181:) is entirely in charge of deciding when to transition and to which BSS it wishes to transition. In the early days of 802.11, transition was a much simpler task for the client device. Only four messages were required for the device to establish a connection with a new BSS (five if counting the optional "I'm leaving" message (deauthentication and disassociation frame) the client could send to the old access point). However, as additional features were added to the standard, including
197:(WMM) with admission control requests, the number of messages required went up dramatically. During the time these additional messages are being exchanged, the mobile device's traffic, including that from voice calls, cannot proceed, and the loss experienced by the user could amount to several seconds. Generally, the highest amount of delay or loss that the edge network should introduce into a voice call is 50 ms.
25:
170:, is widely used for wireless local area communications. Many deployed implementations have effective ranges of only a few dozen meters, so, to maintain communications, devices in motion that use it will need to transition from one access point to another. In an automotive environment, this could easily result in a transition every five to ten seconds.
247:(EAP) on every transition, a time-consuming process. The solution is to allow for the part of the key derived from the server to be cached in the wireless network, so that a reasonable number of future connections can be based on the cached key, avoiding the 802.1X process. A feature known as
200:
802.11r was launched to attempt to undo the added burden that security and quality of service added to the transition process, and restore it to the original four-message exchange. In this way, transition problems are not eliminated, but at least are returned to the status quo ante.
370:"IEEE 802.11-2012 - IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications"
307:
In
October 2017 security researchers Mathy Vanhoef (imec-DistriNet, KU Leuven) and Frank Piessens (imec-DistriNet, KU Leuven) published their paper "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2"
298:
A fast BSS transition performs the same operations except for the 802.1X negotiation, but piggybacks the PTK and QoS admission control exchanges with the 802.11 Authentication and
Reassociation messages.
744:
173:
Transitions are already supported under the preexisting standard. The fundamental architecture for transition is identical for 802.11 with and without 802.11r: the client device (known as the
158:
are often used, although 802.11 transition is not a true handoff/roaming process in the cellular sense, where the process is coordinated by the base station and is generally uninterrupted.
323:) described a new technique to crack WPA2 and WPA PSK (pre-shared key) passwords that he states will likely work against all 802.11i/p/r networks with transition functions enabled.
220:(BSS) transitions between access points by redefining the security key negotiation protocol, allowing both the negotiation and requests for wireless resources (similar to
951:
1719:
484:
148:) to another performed in a nearly seamless manner. It was published on July 15, 2008. IEEE 802.11r-2008 was rolled up into 802.11-2012. The terms
401:
291:
4-way handshake of session keys, creating a unique encryption key for the association based on the master key established from the previous step.
1755:
1745:
594:
244:
208:(VOIP) via mobile phones designed to work with wireless Internet networks, instead of (or in addition to) standard cellular networks.
42:
1020:
539:
108:
251:(OKC) exists today, based on 802.11i, to perform the same task. 802.11r differs from OKC by fully specifying the key hierarchy.
89:
719:
136:
standard to permit continuous connectivity aboard wireless devices in motion, with fast and secure client transitions from one
61:
1001:
194:
46:
277:
BSS, the AP and
Station have a connection, but are not allowed to exchange data frames, as they have not established a key.
976:
369:
221:
68:
477:
1385:
946:
649:
564:
544:
349:
1788:
517:
493:
75:
35:
1355:
554:
266:
Exchanging 802.11 authentication messages (first from the client, then from the AP) with the target access point.
789:
57:
1793:
654:
644:
624:
470:
966:
527:
332:
1760:
883:
619:
409:
1814:
1026:
956:
774:
704:
1669:
1664:
1659:
1654:
1649:
1644:
1639:
908:
784:
457:
312:). This paper also listed a vulnerability of common 802.11r implementations and registered the
82:
1457:
1452:
1416:
1410:
1405:
1400:
1395:
1390:
1380:
1375:
1365:
1360:
996:
826:
217:
1585:
1326:
1321:
1311:
1306:
1301:
1296:
1291:
1286:
1276:
1271:
1266:
1261:
1251:
1246:
1241:
1236:
1221:
1216:
1211:
1206:
1201:
1350:
1016:
779:
422:
1634:
764:
759:
679:
629:
313:
1808:
1740:
1684:
1679:
1674:
1624:
1619:
1614:
1604:
1580:
1556:
1544:
1533:
1522:
1510:
1505:
1500:
1495:
1482:
1471:
961:
941:
794:
769:
699:
589:
534:
205:
1724:
1714:
1462:
1447:
1442:
1437:
1427:
1370:
1011:
1006:
991:
986:
981:
931:
343:
337:
1596:
1336:
1090:
971:
936:
926:
903:
898:
893:
888:
871:
866:
856:
133:
24:
379:
1709:
1704:
1036:
918:
851:
846:
841:
836:
831:
821:
239:-based authentication, the client is required to renegotiate its key with the
436:
1770:
1750:
1608:
861:
754:
749:
734:
724:
714:
694:
689:
674:
664:
659:
639:
634:
614:
609:
604:
599:
584:
549:
1041:
813:
804:
522:
512:
507:
204:
The primary application currently envisioned for the 802.11r standard is
1765:
1561:
1527:
1476:
1421:
1316:
1281:
1256:
1231:
1226:
1196:
1191:
1186:
1180:
1174:
1169:
1164:
1159:
1153:
1147:
1142:
1137:
1132:
1126:
1120:
1115:
1110:
1105:
1050:
684:
669:
320:
288:
269:
Exchanging reassociation messages to establish connection at target AP.
232:
225:
190:
182:
150:
1628:
1100:
1095:
1085:
1080:
1075:
1070:
1065:
1060:
1055:
729:
559:
281:
274:
240:
236:
186:
1486:
1341:
876:
739:
579:
309:
167:
462:
709:
574:
569:
374:
466:
18:
402:"Metrics for Characterizing BSS Transition Time Performance"
259:
The non-802.11r BSS transition goes through six stages:
263:
Scanning – active or passive for other APs in the area.
1733:
1697:
1595:
1335:
1035:
917:
812:
803:
500:
49:. Unsourced material may be challenged and removed.
294:QoS admission control to re-establish QoS streams.
400:Wright, Charles; Polanec, Chris (2004-09-07).
319:On August 4, 2018, researcher Jens Steube (of
478:
8:
809:
485:
471:
463:
287:Pairwise transient key (PTK) derivation –
243:or other authentication server supporting
16:Amendment to the IEEE 802.11 WiFi standard
109:Learn how and when to remove this message
458:Status history for project IEEE 802.11r
361:
418:
407:
284:pairwise master key (PMK) negotiation.
140:(abbreviated BSS, and also known as a
7:
437:"New attack on WPA/WPA2 using PMKID"
47:adding citations to reliable sources
245:Extensible Authentication Protocol
14:
231:The key negotiation protocol in
23:
34:needs additional citations for
195:Wireless Multimedia Extensions
1:
216:IEEE 802.11r specifies fast
350:Inter-Access Point Protocol
162:Rationale for the amendment
1833:
1789:IEEE Standards Association
166:802.11, commonly known as
132:), is an amendment to the
1779:
249:opportunistic key caching
144:or more colloquially, an
333:Unlicensed Mobile Access
228:) to occur in parallel.
1794:Category:IEEE standards
346:- Cellular interworking
417:Cite journal requires
273:At this point in an
235:specifies that, for
43:improve this article
212:Fast BSS Transition
189:authentication and
126:fast BSS transition
58:"IEEE 802.11r-2008"
255:Protocol operation
1802:
1801:
1693:
1692:
340:- Mesh networking
218:Basic Service Set
138:Basic Service Set
122:IEEE 802.11r-2008
119:
118:
111:
93:
1822:
810:
487:
480:
473:
464:
445:
444:
433:
427:
426:
420:
415:
413:
405:
397:
391:
390:
388:
387:
378:. Archived from
366:
316:CVE-2017-13082.
114:
107:
103:
100:
94:
92:
51:
27:
19:
1832:
1831:
1825:
1824:
1823:
1821:
1820:
1819:
1805:
1804:
1803:
1798:
1775:
1729:
1689:
1591:
1339:
1331:
1039:
1031:
913:
799:
496:
491:
454:
449:
448:
435:
434:
430:
416:
406:
399:
398:
394:
385:
383:
368:
367:
363:
358:
329:
305:
257:
224:but defined in
214:
164:
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
1830:
1829:
1826:
1818:
1817:
1807:
1806:
1800:
1799:
1797:
1796:
1791:
1786:
1780:
1777:
1776:
1774:
1773:
1768:
1763:
1758:
1753:
1748:
1743:
1737:
1735:
1731:
1730:
1728:
1727:
1722:
1717:
1712:
1707:
1701:
1699:
1695:
1694:
1691:
1690:
1688:
1687:
1682:
1677:
1672:
1667:
1662:
1657:
1652:
1647:
1642:
1637:
1632:
1622:
1617:
1612:
1601:
1599:
1593:
1592:
1590:
1589:
1577:
1574:
1571:
1568:
1565:
1553:
1550:
1547:
1542:
1539:
1536:
1531:
1519:
1516:
1513:
1508:
1503:
1498:
1493:
1490:
1480:
1468:
1465:
1460:
1455:
1450:
1445:
1440:
1435:
1430:
1425:
1413:
1408:
1403:
1398:
1393:
1388:
1383:
1378:
1373:
1368:
1363:
1358:
1353:
1347:
1345:
1333:
1332:
1330:
1329:
1324:
1319:
1314:
1309:
1304:
1299:
1294:
1289:
1284:
1279:
1274:
1269:
1264:
1259:
1254:
1249:
1244:
1239:
1234:
1229:
1224:
1219:
1214:
1209:
1204:
1199:
1194:
1189:
1184:
1177:
1172:
1167:
1162:
1157:
1150:
1145:
1140:
1135:
1130:
1123:
1118:
1113:
1108:
1103:
1098:
1093:
1088:
1083:
1078:
1073:
1068:
1063:
1058:
1053:
1047:
1045:
1033:
1032:
1030:
1029:
1024:
1014:
1009:
1004:
999:
994:
989:
984:
979:
974:
969:
964:
959:
954:
949:
944:
939:
934:
929:
923:
921:
915:
914:
912:
911:
906:
901:
896:
891:
886:
881:
880:
879:
869:
864:
859:
854:
849:
844:
839:
834:
829:
824:
818:
816:
807:
801:
800:
798:
797:
792:
787:
782:
777:
772:
767:
762:
757:
752:
747:
742:
737:
732:
727:
722:
717:
712:
707:
702:
697:
692:
687:
682:
677:
672:
667:
662:
657:
652:
647:
642:
637:
632:
627:
622:
617:
612:
607:
602:
597:
592:
587:
582:
577:
572:
567:
562:
557:
552:
547:
542:
537:
532:
531:
530:
520:
515:
510:
504:
502:
498:
497:
494:IEEE standards
492:
490:
489:
482:
475:
467:
461:
460:
453:
452:External links
450:
447:
446:
428:
419:|journal=
392:
360:
359:
357:
354:
353:
352:
347:
341:
335:
328:
325:
314:CVE identifier
304:
301:
296:
295:
292:
285:
271:
270:
267:
264:
256:
253:
213:
210:
163:
160:
117:
116:
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
1828:
1827:
1816:
1813:
1812:
1810:
1795:
1792:
1790:
1787:
1785:
1782:
1781:
1778:
1772:
1769:
1767:
1764:
1762:
1759:
1757:
1754:
1752:
1749:
1747:
1744:
1742:
1739:
1738:
1736:
1732:
1726:
1723:
1721:
1718:
1716:
1713:
1711:
1708:
1706:
1703:
1702:
1700:
1696:
1686:
1683:
1681:
1678:
1676:
1673:
1671:
1668:
1666:
1663:
1661:
1658:
1656:
1653:
1651:
1648:
1646:
1643:
1641:
1638:
1636:
1633:
1630:
1626:
1623:
1621:
1618:
1616:
1613:
1610:
1606:
1603:
1602:
1600:
1598:
1594:
1587:
1583:
1582:
1578:
1575:
1572:
1569:
1566:
1563:
1559:
1558:
1554:
1551:
1548:
1546:
1543:
1540:
1537:
1535:
1532:
1529:
1525:
1524:
1520:
1517:
1514:
1512:
1509:
1507:
1504:
1502:
1499:
1497:
1494:
1491:
1488:
1484:
1481:
1478:
1474:
1473:
1469:
1466:
1464:
1461:
1459:
1456:
1454:
1451:
1449:
1446:
1444:
1441:
1439:
1436:
1434:
1431:
1429:
1426:
1423:
1419:
1418:
1414:
1412:
1409:
1407:
1404:
1402:
1399:
1397:
1394:
1392:
1389:
1387:
1384:
1382:
1379:
1377:
1374:
1372:
1369:
1367:
1364:
1362:
1359:
1357:
1354:
1352:
1349:
1348:
1346:
1343:
1338:
1334:
1328:
1325:
1323:
1320:
1318:
1315:
1313:
1310:
1308:
1305:
1303:
1300:
1298:
1295:
1293:
1290:
1288:
1285:
1283:
1280:
1278:
1275:
1273:
1270:
1268:
1265:
1263:
1260:
1258:
1255:
1253:
1250:
1248:
1245:
1243:
1240:
1238:
1235:
1233:
1230:
1228:
1225:
1223:
1220:
1218:
1215:
1213:
1210:
1208:
1205:
1203:
1200:
1198:
1195:
1193:
1190:
1188:
1185:
1183:
1182:
1178:
1176:
1173:
1171:
1168:
1166:
1163:
1161:
1158:
1156:
1155:
1151:
1149:
1146:
1144:
1141:
1139:
1136:
1134:
1131:
1129:
1128:
1124:
1122:
1119:
1117:
1114:
1112:
1109:
1107:
1104:
1102:
1099:
1097:
1094:
1092:
1089:
1087:
1084:
1082:
1079:
1077:
1074:
1072:
1069:
1067:
1064:
1062:
1059:
1057:
1054:
1052:
1049:
1048:
1046:
1043:
1038:
1034:
1028:
1025:
1022:
1018:
1015:
1013:
1010:
1008:
1005:
1003:
1000:
998:
995:
993:
990:
988:
985:
983:
980:
978:
975:
973:
970:
968:
965:
963:
960:
958:
955:
953:
950:
948:
945:
943:
940:
938:
935:
933:
930:
928:
925:
924:
922:
920:
916:
910:
907:
905:
902:
900:
897:
895:
892:
890:
887:
885:
882:
878:
877:WiMAX · d · e
875:
874:
873:
870:
868:
865:
863:
860:
858:
855:
853:
850:
848:
845:
843:
840:
838:
835:
833:
830:
828:
825:
823:
820:
819:
817:
815:
811:
808:
806:
802:
796:
793:
791:
788:
786:
783:
781:
778:
776:
773:
771:
768:
766:
763:
761:
758:
756:
753:
751:
748:
746:
743:
741:
738:
736:
733:
731:
728:
726:
723:
721:
718:
716:
713:
711:
708:
706:
703:
701:
698:
696:
693:
691:
688:
686:
683:
681:
678:
676:
673:
671:
668:
666:
663:
661:
658:
656:
653:
651:
648:
646:
643:
641:
638:
636:
633:
631:
628:
626:
623:
621:
618:
616:
613:
611:
608:
606:
603:
601:
598:
596:
593:
591:
588:
586:
583:
581:
578:
576:
573:
571:
568:
566:
563:
561:
558:
556:
553:
551:
548:
546:
543:
541:
538:
536:
533:
529:
526:
525:
524:
521:
519:
516:
514:
511:
509:
506:
505:
503:
499:
495:
488:
483:
481:
476:
474:
469:
468:
465:
459:
456:
455:
451:
442:
438:
432:
429:
424:
411:
403:
396:
393:
382:on 2022-09-14
381:
377:
376:
371:
365:
362:
355:
351:
348:
345:
342:
339:
336:
334:
331:
330:
326:
324:
322:
317:
315:
311:
302:
300:
293:
290:
286:
283:
280:
279:
278:
276:
268:
265:
262:
261:
260:
254:
252:
250:
246:
242:
238:
234:
229:
227:
223:
219:
211:
209:
207:
206:voice over IP
202:
198:
196:
192:
188:
184:
180:
176:
171:
169:
161:
159:
157:
153:
152:
147:
143:
139:
135:
131:
127:
123:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
1783:
1579:
1555:
1521:
1470:
1432:
1415:
1179:
1152:
1125:
440:
431:
410:cite journal
395:
384:. Retrieved
380:the original
373:
364:
344:IEEE 802.11u
338:IEEE 802.11s
318:
306:
297:
272:
258:
248:
230:
215:
203:
199:
178:
174:
172:
165:
155:
149:
146:access point
145:
142:base station
141:
137:
129:
125:
121:
120:
105:
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
1815:IEEE 802.11
1356:legacy mode
441:hashcat.net
134:IEEE 802.11
1734:Superseded
805:802 series
386:2022-09-14
356:References
69:newspapers
1609:Bluetooth
193:(QoS) or
1809:Category
1784:See also
1741:754-1985
1698:Proposed
1042:Ethernet
528:Revision
327:See also
303:Problems
99:May 2018
1725:P1906.1
1586:Wi-Fi 8
1562:Wi-Fi 7
1528:Wi-Fi 6
1477:Wi-Fi 5
1422:Wi-Fi 4
501:Current
321:Hashcat
289:802.11i
233:802.11i
226:802.11e
191:802.11e
183:802.11i
175:Station
156:roaming
151:handoff
83:scholar
1629:Zigbee
1597:802.15
1337:802.11
575:1149.1
282:802.1X
275:802.1X
241:RADIUS
237:802.1X
187:802.1X
85:
78:
71:
64:
56:
1720:P1823
1715:P1699
1710:P1619
1705:P1363
1487:WiGig
1351:-1997
1342:Wi-Fi
1051:-1983
1037:802.3
919:802.1
795:42010
790:29148
785:16326
780:16085
775:14764
770:12207
765:11073
310:KRACK
185:with
177:, or
168:Wi-Fi
90:JSTOR
76:books
1771:1471
1766:1364
1761:1362
1756:1233
1751:1219
1021:LACP
760:2050
755:2030
750:1905
745:1904
740:1902
735:1901
730:1900
725:1855
720:1850
715:1849
710:1815
705:1801
700:1800
695:1733
690:1722
685:1685
680:1675
675:1667
670:1666
665:1619
660:1613
655:1603
650:1596
645:1588
640:1584
635:1547
630:1541
625:1516
620:1497
615:1451
610:1394
605:1355
600:1284
595:1278
590:1275
585:1164
580:1154
570:1076
565:1016
560:1014
555:1003
423:help
375:IEEE
222:RSVP
154:and
62:news
1746:830
1670:.4z
1665:.4g
1660:.4f
1655:.4e
1650:.4d
1645:.4c
1640:.4b
1635:.4a
962:Qbb
957:Qaz
952:Qay
947:Qat
942:Qav
909:.24
904:.22
899:.21
894:.20
889:.18
884:.17
872:.16
867:.14
862:.12
857:.10
814:802
550:896
545:829
540:828
535:854
523:754
518:730
513:693
508:488
179:STA
124:or
45:by
1811::
1685:.7
1680:.6
1675:.5
1625:.4
1620:.3
1615:.2
1605:.1
1581:bn
1576:bk
1573:bi
1570:bh
1567:bf
1557:be
1552:bd
1549:bc
1545:bb
1541:ba
1538:az
1534:ay
1523:ax
1518:aq
1515:ak
1511:aj
1506:ai
1501:ah
1496:af
1492:ae
1483:ad
1472:ac
1467:aa
1327:df
1322:de
1317:dd
1312:db
1307:da
1302:cz
1297:cy
1292:cx
1287:cw
1282:cv
1277:cu
1272:ct
1267:cs
1262:cr
1257:cq
1252:cp
1247:cn
1242:cm
1237:ck
1232:ch
1227:cg
1222:ce
1217:cd
1212:cc
1207:cb
1202:ca
1197:bz
1192:by
1187:bu
1181:bt
1175:ba
1170:az
1165:av
1160:au
1154:at
1148:aq
1143:an
1138:ak
1133:ah
1127:af
1121:ae
1116:ad
1111:ac
1106:ab
1027:BA
1017:AX
1012:AS
1007:aq
1002:ak
997:ah
992:ag
987:AE
982:ad
977:AB
852:.9
847:.8
842:.7
837:.6
832:.5
827:.4
822:.2
439:.
414::
412:}}
408:{{
372:.
130:FT
1631:)
1627:(
1611:)
1607:(
1588:)
1584:(
1564:)
1560:(
1530:)
1526:(
1489:)
1485:(
1479:)
1475:(
1463:z
1458:y
1453:w
1448:v
1443:u
1438:s
1433:r
1428:p
1424:)
1420:(
1417:n
1411:k
1406:j
1401:i
1396:h
1391:g
1386:f
1381:e
1376:d
1371:c
1366:b
1361:a
1344:)
1340:(
1101:z
1096:y
1091:x
1086:u
1081:j
1076:i
1071:e
1066:d
1061:b
1056:a
1044:)
1040:(
1023:)
1019:(
972:X
967:w
937:Q
932:p
927:D
486:e
479:t
472:v
443:.
425:)
421:(
404:.
389:.
308:(
128:(
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.