Professional Documents
Culture Documents
Wifi, Bluetooth & Layers: Emmanuel Baccelli
Wifi, Bluetooth & Layers: Emmanuel Baccelli
Emmanuel Baccelli
Last week
Medium Access Control Basic example : Aloha
Protocol layers 1 et 2
Transfer packets over a link
IEEE 803.2
IEEE 1394
IEEE 802.15.1
Frequencies
IEEE 802.11b,a,g,n
IEEE 802.11b (1-2-5,5-11 Mbps)
Bandwidth 2,4 GHz Modulation Direct Sequence Spread Spectrum (DSSS) No Forward Error Control (FEC)
DIFS
forbidden zone
Collision management
Retransmissions
packet
DIF ack S
RTS CTS
packet ack
forbidden period
Forbidden Period
Forbidden period slot slot Forbid. period Example: time for a backoff of 3 slots
Cmax double at each collision (lack of CTS or ACK) Retry number limited to max_retry (7-16). Slot<DIFS (Distributed Inter Frame Space)
slot
Terminology
Distribution system
ESS
AP
IBSS
terminal BSS
ad hoc mode
AP: Access Point BSS: Basic Set Service ESS: Extended Set Service IBSS: Independent Basic Set Service
Infrastructure mode
Formats (packets)
IEEE 802.11 packet
preamble MAC header Data part (IP packet) Check sum
Packet emission
packet
SISF ACK
Emitter node
Format (Preamble)
WEP security
Authentification and encryption (secret key K, symmetric)
The terminal requires the access point authentification The access point sends a challenge of 128 random bits The terminal returns the 128 bits xored by K The access point confirms authentification
Default: James Bond overhear the key K via direct comparison between challenge and terminal reply!
improved security
WEP improvement with IEEE 802.11i
Introduction of IEEE 802.1x to manage the secret keys K (Extensible Authentification Protocol- Transport Layer Security, EAP-TLS). Authentification made indpendant of encryption Introduction of more sophisticated function : (K,IV)RC4 seed.
Authentification agent
IEEE 802.1x
IEEE 802.11
= IEEE 802.15.1
Communication between personnal devices Architecture piconet master slave:
7 slaves max per piconet
master slaves
piconet
IEEE 802.15.1
Wide area architecture : scatternet
esclaves
Several tiled piconets Frequency hopings differ certains nodes switch status master-slave
IEEE 802.15.1
Limited emission power
Class 1: 100 mW class 2: 2,5 mW class 3: 1 mW (1/1000 GSM)
Profiles
Standadized applications
IEEE 802.15.1
Slotted system managed by the master node over a single frequence
Bluetooh + WiFi
Formats
Format du paquet
Access Code (AC): synchro, pagination (slot #). Channel AC, Device AC, Inquiry AC. Header: address, sequence number, flow control, acquittement
frequency hoping
Periodic change of frequencies. Predetermined sequence fixed in standard. Goal: use uncongested frequencies.
Connection
Connection establishment
Inquiry for destination terminal identification (source, destination) paging for synchronization of emissions (source, master, destination) polling, the master prompts each slave emission. Out of connection, the slave can be in wake mode or in sleed mode, otherwise it looses its MAC address.
Scurity
Authentification (E1 algorithm)
Secret shared key (link key) (128 bits)
Keys are too short link key and Kc are both function of device PIN (4 bits).
Authentification
Authentification of B byA
B sends its address (48 bits) A returns rand(A) to B (challenge 128 bits) E1(addr B, link key, rand(A))=(SRES,ACO) (32 bits, 96 bits) B returns SRES.
Encryption
mode 2
Packets are encrypted via individual keys Kc(B)=KG(,ACO(B)) Broadcast packets are not encrypted
mode 3
All packets are encrypted via the key of the master Kc=KG(,ACO(A))
encryption
Kc depends on link key, ACO and EN_RAND The pseudo random word Kstr depends on slot number and the addess of the master In packet crypted code=dataKstr