Abstract:
The present disclosure describes techniques for verifying server identity. In some aspects a grant to access resources associated with a server is received from the server via a wireless network through which an address of the server is undeterminable. The grant includes the address of the server, and the server is verified as a granting authority for the resources based on the address of the server and known address information for the granting authority of the services.
Abstract:
Apparatus having corresponding computer-readable media comprise: a first transceiver, wherein the first transceiver includes a receiver configured to receive a first message from a first device, wherein the first message includes a location of the first device, and a transmitter configured to transmit a second message, wherein the second message includes the location of the first device, and a request for a frequency allocation based on the location of the first device; wherein the receiver is further configured to receive a third message, wherein the third message includes the frequency allocation; and a second transceiver configured to wirelessly communicate on a frequency band indicated by the frequency allocation.
Abstract:
Systems, methods, and other embodiments associated with preventing misuse of group keys in a wireless network are described. According to one embodiment, an apparatus is configured to determine a packet type for a packet and determine a key type for the packet. The packet is analyzed based, at least in part, on the packet type and the key type to detect a security risk.
Abstract:
An apparatus including a receiver, an address module, and a connection module. The receiver receives a first wireless signal from a wireless network. The address module determines a type of Internet Protocol address assignment employed by the wireless network based on an indicator in the first wireless signal. The connection module establishes a network-layer connection to the wireless network based on a first type of Internet Protocol address assignment when the address module determines that the indicator indicates the first type. The connection module also establishes a network-layer connection to the wireless network based on a second type of Internet Protocol address assignment when the address module determines that the indicator indicates the second type.
Abstract:
An apparatus and method establish a secure, direct, station-to-station communication between a first station and a second station in a topology (e.g., PBSS) having a central secret holder/provider that allows secure, direct, station-to-station communications and that allows secure station-to-station broadcast communications. The first station and the second station will have previously established a security association (SA) with a topology control point (PCP). The method includes creating pair-wise unique material for the first station. The pair-wise unique material is computed as a function of (i) a known shared secret associated with the PCP, (ii) a first piece of unique data associated with the first station, and (iii) a second piece of unique data associated with the second station. The method includes securely communicating the pair-wise unique material from the first station to the second station.
Abstract:
Systems, methods, and other embodiments associated with deriving group keys used to securely communicate in a wireless mesh network are described. According to one embodiment, a controller, for calculating group keys used to secure communications to a plurality of remote devices in a network, includes a key logic configured to calculate a group key by using a group master key and unique information about a remote device of the plurality of remote devices. The plurality of remote devices are configured in a mesh topology. The group key is for securing communications with the remote device. The controller also includes a communication logic configured to secure a communication by using the group key. The communication is to be transmitted to the remote device.
Abstract:
A network interface comprises a random or pseudo-random number generator. The network interface determines that a first communication device is group owner of a peer-to-peer (P2P) group, and randomly or pseudo-randomly generates a media access control (MAC) address for the first communication device using the random or pseudo-random number generator. The network interface utilizes the randomly or pseudo-randomly generated MAC address for the first communication device in group owner communications with one or more second communication devices in the P2P group.
Abstract:
A personal basic service set (PBSS) includes a first device configured to communicate in the PBSS and a second device configured to communicate in the PBSS. The first device is configured to establish a robust security network association (RSNA) with the second device (i) without associating with a PBSS control point (PCP) and (ii) without associating with the second device.
Abstract:
Systems, methods, and other embodiments associated with wireless authentication using beacon messages are described. According to one embodiment, an access point controller includes a transmitter configured to wirelessly transmit a beacon message. The beacon message is configured to announce to a remote device that a wireless access point is available to provide access to a network. The beacon message includes a security identifier that identifies a public key for the wireless access point.
Abstract:
Systems, methods, and other embodiments associated with wireless authentication using beacon messages are described. According to one embodiment, an access point controller includes a transmitter configured to wirelessly transmit a beacon message. The beacon message is configured to announce to a remote device that a wireless access point is available to provide access to a network. The beacon message includes a security identifier that identifies a public key for the wireless access point.