Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND NETWORK NODE DEVICE FOR CONTROLLING THE RUN OF TECHNOLOGY SPECIFIC PUSH-BUTTON CONFIGURATION SESSIONS WITHIN A HETEROGENEOUS OR HOMOGENEOUS WIRELESS NETWORK AND HETEROGENEOUS OR HOMOGENEOUS WIRELESS NETWORK
Document Type and Number:
WIPO Patent Application WO/2013/153171
Kind Code:
A1
Abstract:
In order to specify a method and network node device for controlling the run of technology specific Push-Button Configuration sessions within a heterogeneous or homogeneous wireless network as well as a heterogeneous or homogeneous wireless network detecting a session overlap within the network, whereby the session is related to a configuration session (bootstrapping session, setup session) that establishes a security configuration for encrypted communication over a wireless link it is proposed an enhanced mechanism for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network and a plurality of network node devices interconnected to each other via at least one interface and/or over multiple hops and authenticated or unauthenticated for the network by using a piece of information, e.g. a "Configuration Setup Session Identifier (CSSID) ", for identifying a technology specific Push Button Configuration setup session.

Inventors:
BAHR MICHAEL (DE)
FALK RAINER (DE)
MOGRE PARAG (DE)
Application Number:
PCT/EP2013/057615
Publication Date:
October 17, 2013
Filing Date:
April 11, 2013
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SIEMENS AG (DE)
International Classes:
H04W12/06; H04L29/06
Other References:
"P1905.1/D02 Draft Standard for Convergent Digital Home Network for Heterogeneous Technologies", 14 December 2011 (2011-12-14), Piscataway, NJ, USA, pages 1 - 80, XP055054554, Retrieved from the Internet [retrieved on 20130226]
"Wi-Fi Protected Setup Specification Version 1.0h", 31 December 2006 (2006-12-31), Internet, pages 1 - 110, XP055031152, Retrieved from the Internet [retrieved on 20120626]
Download PDF:
Claims:
Patent claims

1. Method for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homo- geneous wireless network and a plurality of network node devices (Dl, D2 , ND) interconnected to each other via at least one interface and/or over multiple hops and authenticated or unauthenticated for the network, whereby

(a) a authenticated first network node device (Dl) is trig- gered by a first virtual or physical Push Button Event (PBE- 1) being assigned to the first network node device (Dl) to send directly or indirectly a notification message (PBN) notifying about the first Push Button Event to at least one authenticated second network node device (D2) ,

(b) the first network node device (Dl) and the at least one second network node device (D2) start each a Push Button Configuration,

(c) a unauthenticated third network node device (ND) is triggered by a second virtual or physical Push Button Event (PBE- 2) being assigned to the third network node device (ND) to start each itself a technology specific Push Button Configuration,

characterized by:

(d) The first network node device (Dl) creates a first con- figuration setup session identifier (CSSID) for identifying a first specific configuration setup session, which is transmitted by the notification message (PBN) to the second network node device (D2) ,

(e) the first network node device (Dl) as well as the at least one second network node device (D2) each send within the started Push Button Configuration session the configuration setup session identifier (CSSID) via at least one wireless message (WME) to the third network node device (ND) ,

(f) the third network node device (ND) runs the technology specific Push Button Configuration session with one of the first network node device (Dl) and the at least one second network node device (D2) because of receiving the same configuration setup session identifier (CSSID) from the first network node device (Dl) and the at least one second network node device (D2) .

2. Method for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network and a plurality of network node devices (Dl, D2 , ND, ED) interconnected to each other via at least one interface and/or over multiple hops and authenticated or unauthenticated for the network, whereby

(a) a authenticated first network node device (Dl) is triggered by a first virtual or physical Push Button Event (PBE-

1) being assigned to the first network node device (Dl) to send directly or indirectly a notification message (PBN) notifying about the first Push Button Event to at least one au- thenticated second network node device (D2) ,

(b) the first network node device (Dl) and the at least one second network node device (D2) start each a Push Button Configuration,

(c) a unauthenticated third network node device (ND) is trig- gered by a second virtual or physical Push Button Event (PBE-

2) being assigned to the third network node device (ND) to start each itself a technology specific Push Button Configuration,

(d) an unauthenticated external device (ED) being not part of the network is triggered by a third virtual or physical Push

Button Event (PBE-3) being assigned to the external device (ED) to start a Push Button Configuration session,

characterized by:

(e) The first network node device (Dl) creates a first con- figuration setup session identifier (CSSID) for identifying a first specific configuration setup session, which is transmitted by the notification message (PBN) to the second network node device (D2) ,

(f) the external device (ED) creates a second configuration setup session identifier (CSSID' ) for identifying a second specific configuration setup session,

(g) the first network node device (Dl) as well as the at least one second network node device (D2) each send within the started Push Button Configuration session the first configuration setup session identifier (CSSID) via at least one wireless message (WME) to the third network node device (ND) ,

( ) the external device (ED) send within the started Push Button Configuration session the second configuration setup session identifier (CSSID' ) via at least one wireless message (WME) to the third network node device (ND) ,

( i ) the third network node device (ND) detecting a session overlap aborts the technology specific Push Button Configura- tion and runs no technology specific Push Button Configuration session with one of the first network node device (Dl), the at least one second network node device (D2) and the external device (ED) because of receiving the different configuration setup session identifiers (CSSID, CSSID' ) from the first network node device (Dl) and the at least one second network node device (D2) respectively the external device (ED) .

3. Method according to claim 1, whereas the first network node device (Dl)

creates from a value ( R ) a cryptographic commitment value (H ( R ) ) as the first configuration setup session identifier (CSSID) for identifying the first specific configuration setup session and to prove the ownership of the identifier (CSSID) after the completion of the technology specific Push Button Configuration session between the first network node device (Dl) and the third network node device (ND) ,

transmits after a cryptographic key has been established during the run of the technology specific Push Button Configura- tion session the value ( R ) via an encrypted communication protected by the cryptographic key to the third network node device (ND) , which verifies the cryptographic commitment value ( H ( ( R ) ) respectively the first configuration setup session identifier (CSSID) .

4. Method according to claim 1, whereas the first network node device (Dl)

creates from a value ( R ) , the configuration setup session identifier for a phase 1 (CSSID-Phasel ) and the configuration setup session identifier for a phase 2 (CSSID-Phase2 ) based on a "Hash based Message Authentication Code" (HMAC) , a key derivation function or a message authentication code such as "Advanced Encryption Standard-Cyber Block Chaining-Message Authentication Code (AES-CBC-MAC ) " a first cryptographic commitment value (HMAC ( "CSSID-Phasel" , R) ) as a Primary- Identifier (CSSIDl), which is used instead of the first configuration setup session identifier (CSSID) for identifying the first specific configuration setup session, and a second cryptographic commitment value ( HMAC ( "CSSID-Phase2 " , R) ) as a Secondary-Identifier (CSSID2), which is used to prove the knowledge of the value (R) during the run of the technology specific Push Button Configuration session between the first network node device (Dl) and the third network node device (ND) ,

transmits after a cryptographic key has been established during the run of the technology specific Push Button Configuration session the value (R) via an encrypted communication protected by the cryptographic key to the third network node device (ND) , which verifies the cryptographic commitment values respectively the Primary-Identifier (CSSIDl) and the Secondary-Identifier (CSSID2). 5. Method according to one of the claims 1 to 4, whereas the heterogeneous network is a Convergent Digital Home Network, especially based on the IEEE 1905.1 standardization specification, and whereas the homogeneous network is WLAN/Wi-Fi network based on the IEEE 802.11 standardization specifica- tion.

6. Method according to one of the claims 1 to 5, whereas the first and second configuration setup session identifiers (CSSID, CSSID') are generated randomly or pseudo-randomly when the technology specific Push Button Configuration is initiated .

7. Method according to one of the claims 1 to 5, whereas the first and second configuration setup session identifiers (CSSID, CSSID') are calculated using a derivation function, especially a cryptographic hash function as the Message Di- gest Algorithm "MD5" or the Secure Hash Algorithms "SHA-1"; "SHA-256", using derivation parameter, like especially the Basic Service Set Identifier "BSSID" and/or the client MAC Service Set Identifier "SSID". 8. Method according to one of the claims 1 to 5, whereas the first and second configuration setup session identifiers (CSSID, CSSID') are identical to or derived from an IEEE P1905.1 Push Button Event ID. 9. Method according to one of the claims 1 to 8, whereas the at least one wireless message (WME) is at least one of a beacon message, a probe response and an "Extensible Authentication Protocol over Local Area Network (EAPoL) "-message and includes an information element or data field for transport- ing the values and/or identifiers.

10. First network node device (Dl) for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network and a plural- ity of other network node devices (D2, ND) authenticated or unauthenticated for the network, namely at least one authenticated second network device (D2) and an unauthenticated third network node device (ND) triggered by a virtual or physical Push Button Event (PBE-2) being assigned to the third network node device (ND) in order to start a technology specific Push Button Configuration, interconnected to each other via at least one interface and/or over multiple hops, being authenticated for the network, comprising:

( a ) Means for sending/receiving information and/or messages (M3) , which are triggered by means for performing a Push Button-Event (Ml), send a notification message notifying about a further virtual or physical Push Button Event (PBE-1) directly or indirectly to the at least one authenticated second network node device (D2), which subsequently starts each a Push Button Configuration

( b ) means for controlling the run of technology specific Push Button Configuration sessions (M2), which are connected with the sending/receiving means (M3) and designed such that they ( bl ) start a Push Button Configuration,

( b2 ) create a configuration setup session identifier (CSSID) for identifying a first specific configuration setup session, which is transmitted by the notification message (PBN) to the second network node device (D2),

( b3 ) send, as well as the at least one second network node device (D2), within the started Push Button Configuration session the configuration setup session identifier (CSSID) via at least one wireless message (WME) to the third network node device (ND) , so that the third network node device (ND) is able to run the technology specific Push Button Configuration session with the first network node device (Dl) or the at least one second network node device (D2) since it receives the same configuration setup session identifier

(CSSID) from both.

11. First network node device (Dl) for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network and a plural- ity of other network node devices (D2, ND, ED) authenticated or unauthenticated for the network or not part of the network, namely at least one authenticated second network device (D2), an unauthenticated third network node device (ND) triggered by a virtual or physical Push Button Event (PBE-2) be- ing assigned to the third network node device (ND) in order to start a technology specific Push Button Configuration and an unauthenticated external device (ED) being not part of the network triggered also by a virtual or physical Push Button Event (PBE-3) being assigned to the external device (ED) in order to start a Push Button Configuration session the external device (ED) , creating a configuration setup session identifier (CSSID') for identifying a specific configuration setup session and sending within the started Push Button Con- figuration session the created identifier (CSSID' ) via at least one wireless message (WME) to the third network node device (ND) , interconnected to each other via at least one interface and/or over multiple hops, being authenticated for the network, comprising:

( a ) Means for sending/receiving information and/or messages (M3) , which are triggered by means for performing a Push Button-Event (Ml), send a notification message notifying about a further virtual or physical Push Button Event (PBE-1) di- rectly or indirectly to the at least one authenticated second network node device (D2), which subsequently starts each a Push Button Configuration

( b ) means for controlling the run of technology specific Push Button Configuration sessions (M2), which are connected with the sending/receiving means (M3) and designed such that they ( bl ) start a Push Button Configuration,

( b2 ) create a further configuration setup session identifier (CSSID) , which is different from the identifier (CSSID' ) , for identifying a further specific configuration setup session, which is transmitted by the notification message (PBN) to the second network node device (D2),

( b3 ) send, as well as the at least one second network node device (D2), within the started Push Button Configuration session the configuration setup session identifier (CSSID) via at least one wireless message (WME) to the third network node device (ND) , so that the third network node device (ND) is able due to detecting a session overlap to abort the technology specific Push Button Configuration and to run no technology specific Push Button Configuration session with one of the first network node device (Dl), the at least one second network node device (D2) and the external device (ED) since it receives the different configuration setup session identifiers (CSSID, CSSID' ) . 12. First network node device (Dl) according to claim 10, whereas the means for controlling the run of technology specific Push Button Configuration sessions (M2), which are connected with the sending/receiving means (M3) and designed such that they

create from a value (R) a cryptographic commitment value (H (R) ) as the first configuration setup session identifier (CSSID) for identifying the first specific configuration setup session and to prove the ownership of the identifier (CSSID) after the completion of the technology specific Push Button Configuration session between the first network node device (Dl) and the third network node device (ND) ,

transmit after a cryptographic key has been established dur- ing the run of the technology specific Push Button Configuration session the value (R) via an encrypted communication protected by the cryptographic key to the third network node device (ND) , which verifies the cryptographic commitment value (H((R)) respectively the first configuration setup ses- sion identifier (CSSID) .

13. First network node device (Dl) according to claim 10, whereas the means for controlling the run of technology specific Push Button Configuration sessions (M2), which are con- nected with the sending/receiving means (M3) and designed such that they

create from a value (R) , the configuration setup session identifier for a phase 1 (CSSID-Phasel ) and the configuration setup session identifier for a phase 2 (CSSID-Phase2 ) based on a "Hash based Message Authentication Code" (HMAC) , a key derivation function or a message authentication code such as "Advanced Encryption Standard-Cyber Block Chaining-Message Authentication Code (AES-CBC-MAC ) " a first cryptographic commitment value (HMAC ( "CSSID-Phasel" , R) ) as a Primary- Identifier (CSSIDl), which is used instead of the first configuration setup session identifier (CSSID) for identifying the first specific configuration setup session, and a second cryptographic commitment value ( HMAC ( "CSSID-Phase2 " , R) ) as a Secondary-Identifier (CSSID2), which is used to prove the knowledge of the value (R) during the run of the technology specific Push Button Configuration session between the first network node device (Dl) and the third network node device (ND) , transmit after a cryptographic key has been established during the run of the technology specific Push Button Configuration session the value (R) via an encrypted communication protected by the cryptographic key to the third network node device (ND) , which verifies the cryptographic commitment values respectively the Primary-Identifier (CSSIDl) and the Secondary-Identifier (CSSID2).

14. First network node device (Dl) according to one of the claims 10 to 13, whereas the heterogeneous network is a Convergent Digital Home Network, especially based on the IEEE 1905.1 standardization specification, and whereas the homogeneous network is WLAN/Wi-Fi network based on the IEEE 802.11 standardization specification.

15. First network node device (Dl) according to one of the claims 10 to 14, whereas the first and second configuration setup session identifiers (CSSID, CSSID' ) are generated randomly or pseudo-randomly when the technology specific Push Button Configuration is initiated.

16. First network node device (Dl) according to one of the claims 10 to 14, whereas the first and second configuration setup session identifiers (CSSID, CSSID' ) are calculated us- ing a derivation function, especially a cryptographic hash function as the Message Digest Algorithm "MD5" or the Secure Hash Algorithms "SHA-1"; "SHA-256", using derivation parameter, like especially the Basic Service Set Identifier "BSSID" and/or the client MAC Service Set Identifier "SSID".

17. First network node device (Dl) according to one of the claims 10 to 14, whereas the first and second configuration setup session identifiers (CSSID, CSSID' ) are identical to or derived from an IEEE P1905.1 Push Button Event ID.

18. First network node device (Dl) according to one of the claims 10 to 17, whereas the at least one wireless message (WME) is at least one of a beacon message, a probe response and an "Extensible Authentication Protocol over Local Area Network ( EAPoL) "-message and includes an information element or data field for transporting the values and/or identifiers. 19. Computer readable storage media being executable by a processor for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network and a plurality of network node devices (Dl, D2 , ND, ED) interconnected to each other via at least one interface and/or over multiple hops and authenticated or unauthenticated for the network,

implemented in a first network node device (Dl) according to one of the claims 10 to 18 or the network node device (D2, ND, ED) ,

carries out the method for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network and a plurality of network node devices (Dl, D2 , ND, ED) interconnected to each other via at least one interface and/or over multiple hops and authenticated or unauthenticated for the network according to one of the claims 1 to 9.

20. Heterogeneous or homogeneous wireless network for controlling the run of technology specific Push Button Configu- ration sessions comprising a first network node device (Dl) according to one of the claims 10 to 18 and a plurality of other network node devices (D2, ND, ED) interconnected to each other via at least one interface and/or over multiple hops and authenticated or unauthenticated for the network, whereby the network carries out the method for controlling the run of technology specific Push Button Configuration sessions according to one of the claims 1 to 9.

Description:
Description

Method and network node device for controlling the run of technology specific Push-Button Configuration sessions within a heterogeneous or homogeneous wireless network and heterogeneous or homogeneous wireless network

The invention relates to a method for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network according to the pre-characterizing part of claims 1 and 2, a first network node device for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network according to the pre- characterizing part of claims 10 and 11, a computer readable storage media executable by a processor for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network according to claim 19 and a heterogeneous or homogeneous wire- less network for controlling the run of technology specific Push Button Configuration sessions according to claim 20.

The current data-centric use of networks (Internet access, media streaming) is increasingly extended towards home con- trol functionality (home automation for climate control, lighting, burglar alarm, home energy network) . Such home networks use according to FIGURE 1 for instance various communication network technologies like Ethernet (IEEE 802.3), WLAN/WiFi (IEEE 802.11), and Power Line Communication (PLC; IEEE 1901) . For this reason they are heterogeneous. The standard IEEE P1905.1, which according to D02 Draft Standard for Convergent Digital Home Network (CDHN) for Heterogeneous Technologies from December 14, 2011 [1] is currently under development, defines a home network standard supporting dif- ferent network technologies by a specified "IEEE P1905.1"- Abstraction Layer. FIGURE 2 shows the design of the abstraction layer based on the ISO/OSI-Reference Model with a management and data plane. The abstraction layer is embedded in an IEEE P1905.1- Architecture above a Media Access Control (MAC) -layer and a Physical layer as part of a "Network Node Device" NND within the heterogeneous network. Thus, the network node device NND uses the cited technologies like Ethernet (IEEE 802.3), WLAN/WiFi (IEEE 802.11), and Power Line Communication (PLC; IEEE 1901) and additionally a technology according to the specification of the Multimedia over Coax Alliance (MoCA) via corresponding interfaces according to FIGURE 2. It is not compulsory or mandatory for a typical network node device to support all cited communication technologies. It is possible that the network node device NND supports only one or two of the cited technologies or completely other network technologies. Thus the network node device NND supports at least one network technology.

At least one goal of the IEEE P1905.1 standardization activi- ties are security mechanisms. They are needed to protect the home network from external attacks. Such security mechanisms have to be configured with a security credential (password, passphrase, cryptographic key) that is burdensome to set-up manually .

The specific problem of using a Push-Button Configuration (PBC) in an "IEEE P1905.1 " -network comes from the fact that multiple devices (belonging even to different technologies) are activated to accept a new device. So in the current ver- sion of the standard, more than one device could register with the "IEEE P1905.1 " -network after a single button press. An attacker node may therefore register undetected when an authorized registration of a new device takes place. Further, even in a scenario where there is no attacker node, if multi- pie existing nodes of the home network (for e.g. access points) activate their technology specific PBC mode simultaneously it may lead to failure of the new node's attempts to join the network. This is specifically the case when the ac- cess points (or the nodes involved in registering the new node in the network via the technology specific PBC) are IEEE 802.11 (WLAN) access points supporting as a Push-Button Configuration in the WLAN environment a Wi-Fi Protected Setup (WPS) . Taking this into account a technology specific Push- Button Configuration is a Push-Button Configuration, which is used specifically for each of the communication network technologies within the heterogeneous network. In other words the aforementioned PBC and WPS is each a technology specific Push-Button Configuration or belongs each to the technology specific Push-Button Configuration.

Currently in heterogeneous convergent digital home networks for ease of use a push button method is provided in order to allow the end-user to easily setup the security credentials and permit new network devices to join the convergent digital home network. An example for this is the mechanism provided in the IEEE P1905.1 draft standard under development. Here using the P1905.1 push button mechanism, technology specific push button configurations (PBC) are activated on authenticated devices in the home network. This enables the new device joining to carry out a technology specific PBC itself with a suitable device (based on range, connectivity, and media type) to get security credentials to join the home net- work.

One of the basic problems with this is, that multiple technology specific push button configurations (PBC) triggered by the same push button event may actually fail because they recognize each other as a conflicting PBC run. This is especially the case in Wi-Fi Protected Setup (WPS) with "Wi-Fi "- devices .

Wireless communication equipment as e.g., a WLA device has to be configured before it can be used. In particular, a cryptographic key may be required to be configured. An important standard for user- friendly configuration of WLAN devices is Wi-Fi Protected Setup (WPS) that supports a push-button configuration PBC between two devices. However, the general applicability is limited. So there is a need for an improved wireless configuration setup method. The mechanisms provided however are limited, for example, they do not work for the case of home networks where multiple registrars are present [multiple registrars are possible, see page 11 of the "Wi-Fi Protected Setup (WPS) " Specification defined by the Wi-Fi Alliance Version 1.0, September 2006 [2], which is the de-facto standard for WLA security setup (see htt : / /en .wikipedia . org/wiki/Wi-Fi_Protected_Setup and htt : / /www .wi-fi . org/wif -protected-setu ) ] .

Furthermore in the IEEE P1905.1 solution the technology spe- cific PBC is started only by the registrar, which implies that for the case where the new device is not within range of the registrar, but within the range of another "Wi-Fi " -access point the PBC attempt fails. Additionally, the registrar is a logical entity and can be separated from the access points. In this case the registrar itself might not have the capability to start a "Wi-Fi" specific PBC at all. This will prevent any nodes from joining the network using the "Wi-Fi" technology specific PBC.

The closest technical solution is defined in Wi-Fi Protected Setup (WPS) . Described is a monitoring for simultaneous pushbutton configurations (PBC). If a session overlap is detected, the push button configuration fails.

Section 9 of [1] defines rudimentary signalling procedures for an automatic cross-technology security setup (multi- standard push button configuration) . A node may send a PBC event to other nodes of the network to initiate a configura- tion session. The event includes an event ID. However, the event ID is used only by the nodes belonging already to the network. It is not indicated towards the new node. The new node can therefore not distinguish whether PBC messages re- ceived from different nodes belong to the same PBC session or to different sessions. The new node can therefore not reliably distinguish a session overlap between different networks from the situation where multiple nodes of a single network are active in a single PBC session.

Bluetooth defines Pairing procedures (legacy and secure simple pairing) to set-up a secret key between two Bluetooth devices (see [ 3 ] :

htt : / /en .wikipedia . org/wiki /Bluetooth#Pairing .2FBonding ) . Pairing may be initiated / confirmed by the user. The user may be required to enter a PIN or to verify a parameter.

Wireless Intrusion Detection/prevention System (WIDS) monitor the radio communication and may signal an unexpected communication node (see e.g.,

htt :/ /en .wikipedia . org/wiki /Wireless_intrusion_j?revention_sy stem and htt : / /www. Symantec . com/connect/articles/wireless- intrusion-detection-systems ) .

Secure Broadcast/Multicast protocols are known (TESLA/ uTESLA) where the key used to protect broadcast messages / multicast messages that is valid for sending messages during a certain time period is revealed to the receivers only after the time period has passed (see e.g.,

htt : / /www. cs .Virginia . edu/~stankovic/psfiles/hhs06- a pn i r i† ~ V T f )

Virtual WLAN Access Points

It is known to realize so-called virtual WLAN access points: A single physical access point may operate as multiple access points with different configurations, i.e. different SSID's (network names), e.g. an open access point and an encrypted access point ( see e.g. htt : / /www . dd- wrt . com/wiki/ inde .php/Multiple_WLANs and

htt : / /www . zeroshell . net/eng/wireless-access-point/ #wifi- manager ) . It is also known to realize on a client multiple WLAN network adapters using a single WLAN card (see e.g.

htt : / /research .microsoft . com/en- us/um/redmond/proj ects/virtualwifi/ and

htt : / /blogs . technet . com/b/dmelanchthon/archive/2009 /09/24/vi rtual-wi i-macht-windows^ j zj -accesS j ^ o-^t , aspx) .

There exist different technologies for user-friendly security set-up. Detailed information is compiled in the sequel: Wi-Fi Protected Setup (WPS)

Wi-Fi Protected Setup (WPS) defined by the Wi-Fi Alliance is the de-facto standard for WLA security setup (see [4] [5] : htt : / /en .wikipedia . org/wiki /Wi-Fi_Protected_Setup and

[5] : htt : //www.wi-fi . org/wifi-protected-setup ) .As part of the Push Button Configuration (PBC) protocol run, a check for an overlapping session is performed. If an overlapping PBC session is detected, the set-up procedure is aborted. The simultaneous announcement by a single device on two frequency bands is not considered as session overlap.

According to the WPS Specification 1.0 [2] in Section 10.3, page 77 the following is known:

The button press or equivalent trigger event on the Enrollee causes it to actively search for a Registrar in PBC mode.

However, the Enrollee MUST not proceed immediately with the Registration Protocol when it first discovers a Registrar. Instead, the Enrollee must complete a scan of all IEEE 802.11 channels that it supports to discover, if any other nearby Registrars are in a Push Button Configuration (PBC) mode. The

Enrollee performs this scan by sending out probe requests with a Device Password ID indicating that the Enrollee is in PBC mode and receiving probe responses indicating a Selected Registrar with a PBC Device Password ID. During this scan, the Enrollee must abort its connection attempt and signal a

"session overlap" error to the user if it discovers more than one Registrar in PBC mode. If a session overlap error occurs, the user should be advised through the Enrollee or the Regis- trar user interface (UI) or product literature to wait some period of time before trying again.

Note : In the case of a dual-band access point (AP) and a dual-band station, the station may discover more than one registrar in the PBC mode. If the dual-band station does discover more than one registrar in the PBC mode, one each RF band, and the Universal Unique IDentifier (UUID) in the beacon and probe-response are the same for all RF bands, then the station shall not consider this to be a session overlap.

FIGURE 3 shows the message chart (WPS PBC Message Exchange known from [2]) for push-button configuration involving the new device to be registered (called Enrollee) , an access point (AP) being in direct communication with the Enrollee and a Registrar that actually performs the registration (i.e. it establishes a credential with the Enrollee) . The registration messages (M1...M8) are embedded in EAP messages that are forwarded by the AP .

Before the actual registration starts, a monitoring is performed to detect an overlapping PBC session: After Button press B_E by the Enrollee, the Enrollee sends probe request messages indicating that it is in a PBC mode. The AP forwards the information to the registrar. After a button press B_R or an equivalent trigger event on the registrar , the registrar checks whether more than one Enrollee PBC probe request has been received by the Registrar within 120 seconds prior to the PBC button press on the Registrar (PBC Monitor Time) . If more than one Enrollee PBC probe request has been received within the Monitor Time interval, the Registrar signals a session overlap error and refuses to enter PBC mode or perform a PBC-based Registration Protocol exchange. In general, the two buttons B_E and B_R may be pressed in any order as long as both are pressed within a 120 sec time interval.

Note : The message SetSelectedRegistrar notifies the AP that the registrar is currently in PBC mode. So this message causes the change in behaviour of the AP that it answers with a PBC probe response message (positive answer "PBC" instead of negative answer "!PBC"). This technical solution has as main drawback that it is suitable only for a limited usage scenario:

Only a single technology (WLA ) is supported.

The case of multiple access points (nodes) belonging to the same (home) network and each of them being potentially used for the PBC is not considered.

"Appendix A" in WPS Specification 1.0 [2] in Section 13 describes a setup in which multiple registrars are supported, so that the user (Enrollee) has to select with which registrar it wants to register.

IEEE P1905.1 The current draft version of the standard IEEE P1905.1 [1] includes the following description for the push button configuration in section 9.2.2 ( P1905.1 PBC (Push Button Configuration) Setup Method) : The IEEE P1905.1 PBC method works between two IEEE P1905.1 devices on the same IEEE P1905.1 Network, even when these two devices do not include an IEEE P1905.1 interface of the same underlying network technology if they are bridged by a device with the same underlying network technologies.

An example of the IEEE P1905.1 PBC method is illustrated in FIGURE 4 (Example of IEEE P1905.1 Push Button Event Notification and IEEE P1905.1 Push Button Configuration). In section 9.2.2.1 "P1905.1 Push Button Event Handling" of the current IEEE P1905.1 Draft Version " 1905_l-ll-0067-00- WGDC-proposal-for-cdhn-standard.doc" it is said: The handling of IEEE P1905.1 Management messages in IEEE P1905.1 Devices is a common behaviour (powering up the interfaces and generating a sequential message ID across all message types from the device) .

If the physical or logical PBC button is pushed on an IEEE P1905.1 Device and if an underlying network specific Push Button Configuration sequence is not currently being performed on any of the network interfaces of this IEEE P1905.1 Device, then a Push Button Event is triggered on an IEEE P1905.1 Device

If a Push Button event is triggered on an IEEE P1905.1 Device, then the Application Layer Management Entity (ALME) shall :

• Generate an eventID for this Push Button Event

• Send a Push_Button_Event Notification IEEE P1905.1 Multicast message over its Authenticated IEEE P1905.1 Links using §7.2 Relay Multicast Transmission Procedures

• Initiate the underlying network specific Push Button Configuration sequence on the IEEE P1905.1 interfaces supporting Push Button Configuration methods.

FIGURE 5 describes how an IEEE P1905.1 Device handles an IEEE P1905.1 Push Button Event Notification message (Push Button Event Notification Handling) .

The handling of IEEE P1905.1 Management messages in an IEEE P1905.1 Device is a common behaviour (powering up the inter- faces and generating a sequential message ID across all message types from the device) .

If an ALME receives an IEEE P1905.1 Push Button Notification message, then an IEEE P1905.1 ALME shall:

1) If an underlying network specific Push Button Configuration sequence is currently being performed of any of the network interface of the device, then ignore the message . 2) If the message SourceAddress and eventID are a duplicated notification for this given P1905.1 Push Button event, then ignore the message.

The aging of a SourceAddress and eventID pair is

P1905.1_PBC_WALK_TIME .

P1905.1_PBC_WALK_TIME should be defined to be longer than the underlying network. No more than a single even- tID need to be stored by the P1905.1 device since

Push_Button_Event cannot be triggered or handled if an underlying network Push Button Configuration is in progress (cf. 3.2.3 & 3.2.5-1).

3) If message is not ignored, repropagate the received IEEE P1905.1 Push_Button_Event Notification message using

§7.3 Relay Multicast Reception Procedures.

4) Initiate the underlying network specific Push Button Configuration sequence on all IEEE P1905.1 interfaces supporting Push Button Configuration methods .

The main limitation of Wi-Fi WPS standard is that only a single WPS session including one new node and one Access Point (AP) node is supported (i.e. not a setup scenario involving multiple access points (AP) ) . This limits the applicability, e.g. in WLAN mesh networks according to IEEE 802.11 or IEEE P1905.1 networks.

FIGURE 6 shows an exemplary signalling flow according to the state of the art. The two network node devices Dl, D2 belong to the same heterogeneous or homogeneous wireless network, e.g., an IEEE P1905.1 network or a single WLAN mesh network according to IEEE 802.11. Although only two network node devices Dl, D2 are shown in the FIGURE 6 it should be clear that the network can include more than these two devices . This means that besides the first network node device Dl the network can have at least one second network node device D2. A Push Button Configuration (initiation of an automatic security bootstrapping) is started, here by a first Push Button Event PBE-1 triggered on a first network node device Dl . A second network node device D2 belonging to the same network is informed by the first network node device Dl by sending a push button notification message PBN to the second network node device D2. Of the network node devices Dl , D2 each network node device start a Push Button Configuration session (PBC session), e.g. a Wi-Fi Protected Setup session (WPS) . A new device (third network node device) ND that is to be registered with the network to which the network node devices Dl and D2 belong, starts also a Push Button Configuration by a second Push Button Event PBE-2. A monitoring is performed according to the standard to detect overlapping PBC sessions. As here both network node devices Dl and D2 indicate the status of their started PBC by sending a beacon referring to the network node device Dl respectively D2 and the started PBC, the new device ND detects two simultaneous Push Button Configuration sessions, i.e. a session overlap. Thus the new device ND aborts the PBC session with a failure. The new device ND cannot distinguish this case that is expected to be successful from a case where a different device, e.g. an external device ED (cf. FIGURE 8), which belongs to a neighbour or an attacker, is performing a PBC session.

It is an object of the invention to specify a method and network node device for controlling the run of technology specific Push-Button Configuration sessions within a heterogeneous or homogeneous wireless network as well as a heterogene- ous or homogeneous wireless network detecting a session overlap within the network, whereby the session is related to a configuration session (bootstrapping session, setup session) that establishes a security configuration for encrypted communication over a wireless link.

This object of the invention is solved

(1) by a method based on the pre-characterizing part of claims 1 and 2 using the features of the characterizing part of claims 1 and 2,

( 2 ) by a first network node device based on the pre- characterizing part of claims 10 and 11 using the features of the characterizing part of claims 10 and 11,

( 3 ) by a Computer readable storage media being executable by a processor according to claim 19 and

(4) by a heterogeneous or homogeneous wireless network according to claim 20. The invention (claims 1, 2, 10, 11, 19 and 20) proposes an enhanced mechanism for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless network and a plurality of network node devices interconnected to each other via at least one interface and/or over multiple hops and authenticated or unauthenticated for the network by using a piece of information, e.g. a "Configuration Setup Session Identifier

(CSSID) " , for identifying a technology specific Push Button Configuration setup session.

This enables an automatic setup with session overlap detection being supported with multiple devices. Thus a protected WLAN Setup for Multiple Access Points and not only a point- to-point setup is possible.

When session overlap detection is performed (cf. claims 2 and 11), in particular as part of a push button configuration, the CSSID information allow to distinguish a single configuration setup session involving several nodes (belonging, how- ever, to a single network) from the case of two different configuration setup sessions. The configuration setup session is aborted if two different setup sessions are detected during the monitoring time frame, i.e. two setup sessions having different CSSID' s.

According to the claims 6 and 15 it is advantageous that the piece of information, e.g. the Configuration Setup Session Identifier (CSSID) , is preferably generated randomly or pseudo-randomly when a configuration setup session is initiated, e.g. by pressing a button for a push button configuration . According to the claims 7 and 16 it is advantageous that - in a variant - the Configuration Setup Session Identifier

(CSSID) is calculated using a derivation function, e.g. a cryptographic hash function as the Message Digest Algorithm "MD5" or the Secure Hash Algorithms "SHA-1"; "SHA-256", using parameters as the Basic Service Set Identifier "BSSID" and/or the client MAC Service Set Identifier "SSID" as derivation parameter .

According to the claims 7 and 17 it is further advantageous that - in a variant - the Configuration Setup Session Identifier (CSSID) is identical to or derived from an IEEE P1905.1 Push Button Event ID. Information characterizing the push button event trigger may be included as well (e.g., local push button, remote push button event; physical button, vir- tual button on a Graphical User Interface (GUI) , user authentication information of user pressing the GUI push button, press duration, time stamp) .

According to the claims 3, 4 and 12, 13 it is moreover advan- tageous that - in one preferred variant - the Configuration

Setup Session Identifier (CSSID) is generated as "commitment" value using a cryptographic one way function (the cryptographic hash function H) , e.g. Message Digest Algorithm "MD5" or the Secure Hash Algorithms "SHA-1"; "SHA-256" etc . The Con- figuration Setup Session Identifier (CSSID) is computed as

CSSID: = H(PIP)/H(R), where PIP/R is a parameter/value as described above. The Configuration Setup Session Identifier (CSSID) is used as before, but after completing the configuration setup or at least a part of the configuration setup, the pre-image parameter PIP/the value R is revealed.

The CSSID information may be protected by a cryptographic checksum, e.g. a digital signature. The CSSID information of different nodes may be signed by the same private key, proving that the sending nodes belong to the same network.

This prevents undetected stealing of a CSSID value, as only the entity that determined the CSSID value can reveal the corresponding pre-image parameter PIP. An outsider that intercepted only the CSSID value cannot practically determine the corresponding PIP value. So an attacker (third party) can use a different CSSID, but it cannot use the CSSID selected by another node.

The CSSID value may be determined by the registrar, by the access point, by a push button trigger sending node according to IEEE P1905.1.

According to the claims 9 and 18 it is moreover advantageous that the CSSID is included in the messages exchanged over the wireless link, whereas the wireless message could be a beacon message, a probe response, or an "Extensible Authentication Protocol over Local Area Network (EAPoL) "-message .

This CSSID value resp. the derived value allows a (new) node that is to be configured to detect whether multiple nodes (e.g., WLAN mesh access points) indicate a single configura- tion setup session (i.e. no overlap) or different setup sessions. The CSSID value and/or a derived value are included in wireless messages. It may be included in particular as in information element (data field), e.g. the "Wi-Fi Simple Con- fig" information element (WSC IE) . It may be included also in one or several of the messages Ml, M2 , M3 , M4, M5, M6, M7 , M8

(cf . FIGURE 3 ) .

Further advantages of the present invention arise out of the following description of the preferred embodiments of the in- vention.

The preferred embodiments of the present invention will be described according to FIGURES 7 to 11. The figures show: FIGURE 7 based on the FIGURE 6 a sequence diagram with the message flow (signalling flow) with a successful registration of a new device despite an overlap of PBC sessions,

FIGURE 8 based on the FIGURE 6 a sequence diagram with the message flow (signalling flow) for detecting an overlap of PBC sessions with an abortion of running PBC sessions, FIGURE 9 a sequence diagram with a modified message flow (signalling flow) with a successful registration of a new device despite an overlap of PBC sessions improving the controlling of running technology specific Push Button Configuration sessions shown in the FIGURE 7,

FIGURE 10 a sequence diagram with a further modified message flow (signalling flow) with a successful registration of a new device despite an overlap of PBC sessions further improving the controlling of running technology specific Push But- ton Configuration sessions shown in the FIGURE 7,

FIGURE 11 the structure of a network node device for controlling the run of technology specific Push Button Configuration sessions within a heterogeneous or homogeneous wireless net- work based on the abstraction layer embedded in the IEEE

P1905.1-Architecture above the Media Access Control (MAC)- layer and the Physical layer according to FIGURE 2.

FIGURE 7 shows an exemplary signalling flow according to a preferred embodiment of the invention using a first Configuration Setup Session Identifier CSSID. As in the FIGURE 6 the two network node devices Dl, D2 belong to the same heterogeneous or homogeneous wireless network, e.g., an IEEE P1905.1 network or a single WLAN mesh network according to IEEE 802.11. Although only two network node devices Dl, D2 are shown in the FIGURE 7 it should be clear that the network can include more than these two devices. This means that besides the first network node device Dl the network can have at least one second network node device D2.

Again a Push Button Configuration (initiation of an automatic security bootstrapping) is started, here by a first Push Button Event PBE-1 triggered on a first network node device Dl .

In contrast to the FIGURE 6 the first network node device Dl creates the first Configuration Setup Session Identifier CSSID. The first Configuration Setup Session Identifier

CSSID, is preferably generated randomly or pseudo-randomly, when the configuration setup session is initiated by pressing a button for a Push Button Configuration. It is also possible that the first Configuration Setup Session Identifier CSSID is calculated using a derivation function, e.g. a cryptographic hash function as the Message Digest Algorithm "MD5" or the Secure Hash Algorithms "SHA-1"; "SHA-256", using parameters as the Basic Service Set Identi- fier "BSSID" and/or the client MAC Service Set Identifier "SSID" as derivation parameter.

Moreover is also possible that the first Configuration Setup Session Identifier CSSID is identical to or derived from an IEEE P1905.1 Push Button Event ID. Information characterizing the push button event trigger may be included as well (e.g., local push button, remote push button event; physical button, virtual button on a Graphical User Interface (GUI), user authentication information of user pressing the GUI push but- ton, press duration, time stamp) .

Again in accordance to the FIFURE 6 a second network node device D2 belonging to the same network is informed by the first network node device Dl by sending a push button notifi- cation message PBN to the second network node device D2. However, different to the situation in the FIGURE 6 the push button notification message PBN transports the first Configuration Setup Session Identifier CSSID. Of the network node devices Dl, D2 again each network node device start a Push Button Configuration session (PBC session), e.g. a Wi-Fi Protected Setup session (WPS) . Once more as in the FIGURE 6 a new device (third network node device) ND that is to be registered with the network, to which the network node devices Dl and D2 belong, starts also a Push Button Configuration by a second Push Button Event PBE-2. A monitoring is performed according to the standard to detect overlapping PBC sessions.

Now both network node devices Dl and D2 indicate the status of their started PBC by sending messages over a wireless link, called as wireless messages WME. The first Configura- tion Setup Session Identifier CSSID is included in the wireless message WME. The wireless message WME could be a beacon message, a probe response, or an "Extensible Authentication Protocol over Local Area Network (EAPoL) "-message, which each also refers to the network node device Dl respectively D2 and the started PBC.

The new device ND detects again two simultaneous Push Button Configuration sessions, i.e. a session overlap, but due to the fact that the first Configuration Setup Session Identi- fier CSSID, which is sent with wireless message WME each by the network node devices Dl, D2 , is the same, the new device ND doesn't abort the PBC sessions. Instead of this it is running a technology specific Push Button Configuration session, e.g. a WPS session, with one of the network node devices Dl, D2. According to the FIGURE 7 it runs the PBC session with the first network node device Dl .

FIGURE 8 shows based on the scenario shown in the FIFURE 7 an exemplary signalling flow according to a preferred embodiment of the invention detecting an overlap of PBC sessions with an abortion of running PBC sessions by means of the Configuration Setup Session Identifier mechanism. As in the FIGURE 7 the two network node devices Dl, D2 belong to the same heterogeneous or homogeneous wireless network, e.g., an IEEE P1905.1 network or a single WLA mesh network according to IEEE 802.11. Although only two network node de- vices Dl, D2 are shown in the FIGURE 8 it should be clear that the network can include more than these two devices . This means that besides the first network node device Dl the network can have at least one second network node device D2. Again the Push Button Configuration (initiation of the automatic security bootstrapping) is started, here by the first Push Button Event PBE-1 triggered on the first network node device Dl . The first network node device Dl creates the first Configuration Setup Session Identifier CSSID. The first Configuration Setup Session Identifier CSSID, is preferably generated randomly or pseudo-randomly, when the configuration setup session is initiated by pressing a button for a Push Button Con- figuration.

It is also possible that the first Configuration Setup Session Identifier CSSID is calculated using a derivation function, e.g. a cryptographic hash function as the Message Di- gest Algorithm "MD5" or the Secure Hash Algorithms "SHA-1";

"SHA-256", using parameters as the Basic Service Set Identifier "BS S ID" and/or the client MAC Service Set Identifier "SSID" as derivation parameter. Moreover is also possible that the first Configuration Setup Session Identifier CSSID is identical to or derived from an IEEE P1905.1 Push Button Event ID. Information characterizing the push button event trigger may be included as well (e.g., local push button, remote push button event; physical button, virtual button on a Graphical User Interface (GUI) , user authentication information of user pressing the GUI push button, press duration, time stamp) . The second network node device D2 belonging to the same network is informed by the first network node device Dl by sending the push button notification message PBN to the second network node device D2. The push button notification message PBN transports the first Configuration Setup Session Identifier CSSID. Of the network node devices Dl, D2 again each network node device start a Push Button Configuration session (PBC session), e.g. a Wi-Fi Protected Setup session (WPS) . The new device (third network node device) ND that is to be registered with the network, to which the network node devices Dl and D2 belong, starts the Push Button Configuration by the second Push Button Event PBE-2. A monitoring is performed according to the standard to detect overlapping PBC sessions.

Now both network node devices Dl and D2 indicate the status of their started PBC by sending messages over a wireless link, called as wireless messages WME. The first Configura- tion Setup Session Identifier CSSID is included in the wireless message WME. The wireless message WME could be a beacon message, a probe response, or an "Extensible Authentication Protocol over Local Area Network (EAPoL) "-message, which each also refers to the network node device Dl respectively D2 and the started PBC.

The new device ND detects again two simultaneous Push Button Configuration sessions, i.e. a session overlap, but due to the fact that the first Configuration Setup Session Identi- fier CSSID, which is sent with wireless message WME each by the network node devices Dl, D2 , is the same, the new device ND would not abort the PBC sessions.

However, during the running time the aforementioned scenario happened, an external device ED, which e.g. belongs to a neighbour or an attacker, is performing a PBC session, too. It means that on the external device ED, triggered by a third Push Button Event PBE-3, a Push Button Configuration (initiation of an automatic security bootstrapping) is started.

As well as the first network node device Dl the external de- vice ED creates a Configuration Setup Session Identifier, but it is different from the first Configuration Setup Session Identifier CSSID, because the external device does not belong to the heterogeneous or homogeneous wireless network and thus does not receive the push button notification message PBN. For this reason the identifier created by the external device ED is named as second Configuration Setup Session Identifier CSSID' .

The second Configuration Setup Session Identifier CSSID' , is preferably generated randomly or pseudo-randomly, when the configuration setup session is initiated by pressing a button for a Push Button Configuration.

It is also possible that the second Configuration Setup Ses- sion Identifier CSSID' is calculated using a derivation function, e.g. a cryptographic hash function as the Message Digest Algorithm "MD5" or the Secure Hash Algorithms "SHA-1"; "SHA-256", using parameters as the Basic Service Set Identifier "BSSID" and/or the client MAC Service Set Identifier "SSID" as derivation parameter.

Moreover is also possible that the second Configuration Setup Session Identifier CSSID' is identical to or derived from an IEEE P1905.1 Push Button Event ID. Information characterizing the push button event trigger may be included as well (e.g., local push button, remote push button event; physical button, virtual button on a Graphical User Interface (GUI), user authentication information of user pressing the GUI push button, press duration, time stamp) .

Now the external device ED indicate the status of its started PBC by sending messages over a wireless link, called as wireless messages WME. The second Configuration Setup Session Identifier CSSID' is included in the wireless message WME . The wireless message WME could be a beacon message, a probe response, or an "Extensible Authentication Protocol over Local Area Network ( EAPoL ) "-message , which each also refers to the external device ED and the started PBC .

Since the new device ND receives now besides the two messages WME with the first Configuration Setup Session Identifier CSSID from the network node devices Dl, D2 a further message WME with the second Configuration Setup Session Identifier CSSID' from the external device ED, it detects due to the different identifiers an overlap of PBC sessions. For this reason it aborts the PBC sessions and thus it runs no technology specific Push Button Configuration session with one of the first network node device Dl , the second network node device D2 and the external device ED.

FIGURE 9 shows based on the FIGURE 7 a modified message flow (signalling flow) with a successful registration of a new de- vice despite an overlap of PBC sessions improving the controlling of running technology specific Push Button Configuration sessions.

The improvement entails in that according to FIGURE 9 the network node device using a Configuration Setup Session Identifier must prove to be the "owner" of the ID after having completed the configuration session setup. This can be done be using a cryptographic commitment value as Configuration Setup Session Identifier. After a cryptographic key has been established by the PBC protocol (WPS) , the authorized usage of the CSSID value has to be committed by revealing a value R to the new device. The value of R is sent to the new device ND over the encrypted communication protected by the newly established key. This ensures that the value R is received only by the device ND.

In a variant, there are specific time ranges for PBC protocol run and for providing the value R. The protocol succeeds only successfully when starting, e.g. from PBC trigger of PBC protocol run, when the expected information is exchanged during the envisaged period. As in the FIGURE 7 the two network node devices Dl, D2 belong to the same heterogeneous or homogeneous wireless network, e.g., an IEEE P1905.1 network or a single WLA mesh network according to IEEE 802.11. Although only two network node devices Dl, D2 are shown in the FIGURE 7 it should be clear that the network can include more than these two devices.

This means that besides the first network node device Dl the network can have at least one second network node device D2.

Again the Push Button Configuration (initiation of an auto- matic security bootstrapping) is started, here by the first Push Button Event PBE-1 triggered on the first network node device Dl .

The first network node device Dl creates from the value R a cryptographic commitment value H(R) as the first configuration setup session identifier CSSID, using a cryptographic one way function (the cryptographic hash function H) , e.g. Message Digest Algorithm "MD5" or the Secure Hash Algorithms "SHA-1"; "SHA-256" etc . The Configuration Setup Session Identi- fier CSSID is computed as CSSID:= H(R), where R is a value.

The Configuration Setup Session Identifier CSSID, is preferably generated randomly or pseudo-randomly, when the configuration setup session is initiated by pressing a button for a Push Button Configuration.

It is also possible that the Configuration Setup Session Identifier CSSID is calculated using a derivation function, e.g. a cryptographic hash function as the Message Digest Al- gorithm "MD5" or the Secure Hash Algorithms "SHA-1"; "SHA-256", using parameters as the Basic Service Set Identifier "BSSID" and/or the client MAC Service Set Identifier "SSID" as derivation parameter. Moreover is also possible that the Configuration Setup Session Identifier CSSID is identical to or derived from an IEEE P1905.1 Push Button Event ID. Information characterizing the push button event trigger may be included as well (e.g., local push button, remote push button event; physical button, virtual button on a Graphical User Interface (GUI), user authentication information of user pressing the GUI push button, press duration, time stamp) .

The second network node device D2 belonging to the same network is informed by the first network node device Dl by sending a push button notification message PBN to the second network node device D2. The push button notification message PBN transports the created Configuration Setup Session Identifier CSSID. Of the network node devices Dl, D2 again each network node device start a Push Button Configuration session (PBC session), e.g. a Wi-Fi Protected Setup session (WPS). The new device (third network node device) ND that is to be registered with the network, to which the network node devices Dl and D2 belong, starts also a Push Button Configuration by a second Push Button Event PBE-2. A monitoring is performed according to the standard to detect overlapping PBC sessions.

Now both network node devices Dl and D2 indicate the status of their started PBC by sending messages over a wireless link, called as wireless messages WME. The created Configura- tion Setup Session Identifier CSSID is included in the wireless message WME. The wireless message WME could be a beacon message, a probe response, or an "Extensible Authentication Protocol over Local Area Network (EAPoL) "-message, which each also refers to the network node device Dl respectively D2 and the started PBC.

The new device ND detects again two simultaneous Push Button Configuration sessions, i.e. a session overlap, but due to the fact that the created Configuration Setup Session Identifier CSSID, which is sent with wireless message WME each by the network node devices Dl, D2 , is the same, the new device ND doesn't abort the PBC sessions. Instead of this it is run- ning a technology specific Push Button Configuration session, e.g. a WPS session, with one of the network node devices Dl, D2. According to the FIGURE 9 it runs the PBC session with the first network node device Dl . For identifying the first specific configuration setup session and to prove the ownership of the identifier CSSID after the completion of the technology specific Push Button Configuration session between the first network node device Dl and the third network node device ND the first network node device Dl transmits after a cryptographic key has been established during the run of the technology specific Push Button Configuration session the value R via an encrypted communication protected by the cryptographic key to the third network node device ND, which verifies the cryptographic commitment value H(R) respectively the first configuration setup session identifier CSSID.

FIGURE 10 shows based on the FIGURE 7 a further modified message flow (signalling flow) with a successful registration of a new device despite an overlap of PBC sessions further improving the controlling of running technology specific Push Button Configuration sessions.

The improvement entails in that according to FIGURE 10 two a cryptographic commitment values, a first cryptographic commitment value HMAC ( "CSSID-Phasel" , R) as a Primary- Identifier CSSIDl and a second cryptographic commitment value

HMAC ( "CSSID-Phase2 " , R) as a Secondary-Identifier CSSID2 are used. The first cryptographic commitment value HMAC ( "CSSID- Phasel", R) respectively the Primary-Identifier CSSIDl Primary-Identifier (CSSIDl) is used instead of the first configuration setup session identifier CSSID for identifying the first specific configuration setup session. The second cryp- tographic commitment value HMAC ( "CSSID-Phase2 " , R) respectively the Secondary-Identifier CSSID2 is used to prove the knowledge of the value R during the run of the technology specific Push Button Configuration session between the first network node device Dl and the third network node device ND. Instead of the "Hash based Message Authentication Code"

(HMAC) , a key derivation function or a message authentication code such as "Advanced Encryption Standard-Cyber Block Chain- ing-Message Authentication Code (AES-CBC-MAC) " may be used.

In a variant, also here there are specific time ranges for PBC protocol run and for providing the value R. The PBC protocol (WPS) succeeds only successfully when starting, e.g., from PBC trigger of PBC protocol run, when the expected in- formation is exchanged during the envisaged period.

As in the FIGURE 7 the two network node devices Dl, D2 belong to the same heterogeneous or homogeneous wireless network, e.g., an IEEE P1905.1 network or a single WLA mesh network according to IEEE 802.11. Although only two network node devices Dl, D2 are shown in the FIGURE 7 it should be clear that the network can include more than these two devices . This means that besides the first network node device Dl the network can have at least one second network node device D2.

Again the Push Button Configuration (initiation of an automatic security bootstrapping) is started, here by the first Push Button Event PBE-1 triggered on the first network node device Dl .

The first network node device Dl creates from the value R, the configuration setup session identifier for a phase 1 CSSID-Phasel and the configuration setup session identifier for a phase 2 CSSID-Phase2 based on a "Hash based Message Au- thentication Code" HMAC the first cryptographic commitment value HMAC ( "CSSID-Phasel" , R) as the Primary-Identifier CSSIDl, which is used instead of the first configuration setup session identifier CSSID for identifying the first spe- cific configuration setup session, and the second cryptographic commitment value HMAC ( "CSSID-Phase2 " , R) as the Secondary-Identifier CSSID2, which is used to prove the knowledge of the value R during the run of the technology specific Push Button Configuration session between the first network node device Dl and the third network node device ND.

Both identifiers CSSIDl, CSSID2, are preferably generated randomly or pseudo-randomly, when the configuration setup session is initiated by pressing a button for a Push Button Configuration .

It is also possible that the identifier CSSIDl, CSSID2 are calculated using a derivation function, e.g. a cryptographic hash function as the Message Digest Algorithm "MD5" or the

Secure Hash Algorithms "SHA-1"; "SHA-256", using parameters as the Basic Service Set Identifier "BSSID" and/or the client MAC Service Set Identifier "SSID" as derivation parameter. Moreover is also possible that the identifiers CSSIDl, CSSID2 are identical to or derived from an IEEE P1905.1 Push Button Event ID. Information characterizing the push button event trigger may be included as well (e.g., local push button, remote push button event; physical button, virtual button on a Graphical User Interface (GUI), user authentication information of user pressing the GUI push button, press duration, time stamp) .

The second network node device D2 belonging to the same net- work is informed by the first network node device Dl by sending the push button notification message PBN to the second network node device D2. The push button notification message PBN transports the created Primary-Identifier CSSIDl. Of the network node devices Dl, D2 again each network node device start a Push Button Configuration session (PBC session), e.g. a Wi-Fi Protected Setup session (WPS) . The new device (third network node device) ND that is to be registered with the network, to which the network node devices Dl and D2 belong, starts also the Push Button Configuration by the second Push Button Event PBE-2. A monitoring is performed according to the standard to detect overlapping PBC sessions .

Now both network node devices Dl and D2 indicate the status of their started PBC by sending messages over a wireless link, called as wireless messages WME. The created Primary- Identifier CSSIDl is included in the wireless message WME. The wireless message WME could be a beacon message, a probe response, or an "Extensible Authentication Protocol over Local Area Network ( EAPoL ) "-message , which each also refers to the network node device Dl respectively D2 and the started PBC .

The new device ND detects again two simultaneous Push Button Configuration sessions, i.e. a session overlap, but due to the fact that the created Configuration Setup Session Identifier CSSID, which is sent with wireless message WME each by the network node devices Dl, D2 , is the same, the new device ND doesn't abort the PBC sessions. Instead of this it is running a technology specific Push Button Configuration session, e.g. a WPS session, with one of the network node devices Dl, D2. According to the FIGURE 10 it runs the PBC session with the first network node device Dl . During this PBS session (PBS Protocol (WPS)) the Secondary-Identifier CSSID2 is transmitted from first network node device Dl to the new de- vice ND.

For proving the knowledge of the value R during the run of the technology specific Push Button Configuration session between the first network node device Dl and the third network node device ND the first network node device Dl transmits after a cryptographic key has been established during the run of the technology specific Push Button Configuration session the value R via an encrypted communication protected by the cryptographic key to the third network node device ND, which verifies the cryptographic commitment values respectively the Primary-Identifier CSSIDl and the Secondary-Identifier

CSSID2.

FIGURE 11 shows the structure of the network node device Dl, D2 , especially the first network node device Dl, each with at least one interface for controlling the run of technology specific Push Button Configuration sessions within a hetero- geneous or homogeneous wireless network based on the abstraction layer embedded in the IEEE P1905.1-Architecture above the Media Access Control (MAC) -layer and the Physical layer according to FIGURE 2. According to FIGURE 11 the network node device D2 , respectively the first network node device Dl comprise in contrast to the network node device ND of FIGURE 2 dedicated means namely means for performing a Push Button Event (PBE) Ml, means for controlling the run of technology specific Push Button Configuration sessions M2 and means for sending/receiving information and/or messages M3. While the means M3 include or incorporate all entities of the IEEE

P1905.1-Architecture belonging to the Physical Layer and the means Ml include respectively incorporate the entities of the IEEE P1905.1-Architecture belonging to the Application Layer entities, which are part of the Higher Layer Entities (HLE) , the means for controlling the run of technology specific Push Button Configuration sessions M2 include respectively incorporate all entities in the data- and management plane of the IEEE P1905.1-Architecture from the MAC-Layer including the Abstraction Layer with the IEEE P1905.1 Abstraction Manage- ment Entity (ALME) and the corresponding Service Access

Points (SAP) via the Logical Link Control (LLC) up to the Higher Layers with its most entities. References :

[1] 1905_l-ll-0067-00-WGDC-proposal-for-cdhn-standard.doc [2] WPS Specification 1.0

[ 3 ] http : / /en . wikipedxa . org/wiki/Bluetooth#Paxring .2FBonding [ 4 ] htt : / /en . wikipedxa . org/wiki/Wi-Fi_Protected_Setup

[ 5 ] htt : / /www .wi- fi . org/wifi-protected-setup