Knowledge (XXG)

IEEE 802.11r-2008

Source 📝

181:) is entirely in charge of deciding when to transition and to which BSS it wishes to transition. In the early days of 802.11, transition was a much simpler task for the client device. Only four messages were required for the device to establish a connection with a new BSS (five if counting the optional "I'm leaving" message (deauthentication and disassociation frame) the client could send to the old access point). However, as additional features were added to the standard, including 197:(WMM) with admission control requests, the number of messages required went up dramatically. During the time these additional messages are being exchanged, the mobile device's traffic, including that from voice calls, cannot proceed, and the loss experienced by the user could amount to several seconds. Generally, the highest amount of delay or loss that the edge network should introduce into a voice call is 50 ms. 25: 170:, is widely used for wireless local area communications. Many deployed implementations have effective ranges of only a few dozen meters, so, to maintain communications, devices in motion that use it will need to transition from one access point to another. In an automotive environment, this could easily result in a transition every five to ten seconds. 247:(EAP) on every transition, a time-consuming process. The solution is to allow for the part of the key derived from the server to be cached in the wireless network, so that a reasonable number of future connections can be based on the cached key, avoiding the 802.1X process. A feature known as 200:
802.11r was launched to attempt to undo the added burden that security and quality of service added to the transition process, and restore it to the original four-message exchange. In this way, transition problems are not eliminated, but at least are returned to the status quo ante.
370:"IEEE 802.11-2012 - IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications" 307:
In October 2017 security researchers Mathy Vanhoef (imec-DistriNet, KU Leuven) and Frank Piessens (imec-DistriNet, KU Leuven) published their paper "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2"
298:
A fast BSS transition performs the same operations except for the 802.1X negotiation, but piggybacks the PTK and QoS admission control exchanges with the 802.11 Authentication and Reassociation messages.
744: 173:
Transitions are already supported under the preexisting standard. The fundamental architecture for transition is identical for 802.11 with and without 802.11r: the client device (known as the
158:
are often used, although 802.11 transition is not a true handoff/roaming process in the cellular sense, where the process is coordinated by the base station and is generally uninterrupted.
323:) described a new technique to crack WPA2 and WPA PSK (pre-shared key) passwords that he states will likely work against all 802.11i/p/r networks with transition functions enabled. 220:(BSS) transitions between access points by redefining the security key negotiation protocol, allowing both the negotiation and requests for wireless resources (similar to 951: 1719: 484: 148:) to another performed in a nearly seamless manner. It was published on July 15, 2008. IEEE 802.11r-2008 was rolled up into 802.11-2012. The terms 401: 291:
4-way handshake of session keys, creating a unique encryption key for the association based on the master key established from the previous step.
1755: 1745: 594: 244: 208:(VOIP) via mobile phones designed to work with wireless Internet networks, instead of (or in addition to) standard cellular networks. 42: 1020: 539: 108: 251:(OKC) exists today, based on 802.11i, to perform the same task. 802.11r differs from OKC by fully specifying the key hierarchy. 89: 719: 136:
standard to permit continuous connectivity aboard wireless devices in motion, with fast and secure client transitions from one
61: 1001: 194: 46: 277:
BSS, the AP and Station have a connection, but are not allowed to exchange data frames, as they have not established a key.
976: 369: 221: 68: 477: 1385: 946: 649: 564: 544: 349: 1788: 517: 493: 75: 35: 1355: 554: 266:
Exchanging 802.11 authentication messages (first from the client, then from the AP) with the target access point.
789: 57: 1793: 654: 644: 624: 470: 966: 527: 332: 1760: 883: 619: 409: 1814: 1026: 956: 774: 704: 1669: 1664: 1659: 1654: 1649: 1644: 1639: 908: 784: 457: 312:). This paper also listed a vulnerability of common 802.11r implementations and registered the 82: 1457: 1452: 1416: 1410: 1405: 1400: 1395: 1390: 1380: 1375: 1365: 1360: 996: 826: 217: 1585: 1326: 1321: 1311: 1306: 1301: 1296: 1291: 1286: 1276: 1271: 1266: 1261: 1251: 1246: 1241: 1236: 1221: 1216: 1211: 1206: 1201: 1350: 1016: 779: 422: 1634: 764: 759: 679: 629: 313: 1808: 1740: 1684: 1679: 1674: 1624: 1619: 1614: 1604: 1580: 1556: 1544: 1533: 1522: 1510: 1505: 1500: 1495: 1482: 1471: 961: 941: 794: 769: 699: 589: 534: 205: 1724: 1714: 1462: 1447: 1442: 1437: 1427: 1370: 1011: 1006: 991: 986: 981: 931: 343: 337: 1596: 1336: 1090: 971: 936: 926: 903: 898: 893: 888: 871: 866: 856: 133: 24: 379: 1709: 1704: 1036: 918: 851: 846: 841: 836: 831: 821: 239:-based authentication, the client is required to renegotiate its key with the 436: 1770: 1750: 1608: 861: 754: 749: 734: 724: 714: 694: 689: 674: 664: 659: 639: 634: 614: 609: 604: 599: 584: 549: 1041: 813: 804: 522: 512: 507: 204:
The primary application currently envisioned for the 802.11r standard is
1765: 1561: 1527: 1476: 1421: 1316: 1281: 1256: 1231: 1226: 1196: 1191: 1186: 1180: 1174: 1169: 1164: 1159: 1153: 1147: 1142: 1137: 1132: 1126: 1120: 1115: 1110: 1105: 1050: 684: 669: 320: 288: 269:
Exchanging reassociation messages to establish connection at target AP.
232: 225: 190: 182: 150: 1628: 1100: 1095: 1085: 1080: 1075: 1070: 1065: 1060: 1055: 729: 559: 281: 274: 240: 236: 186: 1486: 1341: 876: 739: 579: 309: 167: 462: 709: 574: 569: 374: 466: 18: 402:"Metrics for Characterizing BSS Transition Time Performance" 259:
The non-802.11r BSS transition goes through six stages:
263:
Scanning – active or passive for other APs in the area.
1733: 1697: 1595: 1335: 1035: 917: 812: 803: 500: 49:. Unsourced material may be challenged and removed. 294:QoS admission control to re-establish QoS streams. 400:Wright, Charles; Polanec, Chris (2004-09-07). 319:On August 4, 2018, researcher Jens Steube (of 478: 8: 809: 485: 471: 463: 287:Pairwise transient key (PTK) derivation – 243:or other authentication server supporting 16:Amendment to the IEEE 802.11 WiFi standard 109:Learn how and when to remove this message 458:Status history for project IEEE 802.11r 361: 418: 407: 284:pairwise master key (PMK) negotiation. 140:(abbreviated BSS, and also known as a 7: 437:"New attack on WPA/WPA2 using PMKID" 47:adding citations to reliable sources 245:Extensible Authentication Protocol 14: 231:The key negotiation protocol in 23: 34:needs additional citations for 195:Wireless Multimedia Extensions 1: 216:IEEE 802.11r specifies fast 350:Inter-Access Point Protocol 162:Rationale for the amendment 1833: 1789:IEEE Standards Association 166:802.11, commonly known as 132:), is an amendment to the 1779: 249:opportunistic key caching 144:or more colloquially, an 333:Unlicensed Mobile Access 228:) to occur in parallel. 1794:Category:IEEE standards 346:- Cellular interworking 417:Cite journal requires 273:At this point in an 235:specifies that, for 43:improve this article 212:Fast BSS Transition 189:authentication and 126:fast BSS transition 58:"IEEE 802.11r-2008" 255:Protocol operation 1802: 1801: 1693: 1692: 340:- Mesh networking 218:Basic Service Set 138:Basic Service Set 122:IEEE 802.11r-2008 119: 118: 111: 93: 1822: 810: 487: 480: 473: 464: 445: 444: 433: 427: 426: 420: 415: 413: 405: 397: 391: 390: 388: 387: 378:. Archived from 366: 316:CVE-2017-13082. 114: 107: 103: 100: 94: 92: 51: 27: 19: 1832: 1831: 1825: 1824: 1823: 1821: 1820: 1819: 1805: 1804: 1803: 1798: 1775: 1729: 1689: 1591: 1339: 1331: 1039: 1031: 913: 799: 496: 491: 454: 449: 448: 435: 434: 430: 416: 406: 399: 398: 394: 385: 383: 368: 367: 363: 358: 329: 305: 257: 224:but defined in 214: 164: 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 1830: 1829: 1826: 1818: 1817: 1807: 1806: 1800: 1799: 1797: 1796: 1791: 1786: 1780: 1777: 1776: 1774: 1773: 1768: 1763: 1758: 1753: 1748: 1743: 1737: 1735: 1731: 1730: 1728: 1727: 1722: 1717: 1712: 1707: 1701: 1699: 1695: 1694: 1691: 1690: 1688: 1687: 1682: 1677: 1672: 1667: 1662: 1657: 1652: 1647: 1642: 1637: 1632: 1622: 1617: 1612: 1601: 1599: 1593: 1592: 1590: 1589: 1577: 1574: 1571: 1568: 1565: 1553: 1550: 1547: 1542: 1539: 1536: 1531: 1519: 1516: 1513: 1508: 1503: 1498: 1493: 1490: 1480: 1468: 1465: 1460: 1455: 1450: 1445: 1440: 1435: 1430: 1425: 1413: 1408: 1403: 1398: 1393: 1388: 1383: 1378: 1373: 1368: 1363: 1358: 1353: 1347: 1345: 1333: 1332: 1330: 1329: 1324: 1319: 1314: 1309: 1304: 1299: 1294: 1289: 1284: 1279: 1274: 1269: 1264: 1259: 1254: 1249: 1244: 1239: 1234: 1229: 1224: 1219: 1214: 1209: 1204: 1199: 1194: 1189: 1184: 1177: 1172: 1167: 1162: 1157: 1150: 1145: 1140: 1135: 1130: 1123: 1118: 1113: 1108: 1103: 1098: 1093: 1088: 1083: 1078: 1073: 1068: 1063: 1058: 1053: 1047: 1045: 1033: 1032: 1030: 1029: 1024: 1014: 1009: 1004: 999: 994: 989: 984: 979: 974: 969: 964: 959: 954: 949: 944: 939: 934: 929: 923: 921: 915: 914: 912: 911: 906: 901: 896: 891: 886: 881: 880: 879: 869: 864: 859: 854: 849: 844: 839: 834: 829: 824: 818: 816: 807: 801: 800: 798: 797: 792: 787: 782: 777: 772: 767: 762: 757: 752: 747: 742: 737: 732: 727: 722: 717: 712: 707: 702: 697: 692: 687: 682: 677: 672: 667: 662: 657: 652: 647: 642: 637: 632: 627: 622: 617: 612: 607: 602: 597: 592: 587: 582: 577: 572: 567: 562: 557: 552: 547: 542: 537: 532: 531: 530: 520: 515: 510: 504: 502: 498: 497: 494:IEEE standards 492: 490: 489: 482: 475: 467: 461: 460: 453: 452:External links 450: 447: 446: 428: 419:|journal= 392: 360: 359: 357: 354: 353: 352: 347: 341: 335: 328: 325: 314:CVE identifier 304: 301: 296: 295: 292: 285: 271: 270: 267: 264: 256: 253: 213: 210: 163: 160: 117: 116: 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 1828: 1827: 1816: 1813: 1812: 1810: 1795: 1792: 1790: 1787: 1785: 1782: 1781: 1778: 1772: 1769: 1767: 1764: 1762: 1759: 1757: 1754: 1752: 1749: 1747: 1744: 1742: 1739: 1738: 1736: 1732: 1726: 1723: 1721: 1718: 1716: 1713: 1711: 1708: 1706: 1703: 1702: 1700: 1696: 1686: 1683: 1681: 1678: 1676: 1673: 1671: 1668: 1666: 1663: 1661: 1658: 1656: 1653: 1651: 1648: 1646: 1643: 1641: 1638: 1636: 1633: 1630: 1626: 1623: 1621: 1618: 1616: 1613: 1610: 1606: 1603: 1602: 1600: 1598: 1594: 1587: 1583: 1582: 1578: 1575: 1572: 1569: 1566: 1563: 1559: 1558: 1554: 1551: 1548: 1546: 1543: 1540: 1537: 1535: 1532: 1529: 1525: 1524: 1520: 1517: 1514: 1512: 1509: 1507: 1504: 1502: 1499: 1497: 1494: 1491: 1488: 1484: 1481: 1478: 1474: 1473: 1469: 1466: 1464: 1461: 1459: 1456: 1454: 1451: 1449: 1446: 1444: 1441: 1439: 1436: 1434: 1431: 1429: 1426: 1423: 1419: 1418: 1414: 1412: 1409: 1407: 1404: 1402: 1399: 1397: 1394: 1392: 1389: 1387: 1384: 1382: 1379: 1377: 1374: 1372: 1369: 1367: 1364: 1362: 1359: 1357: 1354: 1352: 1349: 1348: 1346: 1343: 1338: 1334: 1328: 1325: 1323: 1320: 1318: 1315: 1313: 1310: 1308: 1305: 1303: 1300: 1298: 1295: 1293: 1290: 1288: 1285: 1283: 1280: 1278: 1275: 1273: 1270: 1268: 1265: 1263: 1260: 1258: 1255: 1253: 1250: 1248: 1245: 1243: 1240: 1238: 1235: 1233: 1230: 1228: 1225: 1223: 1220: 1218: 1215: 1213: 1210: 1208: 1205: 1203: 1200: 1198: 1195: 1193: 1190: 1188: 1185: 1183: 1182: 1178: 1176: 1173: 1171: 1168: 1166: 1163: 1161: 1158: 1156: 1155: 1151: 1149: 1146: 1144: 1141: 1139: 1136: 1134: 1131: 1129: 1128: 1124: 1122: 1119: 1117: 1114: 1112: 1109: 1107: 1104: 1102: 1099: 1097: 1094: 1092: 1089: 1087: 1084: 1082: 1079: 1077: 1074: 1072: 1069: 1067: 1064: 1062: 1059: 1057: 1054: 1052: 1049: 1048: 1046: 1043: 1038: 1034: 1028: 1025: 1022: 1018: 1015: 1013: 1010: 1008: 1005: 1003: 1000: 998: 995: 993: 990: 988: 985: 983: 980: 978: 975: 973: 970: 968: 965: 963: 960: 958: 955: 953: 950: 948: 945: 943: 940: 938: 935: 933: 930: 928: 925: 924: 922: 920: 916: 910: 907: 905: 902: 900: 897: 895: 892: 890: 887: 885: 882: 878: 877:WiMAX · d · e 875: 874: 873: 870: 868: 865: 863: 860: 858: 855: 853: 850: 848: 845: 843: 840: 838: 835: 833: 830: 828: 825: 823: 820: 819: 817: 815: 811: 808: 806: 802: 796: 793: 791: 788: 786: 783: 781: 778: 776: 773: 771: 768: 766: 763: 761: 758: 756: 753: 751: 748: 746: 743: 741: 738: 736: 733: 731: 728: 726: 723: 721: 718: 716: 713: 711: 708: 706: 703: 701: 698: 696: 693: 691: 688: 686: 683: 681: 678: 676: 673: 671: 668: 666: 663: 661: 658: 656: 653: 651: 648: 646: 643: 641: 638: 636: 633: 631: 628: 626: 623: 621: 618: 616: 613: 611: 608: 606: 603: 601: 598: 596: 593: 591: 588: 586: 583: 581: 578: 576: 573: 571: 568: 566: 563: 561: 558: 556: 553: 551: 548: 546: 543: 541: 538: 536: 533: 529: 526: 525: 524: 521: 519: 516: 514: 511: 509: 506: 505: 503: 499: 495: 488: 483: 481: 476: 474: 469: 468: 465: 459: 456: 455: 451: 442: 438: 432: 429: 424: 411: 403: 396: 393: 382:on 2022-09-14 381: 377: 376: 371: 365: 362: 355: 351: 348: 345: 342: 339: 336: 334: 331: 330: 326: 324: 322: 317: 315: 311: 302: 300: 293: 290: 286: 283: 280: 279: 278: 276: 268: 265: 262: 261: 260: 254: 252: 250: 246: 242: 238: 234: 229: 227: 223: 219: 211: 209: 207: 206:voice over IP 202: 198: 196: 192: 188: 184: 180: 176: 171: 169: 161: 159: 157: 153: 152: 147: 143: 139: 135: 131: 127: 123: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 1783: 1579: 1555: 1521: 1470: 1432: 1415: 1179: 1152: 1125: 440: 431: 410:cite journal 395: 384:. Retrieved 380:the original 373: 364: 344:IEEE 802.11u 338:IEEE 802.11s 318: 306: 297: 272: 258: 248: 230: 215: 203: 199: 178: 174: 172: 165: 155: 149: 146:access point 145: 142:base station 141: 137: 129: 125: 121: 120: 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 1815:IEEE 802.11 1356:legacy mode 441:hashcat.net 134:IEEE 802.11 1734:Superseded 805:802 series 386:2022-09-14 356:References 69:newspapers 1609:Bluetooth 193:(QoS) or 1809:Category 1784:See also 1741:754-1985 1698:Proposed 1042:Ethernet 528:Revision 327:See also 303:Problems 99:May 2018 1725:P1906.1 1586:Wi-Fi 8 1562:Wi-Fi 7 1528:Wi-Fi 6 1477:Wi-Fi 5 1422:Wi-Fi 4 501:Current 321:Hashcat 289:802.11i 233:802.11i 226:802.11e 191:802.11e 183:802.11i 175:Station 156:roaming 151:handoff 83:scholar 1629:Zigbee 1597:802.15 1337:802.11 575:1149.1 282:802.1X 275:802.1X 241:RADIUS 237:802.1X 187:802.1X 85:  78:  71:  64:  56:  1720:P1823 1715:P1699 1710:P1619 1705:P1363 1487:WiGig 1351:-1997 1342:Wi-Fi 1051:-1983 1037:802.3 919:802.1 795:42010 790:29148 785:16326 780:16085 775:14764 770:12207 765:11073 310:KRACK 185:with 177:, or 168:Wi-Fi 90:JSTOR 76:books 1771:1471 1766:1364 1761:1362 1756:1233 1751:1219 1021:LACP 760:2050 755:2030 750:1905 745:1904 740:1902 735:1901 730:1900 725:1855 720:1850 715:1849 710:1815 705:1801 700:1800 695:1733 690:1722 685:1685 680:1675 675:1667 670:1666 665:1619 660:1613 655:1603 650:1596 645:1588 640:1584 635:1547 630:1541 625:1516 620:1497 615:1451 610:1394 605:1355 600:1284 595:1278 590:1275 585:1164 580:1154 570:1076 565:1016 560:1014 555:1003 423:help 375:IEEE 222:RSVP 154:and 62:news 1746:830 1670:.4z 1665:.4g 1660:.4f 1655:.4e 1650:.4d 1645:.4c 1640:.4b 1635:.4a 962:Qbb 957:Qaz 952:Qay 947:Qat 942:Qav 909:.24 904:.22 899:.21 894:.20 889:.18 884:.17 872:.16 867:.14 862:.12 857:.10 814:802 550:896 545:829 540:828 535:854 523:754 518:730 513:693 508:488 179:STA 124:or 45:by 1811:: 1685:.7 1680:.6 1675:.5 1625:.4 1620:.3 1615:.2 1605:.1 1581:bn 1576:bk 1573:bi 1570:bh 1567:bf 1557:be 1552:bd 1549:bc 1545:bb 1541:ba 1538:az 1534:ay 1523:ax 1518:aq 1515:ak 1511:aj 1506:ai 1501:ah 1496:af 1492:ae 1483:ad 1472:ac 1467:aa 1327:df 1322:de 1317:dd 1312:db 1307:da 1302:cz 1297:cy 1292:cx 1287:cw 1282:cv 1277:cu 1272:ct 1267:cs 1262:cr 1257:cq 1252:cp 1247:cn 1242:cm 1237:ck 1232:ch 1227:cg 1222:ce 1217:cd 1212:cc 1207:cb 1202:ca 1197:bz 1192:by 1187:bu 1181:bt 1175:ba 1170:az 1165:av 1160:au 1154:at 1148:aq 1143:an 1138:ak 1133:ah 1127:af 1121:ae 1116:ad 1111:ac 1106:ab 1027:BA 1017:AX 1012:AS 1007:aq 1002:ak 997:ah 992:ag 987:AE 982:ad 977:AB 852:.9 847:.8 842:.7 837:.6 832:.5 827:.4 822:.2 439:. 414:: 412:}} 408:{{ 372:. 130:FT 1631:) 1627:( 1611:) 1607:( 1588:) 1584:( 1564:) 1560:( 1530:) 1526:( 1489:) 1485:( 1479:) 1475:( 1463:z 1458:y 1453:w 1448:v 1443:u 1438:s 1433:r 1428:p 1424:) 1420:( 1417:n 1411:k 1406:j 1401:i 1396:h 1391:g 1386:f 1381:e 1376:d 1371:c 1366:b 1361:a 1344:) 1340:( 1101:z 1096:y 1091:x 1086:u 1081:j 1076:i 1071:e 1066:d 1061:b 1056:a 1044:) 1040:( 1023:) 1019:( 972:X 967:w 937:Q 932:p 927:D 486:e 479:t 472:v 443:. 425:) 421:( 404:. 389:. 308:( 128:( 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"IEEE 802.11r-2008"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
IEEE 802.11
handoff
Wi-Fi
802.11i
802.1X
802.11e
Wireless Multimedia Extensions
voice over IP
Basic Service Set
RSVP
802.11e
802.11i
802.1X
RADIUS
Extensible Authentication Protocol
802.1X
802.1X
802.11i
KRACK

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.