This application makes reference to the following commonly owned U.S. patent applications and/or patents, which are incorporated herein by reference in their entirety for all purposes:
U.S. patent application Ser. No. 10/155,938 in the name of Patrice R. Calhoun, Robert B. O'Hara, Jr. and Robert J. Friday, entitled “Method and System for Hierarchical Processing of Protocol Information in a Wireless LAN.”
The present invention relates to wireless computer networks and, more particularly, to methods, apparatuses and systems effecting a distributed security mechanism for wireless computer network environments.
The market adoption of wireless LAN (WLAN) technology has exploded, as users from a wide range of backgrounds and vertical industries brought this technology into their homes, offices, and increasingly into the public air space. This inflection point highlighted not only the limitations of earlier-generation systems, but the changing role WLAN technology now plays in people's work and lifestyles, across the globe. Indeed, WLANs are rapidly changing from convenience networks to business-critical networks. Increasingly users are depending on WLANs to improve the timeliness and productivity of their communications and applications, and in doing so, require greater visibility, security, management, and performance from their network.
As enterprises and other entities increasingly rely on wireless networks, security of wireless network environments becomes a critical component to ensure the integrity of the enterprise's network environment against unauthorized access. Indeed, wireless networks pose security risks not encountered in wired computer network, since any wireless client in the coverage area of an access point can potentially gain access to the network without a physical connection. In an 802.11 wireless network, prior art security mechanisms are implemented in a variety of manners. For example, the 802.11 protocol provides for shared-key authentication according to which a wireless client must possess a shared secret key in order to establish a wireless connection with an access point. In addition, as with wired networks, the wireless network infrastructure can operate in connection with application level security mechanisms, such as a RADIUS or other authentication server, to control access to network resources.
To establish a wireless connection with an access point, a wireless client or station (STA) transmits probe requests to discover the access point(s) within range. After selecting an access point, the wireless client transmits an authentication request to the selected access point. With open system authentication, the access point responds to the request, either accepting or rejecting the request. With shared-key authentication, the access point transmits a challenge response. To authenticate, the wireless must send an encrypted version of the challenge response (using a shared key) in an authentication frame back to the access point.
As one skilled in the art recognizes, each time an access point interacts with a wireless client associated with a malicious, unauthorized user, there is a risk that the malicious user can gain access to the network environment. After failing to connect at a first access point, a malicious or unauthorized user may simply move to another access point and attempt to establish a wireless connection. In prior art wireless network environments, however, there exists no mechanism for coordinating or distributing security policy across access points. Accordingly, the knowledge gleaned from interaction with a given wireless client at the first access point essentially goes unused when the user moves to a different coverage area and new access point, exposing the network to a new round of attacks.
In light of the foregoing, a need in the art exists for methods, apparatuses and systems that facilitate the distribution of security information across access points associated with a wireless network environment. A need further exists for methods, apparatuses, and systems that allow for the sharing of security information across access points to effect a unitary security scheme throughout a wireless network environment. Embodiments of the present invention substantially fulfill these needs.
The present invention provides methods, apparatuses and systems enabling a distributed wireless network security system. In one embodiment, the present invention provides a wireless network system where security policies are automatically distributed and uniformly implemented across wireless network access points. Embodiments of the present invention address the situation where a malicious user moves to a different access point within a wireless network environment after failing to properly authenticate and/or associate at a first access point. Embodiments of the present invention enable an integrated, multi-layer network security system, wherein a security mechanism at one layer (e.g., link layer security mechanisms) can set policies based on information gleaned from operation of a security mechanism at another layer (e.g., application layer authentication servers).
For didactic purposes an embodiment of the present invention is described as operating in a WLAN environment as disclosed in U.S. application Ser. No. 10/155,938 incorporated by reference herein. As discussed below, however, the present invention can be implemented according to a vast array of embodiments, and can be applied to a variety of WLAN architectures.
The access elements 12-15 are coupled via communication means using a wireless local area network (WLAN) protocol (e.g., IEEE 802.11a or 802.11b, etc.) to the client remote elements 16, 18, 20, 22. The communications means 28, 30 between the access elements 12, 14 and the central control element 24 is typically an Ethernet network, but it could be anything else which is appropriate to the environment. As described in U.S. application Ser. No. 10/155,938, the access elements 12, 14 and the central control element 24 tunnel network traffic associated with corresponding remote client elements 16, 18; 20, 22 via direct access lines 28 and 30, respectively. Central control element 24 is also operative to bridge the network traffic between the remote client elements 16, 18; 20, 22 transmitted through the tunnel with corresponding access elements 12, 14.
As described in the above-identified patent application, central control element 24 operates to perform link layer management functions, such as authentication and association on behalf of access elements 12, 14. For example, the central control element 24 provides processing to dynamically configure a wireless Local Area Network of a system according to the invention while the access elements 12, 14 provide the acknowledgment of communications with the client remote elements 16, 18, 20, 22. The central control element 24 may for example process the wireless LAN management messages passed on from the client remote elements 16, 18; 20, 22 via the access elements 12, 14, such as authentication requests and authorization requests, whereas the access elements 12, 14 provide immediate acknowledgment of the communication of those messages without conventional processing thereof. Similarly, the central control element 24 may for example process physical layer information. Still further, the central control element 24 may for example process information collected at the access elements 12, 14 on channel characteristic, propagation, and interference or noise. Central control element 26 and associated access elements 13, 15 operate in a similar or identical manner.
Authentication server 70 performs application-level authentication protocols, typically involving challenge-response queries involving, for example, a user name and password. Authentication server 70 can implement any suitable authentication mechanism, such as IEEE 802.1X, RADIUS, Kerberos, and web-based authentication protocols. In one embodiment, the functionality of authentication server 70 can be integrated into a Virtual Private Network (VPN) server.
As discussed more fully below, the wireless network security scheme according to the present invention employs a mobile station data structure including information characterizing a given remote client element, and a so-called black list defining the remote client elements that should not be provided network access. In one embodiment, the mobile station data structure includes a wireless client identifier (typically, the MAC address of the remote client element), a black list flag (in one embodiment, a “0” indicates that the associated client is not “black-listed,” while a “1” indicates that the client is black-listed). In another embodiment, the mobile station data structure may further includes a black list time stamp which, as described below, can be used to place remote client elements on a black list on a temporary basis. The mobile station data structure may also include a field maintaining a count of the number of unsuccessful authentication or association attempts. In one embodiment, central control elements 24, 26 maintain the mobile station data structures and, as discussed below, share mobile station data structures to effect an enterprise-wide security scheme. The mobile station data structures can be implemented as entries in a mobile station table maintained by the central control elements. In another embodiments, the mobile station data structures may be implemented as software objects.
Otherwise, assuming the remote client element 16 has not been black-listed, authentication and association protocols are performed (120), as set forth in
In one embodiment, the attempt threshold is a configurable parameter, which can be applied individually to each security layer or on an aggregate basis to all failed attempts in the authentication and association protocol implemented by the wireless network infrastructure. Moreover, as discussed above, the mobile station data structure may further include a field maintaining a count of the number of failed authentication attempts to prevent against an attack where the wireless client moves to a coverage area associated with another access point/central control element before exceeding the attempt threshold and being placed on a black list. In such an embodiment, the attempts field could be reinitialized when the wireless client successfully passes the security scheme implemented by the network environment. In addition, the time stamp value could be updated with each failed attempt to allow for time-based decisions to reset the counts after a threshold period of time after the last attempt.
In addition, beyond the sharing of security policy information across access elements in a wireless network environment, the present invention achieves an enhanced network security system by allowing information gleaned from security policies at one level (e.g., application layer security) to be used in setting security policies at a different level or layer. For example, assume for didactic purposes that a remote client element properly authenticates and associates at the 802.11 or other link layer, but fails to properly authenticate at the application layer with authentication server 70, for example. After a threshold number of attempts, the remote client element is “black-listed.” As one will recognize, the security state associated with the remote client element 16 extends to other security mechanism at lower layers. In the embodiment described herein, for example, the remote client element would be prevented from authenticating or associating with an access element at the link layer during a subsequent attempt to establish a connection. As one skilled in the art, this aspect of the invention has application to wired networks as well. For example, in a LAN including DHCP functionality and an authentication server, the DHCP server associated with the LAN can maintain a blacklist (identifying clients by MAC address) and deny requests for dynamic IP addresses based on the state of the black list. In one embodiment, the DHCP server can implement the blacklist by reserving an inoperative (e.g., non-routable, or the loop back address) IP address for the particular black-listed client(s). The DHCP server can release a client-from the black list by normal termination of the DHCP address lease. In another embodiment, a client node is placed on the black list after a threshold number of failed attempts to authenticate with the authentication server.
A variety of embodiments are possible. For example, the central control elements can be configured to publish or push updates to mobile station data structures (e.g., changes in security state information) to other known central control elements. In addition, the central control elements can be manually configured with the computer network address of neighboring central control elements to allow for exchange of mobile station data structures. In other embodiments, the central control elements may include various layer 2 or layer 3 discovery mechanisms to automatically configure the exchange of mobile station data structures. In addition, the present invention can be applied to a variety of other wireless network architectures. For example, the wireless network infrastructure need not include central control elements. For example, the mobile station tables and associated security and link layer management functionality performed by the central control elements may be integrated into the access elements to operate in a substantially autonomous mode (obviating the use of the central control elements). In addition, a central management appliance can be introduced to manage and coordinate the exchange of mobile station data structures among the wireless access points.
Accordingly, the invention has been explained with reference to specific embodiments. Other embodiments will be evident to those of ordinary skill in the art. It is, therefore, intended that the claims set forth below not be limited to the embodiments described above.
Number | Name | Date | Kind |
---|---|---|---|
5564079 | Olsson | Oct 1996 | A |
5684860 | Milani et al. | Nov 1997 | A |
6112095 | Wax et al. | Aug 2000 | A |
6115605 | Siccardo et al. | Sep 2000 | A |
6134448 | Shoji et al. | Oct 2000 | A |
6140964 | Sugiura et al. | Oct 2000 | A |
6198935 | Saha et al. | Mar 2001 | B1 |
6212391 | Saleh et al. | Apr 2001 | B1 |
6249252 | Dupray | Jun 2001 | B1 |
6259406 | Sugiura et al. | Jul 2001 | B1 |
6269246 | Rao et al. | Jul 2001 | B1 |
6275190 | Sugiura et al. | Aug 2001 | B1 |
6282427 | Larsson et al. | Aug 2001 | B1 |
6304218 | Sugiura et al. | Oct 2001 | B1 |
6414634 | Tekinay | Jul 2002 | B1 |
6415155 | Koshima et al. | Jul 2002 | B1 |
6441777 | McDonald | Aug 2002 | B1 |
6456892 | Dara-Abrams et al. | Sep 2002 | B1 |
6526283 | Jang | Feb 2003 | B1 |
6556942 | Smith | Apr 2003 | B1 |
6760318 | Bims | Jul 2004 | B1 |
6788658 | Bims | Sep 2004 | B1 |
6925070 | Proctor, Jr. | Aug 2005 | B2 |
6940827 | Li et al. | Sep 2005 | B2 |
6963740 | Guthery et al. | Nov 2005 | B1 |
6978023 | Dacosta | Dec 2005 | B2 |
7028097 | Bard | Apr 2006 | B2 |
7028183 | Simon et al. | Apr 2006 | B2 |
7032241 | Venkatachary et al. | Apr 2006 | B1 |
7050480 | Ertel et al. | May 2006 | B2 |
7068999 | Ballai | Jun 2006 | B2 |
7072315 | Liu et al. | Jul 2006 | B1 |
7073066 | Nessett | Jul 2006 | B1 |
7103026 | Hall et al. | Sep 2006 | B2 |
7124197 | Ocepek et al. | Oct 2006 | B2 |
7133842 | Harif | Nov 2006 | B2 |
7146172 | Li et al. | Dec 2006 | B2 |
7149896 | Bahl et al. | Dec 2006 | B1 |
7164669 | Li et al. | Jan 2007 | B2 |
7177298 | Chillariga et al. | Feb 2007 | B2 |
7212837 | Calhoun et al. | May 2007 | B1 |
20020174335 | Zhang et al. | Nov 2002 | A1 |
20020188723 | Choi | Dec 2002 | A1 |
20030023746 | Loguinov | Jan 2003 | A1 |
20030117985 | Fujii et al. | Jun 2003 | A1 |
20030135762 | Macaulay | Jul 2003 | A1 |
20030188006 | Bard | Oct 2003 | A1 |
20030198208 | Koos, Jr. et al. | Oct 2003 | A1 |
Number | Date | Country |
---|---|---|
0 930 514 | Jul 1999 | EP |
0 967 816 | Dec 1999 | EP |
1 018 457 | Jul 2000 | EP |
1 296 531 | Mar 2003 | EP |
1 301 055 | Apr 2003 | EP |
02044929 | Feb 1990 | JP |
WO 9841048 | Dec 1998 | WO |
WO 9908909 | Jul 2000 | WO |
WO 9733386 | Oct 2000 | WO |
WO 0243425 | May 2002 | WO |
WO 02054813 | Jul 2002 | WO |
WO 03023443 | Mar 2003 | WO |