Three, summary of the invention
1, technical problem
The objective of the invention is to propose a kind of wireless LAN safety connection control method at IEEE 802.11 standards, the enhancement mode safety access control scheme that proposes among the TGi Draft 3.0 that the method is not only compatible, and in conjunction with the existing function of IEEE 802.11 standards, feasible more convenient to the improvement of existing equipment, reduced new safe access control scheme simultaneously to comprising the influence of the original performance of wireless local area networks in roaming in.
2, technical scheme
The wireless LAN safety connection control method of the present invention's design comprises authentication, key management and mandate three parts on function.Authentication function has realized the mutual authentication between terminal workstation (STA) and the access point (AP), mainly realizes by the mutual authentication of STA and certificate server (AS) and the trusting relationship between AS and the AP; Key management functions refers to that the dynamic key based on authentication is consulted and encryption key distribution between STA and the AP; Authorization function refers to that AP inserts request responding to STA, if set up security association between AP and the STA, then authorizes STA to insert, otherwise the access request of refusal STA.Relate generally to four kinds of equipment in the WLAN (wireless local area network) in the method: the STA of terminal workstation, access point AP, access controller (AC) and certificate server AS.STA is a mobile subscriber terminal equipment, has realized the safe access control function of user side; AP is the supplier of WLAN (wireless local area network) access service, has realized the authorization function and the key management functions of safe access control; AS is a certificate server equipment, and the authentication function of server side safety access control is provided; AC is between AP and the AS, is used for registering once authentication AS to the authentication result of STA and the security association information between STA and the AP.
Wireless LAN safety connection control method of the present invention is characterised in that: when the STA that does not set up security association with any AP enters in a certain AP service range, STA and AP connect and consult security performance, send the request of setting up security association to AP by STA subsequently; Adopt IEEE 802.1x authentication protocol that STA is authenticated by certificate server AS, if authentification failure, the request of setting up security association of AS notice AP refusal STA; If authentication success has been consulted reciprocity master key (PMK) between STA and AS, AS sends to related information and the PMK information that access controller AC registers corresponding STA with PMK; Again PMK is sent to AP by AC, adopt IEEE 802.1x IKMP between STA and the AP according to PMK dynamic negotiation equity temporary key (PTK) and assign group temporary key (GTK); If key agreement is finished, by AP by sending the access of the response message mandate STA that successfully sets up security association.When STA enters another AP service range in the AP service range of setting up security association, STA and new AP connect and consult security performance, send the request that rebulids security association to new AP by STA subsequently; New AP request AC upgrades the related information of corresponding STA and obtains corresponding PMK information; Adopt IEEE 802.1x IKMP according to the new PTK of PMK dynamic negotiation with distribute new GTK between STA and the new AP; If key agreement is finished, by new AP by sending the access of the response message mandate STA that successfully sets up security association.
Whole safe access control process comprises three phases: connect with the security performance negotiation, set up security association and rebulid security association.
Phase I: connect and the security performance negotiation.It is characterized in that: by STA broadcasting connection request, the AP of region sends to STA and connects response message, and states 802.1x authentication and all data guard methods of being supported in response message; STA sends the open system authentication request message of IEEE 802.11 to the AP that connects; AP sends the open system authentication response message of IEEE 802.11 to the SFA that connects; By IEEE 802.11 open system authentication, STA sends the request of setting up security association to AP, and 802.1x authentication and selected data guard method are supported in statement in the security association request message.Be through with thus and connect and stage that security performance is consulted.
The concrete steps feature is as follows:
(1) STA broadcasting connection request message.In IEEE 802.11 standards, stipulated the connection request that management frames ProbeRequest message is used to broadcast STA.
(2) AP sends to STA and connects response message.After AP receives connection request message,, then send the connection response message, and in message, state the RSN information unit if allow STA to connect with it.Stipulated in IEEE 802.11 standards that management frames Probe Response message is used to reply the Probe Request message of STA.The RSN information unit is according to the prescribed form statement 802.1x that AP supported authentication and all data guard methods of TGi draft.
(3) STA sends the open system authentication request message of IEEE 802.11 to AP.
(4) AP sends the open system authentication response message of IEEE 802.11 to STA.Be original regulation in the compatible IEEE802.11 standard, increased this two authentication messages.Support open system authentication and shared key authentication in the primary standard, be forced to open system authentication in the method for the invention.
(5) STA sends the security association request message to AP.If passed through IEEE 802.11 open system authentication, STA sends the security association request message, and states the RSN information unit in message.Stipulated in IEEE 802.11 standards that management frames Association Request message is used to send the security association request.The RSN information unit is according to the prescribed form statement STA support 802.1x authentication of TGi draft with according to data guard method selected in the data guard method that AP provided.
Second stage: set up security association.It is characterized in that: after AP receives the security association request of STA, send the 802.1x authentication request message to AC, request AC adopts the 802.1x authentication protocol, utilize AS that STA is authenticated, if authentication success will be set up mutual trusting relationship between AS and STA, and will set up reciprocity master key PMK, according to by the AS, the AC that have wire protocol to guarantee and the relation of the mutual trust between the AP, realized the mutual authentication between AP and the STA again; AS sends to AC with the PMK of STA, behind the related information and PMK information of AC registration STA, PMK is sent to AP; AP receives four way handshake protocols that adopt the 802.1x IKMP behind the PMK, consults reciprocity temporary key PTK between STA and AP; AP is again by group key distributorship agreement assign group temporary key GTK; If above 802.1x authentication and IKMP success, AP sends security association successful respond message to STA, otherwise AP sends security association failure response message to STA.Be through with thus and set up the stage of security association.
The concrete steps feature is as follows:
(6) AP sends the 802.1x authentication request message to AC.AP adopts the EAPOL-Start message of stipulating in the IEEE 802.1x agreement to initiate the 802.1x authentication protocol.
(7) STA, AC and AS realize 802.1x authentication protocol process.At this moment, STA is that applicant Supplicant, AC in the 802.1x agreement are certificate server for authenticator Authenticator, AS.AP transmits the 802.1x authentication protocol message between AC and the STA.The IEEE802.1x standard code 802.1x authentication protocol process.If the 802.1x authentification failure,
(8 ') AS sends authentification failure message to AC.According to the regulation of 802.1x agreement, if authentification failure, certificate server will send authentification failure message to the authenticator.
(9 ') AC sends authentification failure message to AP.802.1x being used for AC, the EAPOL-Logoff message of agreement regulation sends authentification failure message to AP.
(10 ') AP sends security association failure response message to STA.Stipulated in IEEE 802.11 standards that management frames Association Response is used to send the security association response message.If the 802.1x authentication success,
(8) AS sends PMK to AC, related information and the PMK information of AC registration STA.AS sends PMK by EAP Accept message in the 802.1x agreement to AC.PMK and the related information of AC registration STA, wherein related information refers to that current and STA sets up the information of the AP of security association.
(9) AC sends PMK to AP.AC transmits the PMK of STA by the secure tunnel of setting up between AP and the AC.Secure tunnel between AP and the AC is set up and can be relied on and wired 802.1x agreement, and this moment, AP was that applicant, AC are that authenticator, AS are certificate server.
(10) AP and STA realize the 802.11x IKMP.The TGi draft specifies 802.1x IKMP between AP and the STA, promptly four way handshake protocols are consulted reciprocity temporary key PTK between STA and AP.
(11) AP and STA realize the group key distributorship agreement.The TGi draft specifies group key distributorship agreement between AP and the STA, be used for AP to STA assign group temporary key GTK.
(12) AP sends the security association response message to STA.Stipulated in IEEE 802.11 standards that management frames Association Response message is used to send security association and replys.If four way handshake protocols and the success of group key distributorship agreement, AP sends the access of security association successful respond authorization of messages STA to STA, otherwise sends the access of security association failure response message refusal STA.
Phase III: rebulid security association.It is characterized in that: under roaming condition, when STA enters AP in the AP service range of setting up security association
*Service range in the time, the access point that STA needs handover to be associated.STA and AP
*Step by the phase I connects and consults security performance, and different is that STA is to AP
*The security association request that sends is the request that rebulids security association; Receive the AP that rebulids the security association request
*Request AC upgrades the related information of corresponding STA, and obtains the PMK of STA; STA and AP
*Between adopt 802.1x IKMP dynamic negotiation PTK
*The GTK new with distribution
*If key agreement is finished, by AP
*Rebulid the access of the response message mandate STA of security association by transmission.STA and AP thus are through with
*Rebulid the stage of security association.
The concrete steps feature is as follows:
(13) STA enters AP
*Completing steps after the service range (1)~(4), wherein AP changes into AP
*
(14) STA is to AP
*Transmission rebulids the request message of security association.If passed through the IEEE802.11 open system authentication, STA sends the security association request message, and states the RSN information unit in message.Stipulated in IEEE 802.11 standards that management frames ReassociationRequest message is used for sending the security association request that rebulids.The RSN information unit is according to the prescribed form statement STA support 802.1x authentication of TGi draft with according to AP
*The data guard method of selecting in the data guard method that is provided.
(15) AP
*Send the request of upgrading the STA security association information to AC.AP
*After receiving that STA rebulids the security association request message, request AC is updated to STA and AP with the STA security association information
*Set up security association.
(16) completing steps (9)~(11), wherein AP changes into AP
*, PTK, GTK become PTK
*, GTK
*
(17) AP
*Send the response message that rebulids security association to STA.Having stipulated in IEEE 802.11 standards that management frames Reassociation Response message is used to send rebulids replying of security association.If four way handshake protocols and the success of group key distributorship agreement, AP
*Rebulid the access that security association is successfully answered authorization of messages STA to the STA transmission, otherwise send the access that rebulids security association failure response message refusal STA.
3, beneficial effect
The present invention compared with prior art has the following advantages:
The present invention on the basis of analysing in depth IEEE 802.11 standards and draft, not only compatible original access control scheme, and utilized the state transitions relation of former scheme, make new departure and original scheme organic must in conjunction with.The present invention program is from realizing the angle of whole wireless LAN safety access control system, added the access controller of realizing distribution service in the wired network side, not only implemented in the former agreement regulation, and more succinct roaming scheme is provided distribution service.Utilize access controller to realize the function of the authenticator modules of IEEE 802.1x, also reduced the hardware complexity of access point to a certain extent.Consider that the 802.1x access control protocol has the fail safe of enhancing, the present invention program has adopted this agreement that draft proposes.
Three phases described in the present invention has constituted the secure access control method that STA once authenticates.Wherein phase I and second stage have been finished the security control process that inserts first that STA comprises authentication, security control process that the phase III has been inserted when then having finished the handover of roaming under STA access conditions.Enrollment mechanism by AC, phase III AP directly obtains PMK from AC, and needn't carry out the verification process of unpredictable time delay again to STA, thus make the time delay that handover caused of STA roaming in predictable scope, be unlikely to communication quality to STA and cause significantly and descend.What particularly point out is that STA can switch to AP from AP
*Finish the phase III before, when with AP
*Set up disconnect again after the security association with AP be connected the seamless switching when assurance is distinguished more.
AC that introduces among the present invention and AP have constituted access control system jointly, and software is realized the role of authenticator in the 802.1x authentication protocol on AC, not only reduced the hardware complexity of AP, and provide solution based on IEEE 802.1x agreement for AP and AC set up secure tunnel.This point really is the maximum difference of this method and TGi draft.In addition, making full use of original association service in IEEE 802.11 agreements, propose 802.1x authentication protocol, four way handshake protocols and group key distributorship agreement are included in the process of setting up security association, also is the improvement to the TGi draft.
In addition, adopt four way handshake protocols of 802.1x authentication protocol and 802.1x key management, strengthened the security intensity of authentication and key management, realized dynamic encryption key distribution, and allow not revise under the prerequisite of existing standard MAC layer and introduce stronger certificate scheme, promptly under IP layer on the MAC layer, also be that logic link control (LLC) layer is realized agreement, so not only avoided existing MAC layer hardware technology done too big change, and strengthened the flexibility and the extensibility of authentication and key managing project, be convenient to select the authentication protocol of safety and reliability.
Five, embodiment
The invention will be further described below in conjunction with the accompanying drawing illustrated embodiment:
Wireless LAN safety connection control method of the present invention is characterised in that: when the STA that does not set up security association with any AP enters in a certain AP service range, STA and AP connect and consult security performance, send the request of setting up security association to AP by STA subsequently; Adopt IEEE 802.1x authentication protocol that STA is authenticated by certificate server AS, if authentification failure, the request of setting up security association of AS notice AP refusal STA; If authentication success has been consulted reciprocity master key (PMK) between STA and AS, AS sends to related information and the PMK information that access controller AC registers corresponding STA with PMK; Again PMK is sent to AP by AC, adopt IEEE 802.1x IKMP between STA and the AP according to PMK dynamic negotiation equity temporary key (PTK) and assign group temporary key (GTK); If key agreement is finished, by AP by sending the access of the response message mandate STA that successfully sets up security association.When STA enters another AP service range in the AP service range of setting up security association, STA and new AP connect and consult security performance, send the request that rebulids security association to new AP by STA subsequently; New AP request AC upgrades the related information of corresponding STA and obtains corresponding PMK information; Adopt IEEE 802.1x IKMP according to the new PTK of PMK dynamic negotiation with distribute new GTK between STA and the new AP; If key agreement is finished, by new AP by sending the access of the response message mandate STA that successfully sets up security association.
Whole safe access control process comprises three phases: connect with the security performance negotiation, set up security association and rebulid security association.
Phase I: connect and the security performance negotiation.It is characterized in that: by STA broadcasting connection request, the AP of region sends to STA and connects response message, and states 802.1x authentication and all data guard methods of being supported in response message; STA sends the open system authentication request message of IEEE 802.11 to the AP that connects; AP sends the open system authentication response message of IEEE 802.11 to the STA that connects; By IEEE 802.11 open system authentication, STA sends the request of setting up security association to AP, and 802.1x authentication and selected data guard method are supported in statement in the security association request message.Be through with thus and connect and stage that security performance is consulted.
Second stage: set up security association.It is characterized in that: after AP receives the security association request of STA, send the 802.1x authentication request message to AC, request AC adopts the 802.1x authentication protocol, utilize AS that STA is authenticated, if authentication success will be set up mutual trusting relationship between AS and STA, and will set up reciprocity master key PMK, according to by the AS, the AC that have wire protocol to guarantee and the relation of the mutual trust between the AP, realized the mutual authentication between AP and the STA again; AS sends to AC with the PMK of STA, behind the related information and PMK information of AC registration STA, PMK is sent to AP; AP receives four way handshake protocols that adopt the 802.1x IKMP behind the PMK, consults reciprocity temporary key PTK between STA and AP; AP is again by group key distributorship agreement assign group temporary key GTK; If above 802.1x authentication and IKMP success, AP sends security association successful respond message to STA, otherwise AP sends security association failure response message to STA.Be through with thus and set up the stage of security association.
Phase III: rebulid security association.It is characterized in that: under roaming condition, when STA enters AP in the AP service range of setting up security association
*Service range in the time, the access point that STA needs handover to be associated.STA and AP
*Step by the phase I connects and consults security performance, and different is that STA is to AP
*The security association request that sends is the request that rebulids security association; Receive the AP that rebulids the security association request
*Request AC upgrades the related information of corresponding STA, and obtains the PMK of STA; STA and AP
*Between adopt 802.1x IKMP dynamic negotiation PTK
*The GTK new with distribution
*If key agreement is finished, by AP
*Rebulid the access of the response message mandate STA of security association by transmission.STA and AP thus are through with
*Rebulid the stage of security association.
The embodiment of the invention relates to two parts network, i.e. the Access Network of the WLAN (wireless local area network) of STA and AP composition and AP, AC, AS and gateway composition.AP is bearing the effect of bridge joint as the interface of WLAN (wireless local area network) and Access Network, therefore can realize the link level access control function to STA.AC is as the interface of Access Network and the Internet, bearing the access control function of network level, but be mainly used in the authenticator and the security association information of registration STA and the function of PMK that realize the 802.1x authentication protocol in the present invention, realized distribution and association service in the IEEE802.11 standard.AS can be the local authentication server in the Access Network as certificate server or be in remote authentication server in the Internet, generally adopt radius protocol or Diameter.Therefore, STA, AP, AC and AS have constituted tree-shaped device relationships figure.
Fig. 3 and Fig. 4 have showed the message flow of embodiment three phases, have realized secure access control method of the present invention.Corresponding protocols message below in the message flow makes introductions all round:
(1) connection request: IEEE 802.11 Probe Request;
(2) connection is replied+RSN information unit: IEEE 802.11 Probe Response+RSNIE;
(3) 802.11 open system authentication (request): IEEE 802.11 Open Authentication (Request);
(4) 802.11 open system authentication (replying): IEEE 802.11 Open Authentication (Response);
(5) security association request+RSN information unit: IEEE 802.11 AssociationRequest+RSN IE;
(6) 802.1x request: IEEE 802.1x EAPOL-Start;
(7) 802.1x authentication protocol: IEEE 802.1x/EAP;
(8) the 802.1x failure is replied: IEEE 802.1xEAPOL-Logoff;
(9) 802.1x IKMP: TGi Draft 3.0 4-way handshake;
(10) 802.1x group key distributorship agreement: TGi Draft 3.0 Group Key delivery;
(11) security association is replied (success): IEEE 802.11 Association Response (Success);
(12) security association is replied (failure): IEEE 802.11 Association Response (Failure);
(13) rebulid security association request+RSN information unit: IEEE 802.11Reassociation Request+RSN IE;
(14) rebulid security association and reply (success): IEEE 802.11 Association Response (Success);
(15) rebulid security association and reply (failure): IEEE 802.11 Association Response (Failure).