Optimizing security bits in a media access control (MAC) header
A method of retrieving security information in a media access control (MAC) header by a wireless station may include receiving a data unit, such as a protocol data unit (PDU), from a remote wireless station. The PDU may include the MAC header. The method may also include reading two encryption key sequence (EKS) bits in the MAC header that denote both whether the data unit is encrypted and a position in an encryption key sequence for the data unit.
Latest Intel Patents:
- Systems and methods for module configurability
- Hybrid boards with embedded planes
- Edge computing local breakout
- Separate network slicing for security events propagation across layers on special packet data protocol context
- Quick user datagram protocol (UDP) internet connections (QUIC) packet offloading
Implementations of the claimed invention generally may relate to wireless communication, and in particular to security bits in media access control (MAC) headers.
Modern wireless data communication systems such as WiMAX, WiMAX-II, 3GPP LTE may be designed with security features included in their standard communication protocols. An example of this will be presented with regard to
MAC module 110 may generate data units, typically referred to as service data units when communicating with higher layers and protocol data units when communicating with lower layers (e.g., PHY module 120). One exemplary MAC data unit 140 is illustrated in
For security purposes, MAC header 150 typically may contain one encryption (EC) bit and two encryption key sequence (EKS) bits. The EC bit and the EKS bits need not be contiguous as long as they are in known positions in header 150.
Because such thee bits of security information are transmitted for each data unit 140, however, it may contribute to the overhead of STA 100 and a corresponding reduction of bandwidth for any wireless system of which STA 100 is a part.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate one or more implementations consistent with the principles of the invention and, together with the description, explain such implementations. The drawings are not necessarily to scale, the emphasis instead being placed upon illustrating the principles of the invention. In the drawings,
The following detailed description refers to the accompanying drawings. The same reference numbers may be used in different drawings to identify the same or similar elements. In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular structures, architectures, interfaces, techniques, etc. in order to provide a thorough understanding of the various aspects of the claimed invention. However, it will be apparent to those skilled in the art having the benefit of the present disclosure that the various aspects of the invention claimed may be practiced in other examples that depart from these specific details. In certain instances, descriptions of well known devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
To decrease the potential size of MAC header 150, the scheme described herein may encode both 1) the forward state updates of encryption keys and 2) the encrypted state of the packet using only two bits (e.g., the two EKS bits). In such a scheme, the EC bit would not exist in header 150, assisting in an overall header size reduction (e.g., from a 6 byte GMH to 4 bytes). Such a header reduction may reduce overhead bandwidth and improve throughput in a wireless system, while maintaining both the encryption (EC) and encryption key sequence (EKS) functionalities described above.
In the implementation shown in
Other state transitions are also illustrate in
It should be noted that the four states shown are only suggestions. Any other logical convention may be used to assign the one unencrypted state and the three EKS states. In other words, the unencrypted state need not be 00, but may be any of the other three states as long as the remaining states are assigned consistently with the description herein (e.g., as EKS states).
Referring again to
Processing may continue with STA 100 transmitting an unencrypted packet [act 420]. Act 420 corresponds to state transition PT in
Processing may continue with STA 100 transmitting an encrypted packet with a new TEK [act 430]. Act 430 corresponds to state transition NT in
It should be noted that although acts 410-430 are illustrated as happening in a particular order, this is purely for ease of explanation and is not limiting. Any of acts 410-430 may occur after any of the others, or after itself, as illustrated in the various state transition arrows of
In contrast to
Processing may continue with STA 100 receiving an unencrypted packet [act 520]. Act 520 corresponds to state transition PT in
Processing may continue with STA 100 receiving an encrypted packet with a new TEK [act 530]. Act 530 corresponds to state transition NT in
It should be noted that although acts 510-530 are illustrated as happening in a particular order, this is purely for ease of explanation and is not limiting. Any of acts 510-530 may occur after any of the others, or after itself, as illustrated in the various state transition arrows of
Thus the scheme herein merges the indication of two separate things, encryption/non-encryption indication and encryption key sequence, in the MAC header into a pair of bits, saving one bit in a novel way.
The foregoing description of one or more implementations provides illustration and description, but is not intended to be exhaustive or to limit the scope of the invention to the precise form disclosed. Modifications and variations are possible in light of the above teachings or may be acquired from practice of various implementations of the invention. For example, any or all of the acts in
No element, act, or instruction used in the description of the present application should be construed as critical or essential to the invention unless explicitly described as such. Also, as used herein, the article “a” is intended to include one or more items. Variations and modifications may be made to the above-described implementation(s) of the claimed invention without departing substantially from the spirit and principles of the invention. All such modifications and variations are intended to be included herein within the scope of this disclosure and protected by the following claims.
Claims
1. A method of providing security information in a media access control (MAC) header by a wireless station, comprising:
- generating a data unit including the MAC header, the MAC header including:
- two bits that denote both whether the data unit is encrypted and an encryption key sequence (EKS) state for the data unit, the EKS state to comprise a permitted state according to a forward-only transition enforced for an EKS, the permitted state to comprise either an EKS state for a preceding encrypted data unit or a next EKS state after the EKS state for the preceding encrypted data unit according to the EKS, wherein the MAC header does not include a separate encryption control (EC) bit whose state denotes whether the data unit is encrypted, wherein three of four possible states of the two bits each denote one of three positions in the EKS state;
- encrypting at least a portion of the data unit with a current encryption key or with a new encryption key in accordance with the EKS state of the two bits before transmitting;
- and transmitting the data unit to a remote wireless station.
2. The method of claim 1, wherein the two bits are EKS bits located in a predefined location within the MAC header.
3. The method of claim 1, wherein one of four possible states of the two bits indicates that the data unit is unencrypted.
4. A method of retrieving security information in a media access control (MAC) header by a wireless station, comprising:
- receiving a data unit including the MAC header from a remote wireless station; and reading two encryption key sequence (EKS) bits in the MAC header that denote both whether the data unit is encrypted and an EKS state for the data unit, the EKS state to comprise a permitted state according to a forward-only transition enforced for an EKS, the permitted state to comprise either an EKS state for a preceding encrypted data unit or a next EKS state after the EKS state for the preceding encrypted data unit according to the EKS, wherein the MAC header does not include a separate encryption control (EC) bit whose state denotes whether the data unit is encrypted, wherein three of four possible states of the two EKS bits each denote one of three positions in the EKS state; and
- decrypting the data unit with a current encryption key or with a new encryption key in accordance with the EKS state of the two EKS bits.
5. The method of claim 4, wherein the data unit is a MAC protocol data unit (MPDU).
6. The method of claim 4, wherein one of four possible states of the two EKS bits indicates that the data unit is unencrypted; and reading a payload of the data unit as plaintext when the two EKS bits have the one of the four possible states.
7. A wireless station, comprising:
- a media access control (MAC) circuitry arranged to generate or parse a protocol data unit (PDU) including a MAC header that includes two encryption key sequence (EKS) bits that denote both whether the PDU is encrypted and an EKS state the PDU, the EKS state to comprise a permitted state according to a forward-only transition enforced for an EKS, the permitted state to comprise either an EKS state for a preceding encrypted PDU or a next EKS state after the EKS state for the preceding encrypted PDU according to the EKS, wherein the MAC header does not include a separate encryption control (EC) bit whose state denotes whether the PDU is encrypted, wherein three of four possible states of the two EKS bits each denote one of three positions in the EKS state;
- encrypting at least a portion of the data unit with a current encryption key or with a new encryption key in accordance with a the EKS state of the two bits before transmitting;
- and a physical layer (PHY) circuitry arranged to send the PDU to the MAC circuitry or to receive the PDU from the MAC circuitry.
8. The wireless station of claim 7, wherein the MAC module is further arranged to encrypt or decrypt the PDU in accordance with a state of the two EKS bits.
9. The wireless station of claim 7, wherein the MAC module is further arranged to read unencrypted data directly from a payload of the PDU in accordance with a state of the two EKS bits.
10. The wireless station of claim 7, further comprising:
- an antenna coupled to the PHY module to wirelessly transmit or receive a signal including information in the PDU.
11. The wireless station of claim 7, wherein one of the four possible states of the two EKS bits indicates that the PDU is unencrypted.
6295604 | September 25, 2001 | Callum |
7876897 | January 25, 2011 | Yi |
20040028231 | February 12, 2004 | Sako |
20050114489 | May 26, 2005 | Yonge, III |
20070162610 | July 12, 2007 | Un |
20070177627 | August 2, 2007 | Raju |
20080168722 | July 17, 2008 | Hendricks |
20080175265 | July 24, 2008 | Yonge |
20080317033 | December 25, 2008 | Lee et al. |
20090069024 | March 12, 2009 | Lee |
20090168722 | July 2, 2009 | Saifullah et al. |
20090220085 | September 3, 2009 | Tao |
20090310533 | December 17, 2009 | Zheng |
20090316806 | December 24, 2009 | Cheng |
20100208655 | August 19, 2010 | Kim |
20040034572 | April 2004 | KR |
10-0740863 | July 2007 | KR |
20080112758 | December 2008 | KR |
2010/078172 | July 2010 | WO |
2010/078172 | September 2010 | WO |
- Sang et al., “An Efficient Bandwidth Request Mechanism for Non-Real-Time Services in IEEE 802.16 Systems,” Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on Year: 2007 pp. 1-9.
- Rawat et al., “Optimising the Use of Robust Header Compression Profiles in NEMO Networks,” Networking, 2008. ICN 2008. Seventh International Conference on Year: 2008 pp. 150-155.
- International Search Report and Written Opinion received for PCT Patent Application No. PCT/US2009/069301, mailed on Jul. 30, 2010, 10 pages.
- International Preliminary Report on Patentability received for PCT Patent Application No. PCT/US2009/069301, mailed on Jul. 14, 2011, 7 pages.
- Office Action received for Korean Patent Application No. 2011-7015176, mailed on Nov. 19, 2012, 4 pages English translation.
- Office Action received for Chinese Patent Application No. 200980153570.1, mailed Jun. 5, 2013, 18 pages including 11 pages English translation.
Type: Grant
Filed: Dec 31, 2008
Date of Patent: Feb 23, 2016
Patent Publication Number: 20100166183
Assignee: INTEL CORPORATION (Santa Clara, CA)
Inventors: David Johnston (Beaverton, OR), Muthu Venkatachalam (Beaverton, OR)
Primary Examiner: Roderick Tolentino
Application Number: 12/347,872
International Classification: H04K 1/00 (20060101); H04L 9/08 (20060101); H04W 12/02 (20090101); H04L 29/06 (20060101);