This application claims priority to U.S. Provisional Application No. 60/964,908, filed Aug. 15, 2007 in the name of the same inventor, titled “Wireless Network Controller Certification Authority”.
1. Field of the Invention
This invention relates to implementing public key infrastructure (PKI) in wireless networks, for example but not limited to IEEE 802.11 networks.
2. Related Art
Public key encryption uses a pair of keys, one public and one private, to protect data and information from unauthorized access. Data or information encrypted with the public key can be decrypted only with the corresponding private key. In addition, public key encryption can be used to authenticate devices and/or parties involved in a communication.
One issue in public key encryption is verifying that a public key is authentic, that is it has not been tampered with or replaced by a malicious third party. A public key infrastructure can be used to address this issue. In a public key infrastructure, one or more trusted certification authorities (CAs) certify ownership of key pair (i.e., a public key and its associated private key). Once trusted, encryption and authentication using that key pair can be trusted.
One problem with this arrangement is that the controller does not have complete control over the certification process. In particular, XYZ certification authority 26 has control of the certificates used in the process (XYZ denoting a third party who owns/controls the certification authority). Another problem is that an infrastructure must be put in place to support the external certification authority.
Briefly, the controller in a wireless network acts as a certification authority (CA).
In one embodiment, a controller for a wireless network includes processing elements, an interface for communication with access points for the wireless network, and an interface to another network. The processing elements oversee communication between that other network and the access points, and the controller acts as a certification authority for authenticating access points using public key techniques.
In another embodiment, a public key infrastructure for a communication network includes a controller and access points for wireless communication. The controller acts as a certification authority with respect to the access points.
Yet another embodiment is a certification authority for authentication of access points for a wireless network, with the certification authority implemented by a controller associated with the access points.
Preferably, the wireless network is an IEEE 802.11 network, although this need not be the case.
This brief summary has been provided so that the nature of the invention may be understood quickly. A more complete understanding of the invention may be obtained by reference to the following description of the preferred embodiments thereof in connection with the attached drawings.
Architecture
In more detail, in order to have stricter control over what entities a controller should trust, the controller can also assume the role of a certification authority and issue certificates to the access points so that it trusts only the APs that have certificates issued by the controller's “local CA.” This way, the controller can refuse access to any access points that have certificates issued by any other CAs. Alternatively, the controller could allow access to access points that have certificates issued by other CAs.
Wireless devices (not shown) communicate with access points (AP1, AP2, . . . APN) 1, 2 and 3, which in turn communicate with controller 5. Preferably, the wireless network used by the access points is an IEEE 802.11 network, although this need not be the case.
The controller provides access to another network such as a VPN, Intranet, the Internet, the World Wide Web, or the like (not shown). XYZ certification authority (CA) 7 issues certificate 8 to APN 3. Controller 5 does not honor this certificate, as shown by the X in box 10. In an alternative embodiment, controller 5 could honor the certificate.
Local certification authority (CA) 12 in and/or controlled by controller 5 issues certificates 14 and 15 to access points (AP 1 and AP 2) 1 and 2. Of course, the invention is not limited to issuing two certificates to two access points. These certificates certify ownership of key pairs for communication between the controller and the access points, permitting secure communication as illustrated by checks in boxes 17 and 18.
The invention is not limited to the arrangement shown in
In some embodiment, the controller can be configured to allow access to APs that have certificates issued only by that controller's local CA. In that case, the controller preferably always verifies the access point's identity by verifying AP's certificate and making sure that it was signed using controller's own local CA. In other words, a strict authentication/authorization policy can be created between the controllers and access points based on the controller's “local CA” setup. Any rogue access points can thus be restricted from doing anything in the network.
There are many possible advantages to this approach:
In preferred embodiments, a controller's “local CA” will not be a provisioned CA. Instead, it will be created during the initial setup. This process will help to insure that a controller's CA is unique in any network setup. Preferably, the CA information will be preserved when controller upgrades are performed.
Alternatively, a controller's local CA can be a provisioned CA. Other techniques for implementing the local CA can also be used.
Various access points (or other clients, e.g. admin users) preferably can request a Client certificate from a controller. In one embodiment, the controller does the following steps to create a client certificate:
The invention also encompasses other techniques for setting up a certification authority (CA) in a controller for public-key encrypted communication with access points for a wireless network such as, but not limited to, and IEEE 802.11 network.
A controller's local CA can also certify key pairs for encrypted communication with an access point, with a device through an access point, or for any other communication that involves the controller and an authenticated access point.
Generality of Invention
The invention can be embodied in a method for a controller in a wireless network to act as a certification authority (CA), as well as in software and/or hardware such as a controller that implements the method, and in various other embodiments.
The invention also is applicable to non-wireless networks (e.g., wired or fiber optic networks) in which a controller is associated with access points.
In the preceding description, a preferred embodiment of the invention is described with regard to preferred process steps and data structures. However, those skilled in the art would recognize, after perusal of this application, that embodiments of the invention may be implemented using one or more general purpose processors or special purpose processors adapted to particular process steps and data structures operating under program control, that such process steps and data structures can be embodied as information stored in or transmitted to and from memories (e.g., fixed memories such as DRAMs, SRAMs, hard disks, caches, etc., and removable memories such as floppy disks, CD-ROMs, data tapes, etc.) including instructions executable by such processors (e.g., object code that is directly executable, source code that is executable after compilation, code that is executable through interpretation, etc.), and that implementation of the preferred process steps and data structures described herein using such equipment would not require undue experimentation or further invention.
This application should be read in the most general possible form. This includes, without limitation, the following:
Furthermore, the invention is in no way limited to the specifics of any particular embodiments and examples disclosed herein. Many other variations are possible which remain within the content, scope and spirit of the invention, and these variations would become clear to those skilled in the art after perusal of this application.
Number | Name | Date | Kind |
---|---|---|---|
5038151 | Kaminski | Aug 1991 | A |
5337397 | Lebby et al. | Aug 1994 | A |
5884272 | Walker et al. | Mar 1999 | A |
5966094 | Ward et al. | Oct 1999 | A |
6035402 | Vaeth et al. | Mar 2000 | A |
6154461 | Sturniolo et al. | Nov 2000 | A |
6463534 | Geiger et al. | Oct 2002 | B1 |
6658047 | Komulainen et al. | Dec 2003 | B1 |
6760318 | Bims | Jul 2004 | B1 |
6788658 | Bims | Sep 2004 | B1 |
6839038 | Weinstein | Jan 2005 | B2 |
6894649 | Ostervall | May 2005 | B2 |
6933909 | Theobold | Aug 2005 | B2 |
6954177 | Channabasappa et al. | Oct 2005 | B2 |
6978158 | Ghavami | Dec 2005 | B2 |
7096359 | Agrawal et al. | Aug 2006 | B2 |
7319685 | Kim et al. | Jan 2008 | B2 |
7333455 | Bolt et al. | Feb 2008 | B1 |
7359362 | King et al. | Apr 2008 | B2 |
7386726 | Gehrmann et al. | Jun 2008 | B2 |
7409551 | Fujishiro et al. | Aug 2008 | B2 |
7453855 | Madhow | Nov 2008 | B1 |
7473995 | Rumer et al. | Jan 2009 | B2 |
7644270 | Cherukumudi et al. | Jan 2010 | B1 |
7843900 | Gallagher et al. | Nov 2010 | B2 |
20010034708 | Walker et al. | Oct 2001 | A1 |
20020056050 | Heiden et al. | May 2002 | A1 |
20020085719 | Crosbie | Jul 2002 | A1 |
20020124169 | Agrawal et al. | Sep 2002 | A1 |
20020133716 | Harif | Sep 2002 | A1 |
20020186845 | Dutta et al. | Dec 2002 | A1 |
20030014629 | Zuccherato | Jan 2003 | A1 |
20030031320 | Fan et al. | Feb 2003 | A1 |
20030088772 | Gehrmann et al. | May 2003 | A1 |
20030097592 | Adusumilli | May 2003 | A1 |
20030154274 | Nakamura | Aug 2003 | A1 |
20030163685 | Paatero | Aug 2003 | A1 |
20030163700 | Paatero | Aug 2003 | A1 |
20030198305 | Taylor et al. | Oct 2003 | A1 |
20040185842 | Spaur et al. | Sep 2004 | A1 |
20040209615 | Lamb et al. | Oct 2004 | A1 |
20040243846 | Aboba et al. | Dec 2004 | A1 |
20040268142 | Karjala et al. | Dec 2004 | A1 |
20050058112 | Lahey et al. | Mar 2005 | A1 |
20050060576 | Kime et al. | Mar 2005 | A1 |
20050111405 | Kanterakis | May 2005 | A1 |
20050138400 | Wu et al. | Jun 2005 | A1 |
20050144439 | Park et al. | Jun 2005 | A1 |
20050152314 | Sun et al. | Jul 2005 | A1 |
20050171720 | Olson et al. | Aug 2005 | A1 |
20050191990 | Willey et al. | Sep 2005 | A1 |
20050223111 | Bhandaru et al. | Oct 2005 | A1 |
20060015731 | Lakshmi Narayanan | Jan 2006 | A1 |
20060023887 | Agrawal et al. | Feb 2006 | A1 |
20060116170 | Brahmbhatt et al. | Jun 2006 | A1 |
20060133414 | Luoma et al. | Jun 2006 | A1 |
20060133612 | Abedi et al. | Jun 2006 | A1 |
20060135121 | Abedi et al. | Jun 2006 | A1 |
20060171540 | Lee et al. | Aug 2006 | A1 |
20060174106 | Bell et al. | Aug 2006 | A1 |
20060187871 | Jones | Aug 2006 | A1 |
20060193284 | Stieglitz et al. | Aug 2006 | A1 |
20060200862 | Olson et al. | Sep 2006 | A1 |
20060258366 | Oki et al. | Nov 2006 | A1 |
20070098176 | Song | May 2007 | A1 |
20070140191 | Kojima | Jun 2007 | A1 |
20070180494 | Casey et al. | Aug 2007 | A1 |
20070195742 | Erdman et al. | Aug 2007 | A1 |
20070198848 | Bjorn | Aug 2007 | A1 |
20070206537 | Cam-Winget et al. | Sep 2007 | A1 |
20070286143 | Olson et al. | Dec 2007 | A1 |
20080072292 | Narjala | Mar 2008 | A1 |
20080082830 | Goulet | Apr 2008 | A1 |
20080101291 | Jiang et al. | May 2008 | A1 |
20080130596 | Kalhan | Jun 2008 | A1 |
20080170699 | Fratti et al. | Jul 2008 | A1 |
20080186882 | Scherzer et al. | Aug 2008 | A1 |
20090134215 | Drummond et al. | May 2009 | A1 |
20100306170 | Freedman et al. | Dec 2010 | A1 |
Entry |
---|
Habib et al. “Multi-antenna techniques for OFDM based WLAN.” Proceedings of First International Conference on Next-Generation Wireless Systems, Jan. 2006, pp. 186-190. |
Kitahara et al. “A base station adaptive antenna for downlink transmission in a DS-CDMA system.” IEEE 51st Vehicular Technology Conference Proceedings, 2000. (Abstract). |
Mahler et al. “Design and optimisation of an antenna array for WiMAX base stations.” IEEE/ACES International Conference on Wireless Communications and Applied Computational Electromagnetics, 2005. (Abstract). |
Miaris et al. “On the base stations antenna system design for mobile communications.” Electrical Engineering, 2006, pp. 157-163, vol. 88. |
Miura et al. “Study of array pattern tuning method using hybrid genetic algorithms for figure-8 satellite's earth station antenna.” Asia-Pacific Microwave Conference Proceedings, 2000. (Abstract). |
Ponnapalli et al. “Design and packaging of antennas for wireless systems.” Proceedings of Electrical Performance of Electrical Packaging, 1995. (Abstract). |
Sarolic. “Base station antenna near-field radiation pattern distortion analysis.” Sixth International Conference on Computational Methods for the Solution of Electrical and Electromagnetic Engineering Problems Incorporating Electromagnetic Effects on Human Beings and Equipment Seminar, 2003. (Abstract). |
Number | Date | Country | |
---|---|---|---|
60964908 | Aug 2007 | US |