This application is a 371 U.S. National Stage of International Application No. PCT/CN2009/075538, filed Dec. 14, 2009, which claims the benefit of CN Patent Application No. 200910021418.X, entitled “METHOD FOR IMPLEMENTING A CONVERGENT WIRELESS LOCAL AREA NETWORK (WLAN) AUTHENTICATION AND PRIVACY INFRASTRUCTURE (WAPI) NETWORK ARCHITECTURE IN A LOCAL MAC MODE”, filed on Feb. 27, 2009 with State Intellectual Property Office of PRC, the entirety of which applications are incorporated herein by reference.
The present invention relates to a method for implementing a convergent Wireless Local Area Network (WLAN) Authentication and Privacy Infrastructure (WAPI) network architecture in a local Medium Access Control (MAC) mode.
In a Wireless Local Area Network (WLAN) with autonomous architecture, a wireless Access Point (AP), which is completely deployed with and interfaced to WLAN functions, is a standalone entity in the network and should be managed independently. At present, WLAN Authentication and Privacy Infrastructure (WAPI) based WLANs all employ the autonomous architecture. However, with the increasing scale of the WLAN deployment, because of its following inherent drawbacks, the operation mode of the network with this autonomous architecture is becoming an obstacle restricting the development of wireless techniques.
Firstly, in the WLAN with the autonomous architecture, AP, as an Internet Protocol (IP) addressable device, should be managed independently, including monitoring, configuring, controlling or the like. In large-scale network deployment, a large number of APs will bring huge management cost, and lead to heavy burden on the network. Such phenomena are more significant especially when the APs in the network are differently configured and managed, which will definitely obstruct the development of wireless techniques.
Secondly, in the WLAN with autonomous architecture, it is difficult to ensure the consistency of all configuration parameters of the AP, because among the configuration parameters of the AP, besides static parameters, most are parameters to be dynamically configured. In a large-scale WLAN, updating the dynamic configurations of APs in the whole network in time is an extremely heavy burden or is even impossible to be accomplished.
Thirdly, wireless transmission media in the WLAN are shared resources, and to improve the performance of the network, each of the APs has to be monitored in real time and the configuration of the AP has be dynamically updated based on the usage of the shared media. However, manually configuring the AP parameters related to the wireless transmission media is labor consuming and costly.
Fourthly, in the WLAN with autonomous architecture, secured access to the network and block of unauthorized APs are relatively difficult. In most cases the AP is hard to be protected due to its deployment position, and once the AP is stolen, loaded security information will be leaked out and thus the network security will be threatened by an attacker via the security information.
In a word, in the WLAN with autonomous architecture, and particularly in large-scale deployment, monitoring, configuring and controlling of the APs will lead to heavy management burden on the network. Moreover, it is hard to maintain the consistency of the AP configuration. Furthermore, the co-operation of the APs in the network required for best network performance and minimum wireless interference due to the sharing and dynamic characteristics of the wireless transmission media imposes higher demand on the configuration management of the APs. Security is one of the key factors to be considered in designing a wireless network, and in the large-scale deployment, the security of the WLAN will encounter huge challenge. Thus, it is urgent to design a WAPI-based convergent WLAN network architecture, i.e. fit AP architecture of WAPI, since the operation mode of the WLAN with autonomous architecture can not meet the requirements of the large-scale network deployment.
The object of the present invention is to provide a method for implementing a convergent WAPI network architecture in a local Medium Access Control (MAC) mode, so as to overcome the drawbacks of the above autonomous WLAN network architecture. According to the present invention, the centralized control and management of the APs in the whole network are achieved by splitting the MAC function and the WAPI function of the APs, thereby meeting the deployment requirements of the large-scale WLAN.
The present invention provides such a technical solution: a method for implementing a convergent WAPI network architecture in a local MAC mode, which is characterized in that the method includes the following steps:
Specifically, the above step 2.1) includes:
Specifically, the above step 2.2) includes:
Specifically, the above step 2.3) includes:
Specifically, the above step 2.4) includes:
Specifically, the above step 2.5) includes:
Following the above step 2.5), the method further includes a step 2.6) of updating a unicast key between the access controller and the station.
Specifically, the above step 2.6) includes:
Following the above step 2.5) or step 2.6), the method further includes a step 2.7) of updating a multicast key between the access controller and the station.
Specifically, the above step 2.7) includes:
The present invention provides a flow of communication interaction between entities with the convergent WLAN network architecture in the local MAC mode, in which the MAC function and the WAPI function of the AP are split to the Wireless Terminal Point (WTP) and the Access Controller (AC). Specifically, the WTP implements the interaction with the Station (STA) including the beacon frame, the response to probe request and the like, and further implements the WPI protocol; while the AC implements the interaction with the STA including the association, the WAPI protocol and the like. This mode for splitting the functions of AP is referred to as the local MAC mode. Compared with the prior art, the present invention has the following advantages: the present invention provides a method for implementing a convergent WAPI network architecture in a local MAC mode, which breaks the limitation that the existing WAPI protocol based autonomous network architecture can not meet the requirement of the large-scale WLAN deployment. With the local MAC mode, the unified monitoring, configuring and controlling of the WTPs by the AC are implemented, so that the centralized management of WTPs in the WLAN are achieved; by implementing the WAI protocol by the AC and implementing the WPI protocol by the WTP, a seamless integration of the WAPI protocol and the convergent WLAN architecture is established, and the security of the WLAN is ensured. To sum up, the present invention not only satisfies the requirement of the large-scale WLAN deployment, but also ensures the security of the WLAN in the convergent architecture.
Referring to
Referring to
Referring to
In the above embodiment, to ensure the security of the key data in the steps 2.2), 2.4), 2.6) and 2.7), a secured channel can be prearranged between the AC and the WTP, and this secured channel can be established by constructing a private network between the AC and the WTP or by using security protocols (such as Datagram Transport Layer Security (DTLS) protocol).
Number | Date | Country | Kind |
---|---|---|---|
2009 1 0021418 | Feb 2009 | CN | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CN2009/075538 | 12/14/2009 | WO | 00 | 8/26/2011 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2010/096997 | 9/2/2010 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6788658 | Bims | Sep 2004 | B1 |
7991152 | Gueron et al. | Aug 2011 | B2 |
8086749 | Townsley et al. | Dec 2011 | B2 |
8335490 | Kaippallimalil | Dec 2012 | B2 |
20050044249 | Teng et al. | Feb 2005 | A1 |
20050182830 | Abhishek et al. | Aug 2005 | A1 |
20060129807 | Halasz et al. | Jun 2006 | A1 |
20080072047 | Sarikaya et al. | Mar 2008 | A1 |
20080117477 | Fujise | May 2008 | A1 |
20080134288 | Halasz et al. | Jun 2008 | A1 |
20080295144 | Cam-Winget et al. | Nov 2008 | A1 |
20090052674 | Nishida et al. | Feb 2009 | A1 |
20100217986 | Schneider | Aug 2010 | A1 |
20110058670 | Ala-Laurila et al. | Mar 2011 | A1 |
20110307621 | Lai et al. | Dec 2011 | A1 |
20110307943 | Du et al. | Dec 2011 | A1 |
20110310771 | Tie et al. | Dec 2011 | A1 |
Number | Date | Country |
---|---|---|
1681239 | Oct 2005 | CN |
1691582 | Nov 2005 | CN |
1905504 | Jan 2007 | CN |
1996840 | Jul 2007 | CN |
101155396 | Apr 2008 | CN |
101192923 | Jun 2008 | CN |
101577904 | Nov 2009 | CN |
101577905 | Nov 2009 | CN |
101577978 | Nov 2009 | CN |
WO-2005081567 | Sep 2005 | WO |
WO 2008069520 | Jun 2008 | WO |
WO-2008080351 | Jul 2008 | WO |
Entry |
---|
Wu et al, Security Analysis of WAPI Authentication and Key Exchange Protocol, 2007. |
Xiang Wang, et al., “Communication Protocol of Centralized WLAN Architecture,” Computer Engineering, Nov. 2008, vol. 34, No. 22, pp. 115-117. |
International Search Report (in Chinese with English translation) and Written Opinion (in Chinese) for PCT/CN2009/075536, mailed Mar. 25, 2010. |
International Search Report regarding Application No. PCT/CN2009/075539, mailed Mar. 25, 2010. |
Chinese Office Action regarding Application No. 200910021422.6, dated Jul. 12, 2010. Summary provided by Unitalen Attorneys at Law. |
U.S. Office Action regarding U.S. Appl. No. 13/203,643, mailed Mar. 21, 2013. |
International Search Report (English and Chinese) and Written Opinion of the ISA (Chinese), ISA/CN, Beijing, China, mailed Mar. 18, 2010. |
Zhao-Hui Tang et al. “On the Security of WAI Protocol in the Third Version of WAPI.” International Conference on Intelligent Information Hiding and Multimedia Signal Processing. 2008. |
Qiang Tang. “On the Security of Three Versions of the WAI Protocol in Chinese WLAN Implementation Plan.” Second International Conference on Communications and Networking in China. Aug. 22-24, 2007. |
Li Huixian and Pang Liaojun. “Improvement on WLAN multicast key management protocol.” 2008 International Conference on Computational Intelligence and Security. |
Final U.S. Office Action regarding U.S. Appl. No. 13/203,643, mailed Jul. 23, 2013. |
Notice of Allowance regarding U.S. Appl. No. 13/203,643, mailed Oct. 4, 2013. |
Office Action regarding U.S. Appl. No. 13/203,645, Nov. 7, 2013. |
Number | Date | Country | |
---|---|---|---|
20110307621 A1 | Dec 2011 | US |