IEEE 802.16-2012 pdf download

01-15-2023 comment

IEEE 802.16-2012 pdf download IEEE Standard for Air Interface for Broadband Wireless Access Systems
7.4.2 SS key usage
In PKMvl or PKMv2 RSA-based authentication, the SS is responsible for sustaining authorization with itsBS and maintaining an active AK. In PKMv2 EAP-based authentication, reauthorization can be initiated byeither BS or SS to refresh the AK. An SS shall be prepared to use its two most recently obtained AKsaccording to the manner described in 7.4.2.1 through 7.4.2.3.
7.4.21 SS reauthorization
AKs have a limited lifetime and shall be periodically refreshed. In PKMvl, an SS refreshes its AK byreissuing an Auth Request to the BS. The Authorization State Machine (7.2.1.5) manages the scheduling olAuth Requests for refreshing AKs. In PKMv2 RSA-based authentication, the SS refreshes its AK by issuinga PKMv2 RSA-Request essage. In PKMv2 EAP-based authentication. reauthorization can be initiated byeither BS or SS to refresh the AK. The SS initiates reauthorization by issuing PKMv2 EAP-Start message tothe BS. The BS initiates reauthorization by issuing PKMv2 EAP-Transfer message encapsulating EAPrequest/identity to the SS. The authorization state machine for PKMv2 EAP-based authentication jsdescribed in 7.2.2.8
In PKMvl, an SS’s Authorization state machine schedules the beginning of reauthorization a configurableduration of time, the Authorization Grace Time, (see points (x) and (y) in Figure 7-]2), before the SS’s latestAK is scheduled to expire. The Authorization Grace Time is configured to provide an SS with anauthorization retry period that is suliciently long to allow for system delays and provide adequate time fothe SS to successfully complete an Authorization exchange before the expiration of its ost current AK
In PKMv2 EAP-based authentication, reauthorization is triggered when any of the following conditions aremet: l) Authorization Grace Timer expires, 2) CMAC KEY COUNT or CMAC PN * approaches themaximum number, 3) PKMv2 EAP-Start message is sent by the SS,4) PKMy2 EAP-Transfer messageencapsulating EAP request/identity is sent by the BS.
Note that the BS does not require knowledge of the Authorization (race Time. The BS, however, shall trackthe lifetimes of its AKs and shall deactivate a key once it has expired.
7.4.2.2 SS usage of AK
An SS shall use the HMAC/CMAC KEY U derived from the newer of its two most recent AKs whencalculating the CMAC/HMAC Digests it attaches to Key Request or PKMv2-Key-Request messages
The SS shall be able to use the HMAC/CMAC KEY D derived from either of its two most recent AKs toauthenticate Key Reply, Key Reject, and TEK Invalid messages for PKMvl,or PKMv2-Key-ReplyPKMv2-Key-Reject, and PKMv2-TEK-Invalid messages for PKMv2. The SS shall be able to decrypt anencrypted TEK in a Key Reply or PKMv2-Key-Reply message with the KEK derived from either of its twomost recent AKs. The SS shall use the accompanying AK Key Sequence Number to determine which set ofkeying material to use.
The left-hand side of Figure 7-]2 illustrates an SS’s maintenance and usage of its AKs in PKMvl, where theshaded portion of an AK’s lifetime indicates the time period during which that AK shall be used to decryptTEKs. Even though it is not part of the message exchange, Figure 7-]2 also shows the implicitacknowledgment of the reception of a new AK via the transission of a Key Request message using the kesequence of the new AK.
An SS shall use the HMAC/CMAC KEY U derived from the newer of its two most recent AKs whencalculating the CMAC/HMAC Digests of the CMAC/HMAC Tuple attribute.

                                           Related Information                                             Download
PS:Thank you for your support!
IEEE C63.19-2011 pdf download IEEE Standards

IEEE C63.19-2011 pdf download

IEEE C63.19-2011 pdf download American National Standard Methods of Measurement of Compatibility between Wireless Communications Devices and Hearing Aids .3 Organization and use of the standard These technical requirements specify the measurement methods and categorical levels to...
Read More
IEEE 1609-4-2011 pdf download IEEE Standards

IEEE 1609-4-2011 pdf download

IEEE 1609-4-2011 pdf download IEEE Standard for Wireless Access in Vehicular Environments (WAVE)— Multi-channel Operation control channel (CCH) interval: A specified periodic interval of time with respect to CoordinatedUniversal Time (UTC). During the CCH interval a device...
Read More
IEEE 1725-2012 pdf download IEEE Standards

IEEE 1725-2012 pdf download

IEEE 1725-2012 pdf download IEEE Standard for Rechargeable Batteries for Cellular Telephones 3. Definitions For the purposes of this document, the following terms and definitions apply. The IEEE StandardsDictionary: Glossary of Terms & Definitions should be consulted...
Read More

LEAVE A REPLY

Anonymous netizen Fill in information