Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Protected management frames  



1.1  Overview  





1.2  Classes  







2 Unprotected frames  





3 Protected frames  





4 Replay protection  





5 Usage  





6 See also  





7 References  





8 External links  














IEEE 802.11w-2009






Català
Español
Français

Polski
Українська
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


IEEE 802.11w-2009 is an approved amendment to the IEEE 802.11 standard to increase the security of its management frames.

Protected management frames[edit]

Current 802.11 standard defines "frame" types for use in management and control of wireless links. IEEE 802.11w is the Protected Management Frames standard for the IEEE 802.11 family of standards. Task Group 'w' worked on improving the IEEE 802.11 Medium Access Control layer.[1] Its objective was to increase security by providing data confidentiality of management frames, mechanisms that enable data integrity, data origin authenticity, and replay protection. These extensions interact with IEEE 802.11r and IEEE 802.11u.

Overview[edit]

Classes[edit]

Unprotected frames[edit]

It is infeasible/not possible to protect the frame sent before four-ways handshake because it is sent prior to key establishment. The management frames, which are sent after key establishment, can be protected.

Infeasible to protect:

Protected frames[edit]

Protection-capable management frames are those sent after key establishment that can be protected using existing protection key hierarchy in 802.11 and its amendments.

Only TKIP/AES frames are protected and WEP/open frames are not protected.

The following management frames can be protected:

Management frames that are required before AP and client have exchanged the transmission keys via the 4 way handshake remain unprotected:

Uni-cast Protection-capable Management Frames are protected by the same cipher suite as an ordinary data MPDU.

Broad-/Multicast Robust Management Frames are protected using Broadcast/multicast integrity protocol (BIP)

Replay protection[edit]

Replay protection is provided by already existing mechanisms. Specifically, there is a (per-station, per-key, per-priority) counter for each transmitted frame; this is used as a nonce/initialization vector (IV) in cryptographic encapsulation/decapsulation, and the receiving station ensures that the received counter is increasing.

Usage[edit]

The 802.11w amendment is implemented in Linux and BSDs as part of the 80211mac driver code base, which is used by several wireless driver interfaces; i.e., ath9k. The feature is easily enabled in most kernels and Linux OS's using these combinations. OpenWrt in particular provides an easy toggle as part of the base distribution. The feature has been implemented for the first time into Microsoft operating systems in Windows 8. This has caused a number of compatibility issues particularly with wireless access points that are not compatible with the standard. Rolling back the wireless adapter driver to one from Windows 7 usually fixes the issue.

Wireless LANs without this standard send system management information in unprotected frames, which makes them vulnerable. This standard protects against network disruption caused by malicious systems that forge disassociation requests (deauth) that appear to be sent by valid equipment [2] such as Evil Twin attacks.

See also[edit]

References[edit]

  1. ^ "Quick Guide to IEEE 802.11 Activities". IEEE802. IEEE. Archived from the original on 3 November 2019. Retrieved 18 October 2019.
  • ^ Hunter, David. "Liaison Report – 802.11 Work Related to 802.21". Archived from the original on 2022-06-18. Retrieved 2020-08-24.
  • External links[edit]


    Retrieved from "https://en.wikipedia.org/w/index.php?title=IEEE_802.11w-2009&oldid=1226549539"

    Category: 
    IEEE 802.11
    Hidden categories: 
    Articles with short description
    Short description is different from Wikidata
    Articles lacking in-text citations from August 2013
    All articles lacking in-text citations
     



    This page was last edited on 31 May 2024, at 10:35 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki