.18 MIH_MN_HO_Candidate_Query . 117.4.18.1 MIH_MN_HO_Candidate_Query.request.

    35、 117.4.18.1.2Semantics of service primitive. 117.4.18.2 MIH_MN_HO_Candidate_Query.indication 117.4.18.2.2Semantics of service primitive. 117.4.18.3 MIH_MN_HO_Candidate_Query.response 12x Copyright 2012 IEEE. All rights reserved.7.4.18.3.2Semantics of service primitive. 127.4.18.4 MIH_MN_HO_Candidate

    36、_Query.confirm 127.4.18.4.2Semantics of service primitive. 127.4.27 MIH_Push_Key . 137.4.27.1 MIH_Push_key.request 137.4.27.1.1Function . 137.4.27.1.2Semantics of service primitive. 137.4.27.1.3When generated . 137.4.27.1.4Effect on receipt. 137.4.27.2 MIH_Push_key.indication . 137.4.27.2.1Function

    37、. 137.4.27.2.2Semantics of service primitive. 147.4.27.2.3When generated . 147.4.27.2.4Effect on receipt. 147.4.27.3 MIH_Push_key.response . 147.4.27.3.1Function . 147.4.27.3.2Semantics of service primitive. 147.4.27.3.3When generated . 157.4.27.3.4Effect on receipt. 157.4.27.4 MIH_Push_Key.confirm

    38、157.4.27.4.1Function . 157.4.27.4.2Semantics of service primitive. 157.4.27.4.3When generated . 157.4.27.4.4Effect on receipt. 157.4.28 MIH_LL_Auth.157.4.28.1 MIH_LL_Auth.request 157.4.28.1.1Function . 157.4.28.1.2Semantics of service primitive. 167.4.28.1.3When generated . 167.4.28.1.4Effect on rec

    39、eipt. 167.4.28.2 MIH_LL_Auth.indication 167.4.28.2.1Function . 167.4.28.2.2Semantics of service primitive. 167.4.28.2.3When generated . 177.4.28.2.4Effect on receipt. 177.4.28.3 MIH_LL_Auth.response 177.4.28.3.1Function . 177.4.28.3.2Semantics of service primitive. 177.4.28.3.3When generated . 177.4

    40、.28.3.4Effect on receipt. 177.4.28.4 MIH_LL_Auth.confirm . 177.4.28.4.1Function . 177.4.28.4.2Semantics of service primitive. 187.4.28.4.3When generated . 187.4.28.4.4Effect on receipt. 188. Media independent handover protocol 198.4 MIH protocol frame format . 198.4.1 General frame format. 198.4.1a

    41、Protected MIH protocol frame format . 208.4.1a.1 MIH PDU protected by (D)TLS 208.4.1a.2 MIH PDU protected through EAP-generated MIH SA . 218.4.1a.3 Protected MIH PDU upon transport address change . 21Copyright 2012 IEEE. All rights reserved. xi8.4.2 Fragmentation and reassembly 228.4.2.1 General. 22

    42、8.4.2.2 Fragmentation 238.4.2.3 Reassembly 238.6 MIH protocol messages . 248.6.1 MIH messages for service management 248.6.1.1 MIH_Capability_Discover request 248.6.1.2 MIH_Capability_Discover response 248.6.1.11 MIH_Auth indication. 258.6.1.12 MIH_Auth request . 258.6.1.13 MIH_Auth response. 268.6.

    43、1.14 MIH_Termination_Auth request . 268.6.1.15 MIH_Termination_Auth response. 278.6.1.16 MIH_Push_key request 278.6.1.17 MIH_Push_key response . 278.6.1.18 MIH_LL_Auth request 278.6.1.19 MIH_LL_Auth response 288.6.3 MIH messages for command service. 288.6.3.7 MIH_Net_HO_Candidate_Query request . 288

    44、.6.3.8 MIH_Net_HO_Candidate_Query response. 298.6.3.9 MIH_MN_HO_Candidate_Query request. 298.6.3.10 MIH_MN_HO_Candidate_Query response 309. MIH protocol protection 319.1 Protection established through MIH (D)TLS 319.2 Key establishment through an MIH service access authentication 319.2.1 MIH service

    45、 access authentication 329.2.2 Key derivation and key hierarchy 389.2.3 EAP-generated MIH security association 409.2.4 Termination 419.3 MIH message protection mechanisms for EAP-generated SAs 419.3.1 MIH_Auth message protection 419.3.2 MIH PDU protection procedure 429.3.3 MIH PDU protection by AES-

    46、CCM 439.3.3.1 AES-CCM Parameters. 449.3.3.2 Construct AES-CCM Nonce 449.3.3.3 Operational procedures in AES-CCM . 449.3.3.3.1Encapsulation. 449.3.3.3.2Decapsulation. 459.3.3.4 Format of security TLV . 459.3.4 MIH PDU protection by AES in CBC mode and HMAC-SHA1-96 469.3.4.1 Initialization vector for

    47、AES in CBC mode. 469.3.4.2 Operational procedures in applying AES CBC and HMAC-SHA1-96. 469.3.4.2.1Encapsulation. 469.3.4.2.2Decapsulation. 469.3.4.3 Format of security TLV . 479.3.5 MIH PDU protection by HMAC-SHA1-96. 479.3.5.1 MIC generation and verification 479.3.5.1.1MIC generation 479.3.5.1.2MI

    48、C verification 479.3.5.2 Format of security TLV . 479.3.6 MIH PDU protection by AES-CMAC. 489.3.6.1 MIC generation and verification 48xii Copyright 2012 IEEE. All rights reserved.9.3.6.1.1MIC generation 489.3.6.1.2MIC verification 489.3.6.2 Format of security TLV . 489.4 Common procedures 499.4.1 Se

    49、nding 499.4.2 Receiving . 4910. Proactive authentication. 5010.1 Media specific proactive authentication 5010.1.1 Procedures in a media specific proactive authentication . 5110.1.1.1 PoS and candidate media specific authenticator discovery . 5110.1.1.2 Proactive authentication through EAP or ERP 5110.1.1.3 Media specific association handshake . 5110.1.2 Proactive authentication message format 5110.2 Bundling media access authentication with MIH service access authentication. 5110.2.1 Media specific key derivation 5110.2.1.1 Derivation of media specific root


    注意事项

    本文(IEEE 802 21A-2012 en Local and metropolitan area networks-Part 21 Media Independent Handover Services Amendment 1 Security Extensions to Media Independent Hando.pdf)为本站会员(confusegate185)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开