- IEEE Mentor

May 2006
doc.: IEEE 802.11-06/0616r0
IEEE P802.11
Wireless LANs
Emergency Call Problem Statement
Date: 2006-05-05
Author(s):
Name
Stephen McCann
Company
Roke Manor
Research (A
Siemens
Company)
Address
Phone
Roke Manor, Old Salisbury
Lane, Romsey, Hampshire,
SO51 0ZN, UK
+44 1794 833341
email
[email protected]
Abstract
The following document provides a quick introduction to the problem referred to as emergency call support, and
explains the motivation behind addressing this problem specifically within IEEE 802.11u, and desirable properties
of the solution.
Notice: This document has been prepared to assist IEEE 802.11. It is offered as a basis for discussion and is not binding on the
contributing individual(s) or organization(s). The material in this document is subject to change in form and content after
further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein.
Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution,
and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE
Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit
others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and
accepts that this contribution may be made public by IEEE 802.11.
Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures <http://
ieee802.org/guides/bylaws/sb-bylaws.pdf>, including the statement "IEEE standards may include the known use of patent(s),
including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents
essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of
patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development
process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair
<[email protected]> as early as possible, in written or electronic form, if patented technology (or technology under
patent application) might be incorporated into a draft standard being developed within the IEEE 802.11 Working Group. If you
have questions, contact the IEEE Patent Committee Administrator at <[email protected]>.
Submission
page 1
Stephen McCann (Roke Manor Research)
May 2006
doc.: IEEE 802.11-06/0616r0
Contents
INTRODUCTION .......................................................................................................................................................... 3
HIGHER LAYER SUPPORT........................................................................................................................................... 3
KEY COMPONENTS .................................................................................................................................................... 5
ASSUMPTIONS............................................................................................................................................................ 6
SYSTEM ASPECTS FOR SUPPORTING EMERGENCY SERVICES ...................................................................................... 6
Solution Space ...................................................................................................................................................... 6
SCENARIOS ................................................................................................................................................................ 6
UNAUTHENTICATION ACCESS.................................................................................................................................... 7
AUTHENTICATION ACCESS ........................................................................................................................................ 7
REFERENCES .............................................................................................................................................................. 7
Submission
page 2
Stephen McCann (Roke Manor Research)
May 2006
doc.: IEEE 802.11-06/0616r0
Introduction
The following document provides a quick introduction to the problem referred to as emergency call support, and
explains the motivation behind addressing this problem specifically within IEEE 802.11u, and desirable properties
of the solution.
Background
With the proliferation of VoWLAN capabilities and improvement in WLAN mobility IEEE 802.11 networks are
being increasingly used to support Voice calls. Various devices with WiFi capability are now supporting Voice calls
and these devices are also required to support Emerency Services, e.g. e911 in North Amreica and e112 in Europe.
Supporting emergency services requires a multi-layer solution with support at various layers. Apart from MAC level
access and support for transfer of data between STA and AP with appropriate QoS there is a need to setup the call,
conduct call control and management, and use an appropriate standardized audio codec.
Current IEEE 802.11 solutions provide no special handling for emergency services. Currently there are no
mechanisms for a user to determine whether an access point can provide any support for emergency services. In
order to use a public access point a user must go through the standard authentication process (e.g. EAP-based or
UAM) before being able to use the access point for emergency calls. This requires user credentials to be available,
and slows down the process of joining the network. Once the user has access to the network, there is no mechanism
to prioritise their emergency traffic over that of other users.
Location information may also be required as part of an emergency services solution. However, this is outside the
scope of IEEE 802.11u. It is believed that IEEE 802.11k together with IEEE 802.11v are working on this.
There is a need to support these emergency services both when the user has a relationship with the IEEE 802.11
network (credentials to access the network) and also when it does not have any relationship with the IEEE 802.11
network. In the latter case the STA must be able to access the network in unauthenticated state and make an
emergency service call. (As a use case consider the example when a user arrives in a new country and needs to make
an emergency call where it has no relationship with current network. However all IEEE 802.11 networks (such as
enterprise and private networks at home) may not be required to support these emergency services.
Higher Layer Support
It is essential to distinguish between IEEE 802.11 emergency services, and support of higher layer emergency
services. By “IEEE 802.11 emergency services” we refer to the direct support in IEEE 802.11 of such services,
independently of what solutions are adopted at higher protocol layers.
Within North America, if the user dials “911” in a VoIP application (e.g. SIP based), the VoIP application may
simply setup a SIP call, in which case it is transparent to IEEE 802.11. This would result in the establishment of a
higher layer emergency service. In other cases, the terminal may react by dropping the connections for the VoIP
application, and use the IEEE 802.11 emergency calls solution.
Submission
page 3
Stephen McCann (Roke Manor Research)
May 2006
doc.: IEEE 802.11-06/0616r0
SSPN
AAA Server
Local Network
AAA Proxy
Gateway
IEEE 802.11
AN
Emergency Call
Network
STA
Figure 1: Public Access Architecture
Submission
page 4
Stephen McCann (Roke Manor Research)
May 2006
doc.: IEEE 802.11-06/0616r0
Enterprise Network
AAA Server
Gateway
IEEE 802.11
AN
Emergency Call
Network
STA
Figure 1 : Enterprise Architecture
Key Components
Three key components of an IEEE 802.11u emergency services solution are:
1) Network selection – determining whether the network provides support for emergency services. There
needs to be an indication from the network about it’s ability to support Emergency services. There needs to
be an indication for availability of location services (TGk/v), availability of appropriate QoS services
(TGe/v), availability of network access in different states (TGu) and availability of a high level entity to
manage overall call process (broadcast of appropriate SSPN).
2) Network join – the STA needs to be able to join the network without any user credentials. Network access:
The user should be able to access the network and make an emergency call both when it has credentials to
access the network (State 3) and also when it does not have credentials to access the network (State 1). In
both cases the user should preferably use a common mechanism to initiate the emergency call. It would be
preferable if this can be a common access mechanism across different 802 networks such as 802.11,
802.16, etc. as well.
3) Admission control and traffic conditioning – the emergency services traffic needs to be admitted to the
network as a high priority, and given appropriate QoS treatment. In addition, the AP needs to limit the use
of the emergency service network access to emergency service traffic. The network should provide a
mechanism for appropriate QoS capabilities to initiate the e911 call. However for unauthenticated users
there needs to be some implementation of rate control to limit the impact of rogue users making crank e911
calls. The possibility of DoS (Denial of Service) attack already exists when supporting emergency services
for unauthenticated users and not much can be done about it at the 802.11 level. Other higher layers in the
system need to recognize this and take appropriate steps.
Submission
page 5
Stephen McCann (Roke Manor Research)
May 2006
doc.: IEEE 802.11-06/0616r0
4) Fast BSS transition solutions as developed by TGr should contine to apply for all cases under which user
makres an e911 call. Solutions developed to support e911 Emergency calling should not impact
mechanisms developed by TGr.
Assumptions
A number of assumptions have been made:
1) It is assumed that there is a high layer standardized protocol (or protocol suite) for making emergency calls
or using any other emergency services.
2) Any authentication or encryption of the emergency services can occur at the higher layer rather than at the
MAC layer.
3) Maintenance of an existing connection is not required when the STA needs to make use of the emergency
services. A pre-existing association with the AP could be discarded prior to the emergency call. Typically,
in today’s networks supporting emergency services, there is no need and no interest in maintaining the
current services and connections, since the priority is on the establishment of emergency services.
4) The access point separates the backhaul of emergency services traffic from other traffic. This may be in the
form of a separate physical link, dedicated VLAN, tunnelling protocol, etc.
5) When using the emergency communications access only emergency services can be accessed.
System aspects for supporting Emergency Services
Different signaling systems such as SIP, H.323, etc. can be deployed for supporting emergency calls. Clients can
also use different codecs such as G.711, AMR, Skype-like, etc. The access network like IEEE 802.11 by itself
cannot ensure that all factors are compatible for the emergency call to actually take place. The client device needs to
register with a call manager (SIP agent or some other signaling endpoint) for the call to be placed successfully. The
call manager may also verify that an appropriate emergency call is being placed so that appropriate level of
resources can be granted to the emergency call.
Solution Space
As in a cellular network, it is proposed that a user can make use of the emergency call service either by using
existing credentials, or by using an explicit unauthenticated access mechanism.
One of the security challenges is that the unauthenticated user should not be able to interfere with broadcast traffic
of other users, but does need to have broadcast support (for DHCP, ARP, etc).
Scenarios
The solutions described below primarily address the public access hotpot situation. However, consideration has to
be made for both enterprise and home scenarios, where emergency call provision may not be required. This may
result in an optional standard for the public access hotspot.
There are also some corner case scenarios, such as:
1.
Public access hotspots, which provide local intranet services only (e.g. airport timetables and departure
information), until authentication and payment is received from the user , whereupon full internet use is
authorised.
2.
Enterprise networks which support voice services, but are not connected to a fully blown AAA backend
infrastructure. In addition, some operators may not want to tie their emergency call authentication
exchange to AAA infrastructure that may be outside of their control - whilst AAA infrastructure has to be
reliable, it currently doesn't have strict high availability requirements on it
Submission
page 6
Stephen McCann (Roke Manor Research)
May 2006
doc.: IEEE 802.11-06/0616r0
Unauthentication Access
For the unauthenticated access mechanism there are several candidate techniques:
1.
Virtual AP (here referred to as “VAP solution”)
One solution to the support of unauthenticated users is for the emergency service to be provided on a
separate virtual AP. This means that the emergency user broadcast traffic is separated from that of normal
users (and the unauthenticated user does not need their group key). In particular, the solution should
ensure that unauthenticated emergency users cannot interfere with the broadcast traffic (such as DHCP,
ARP) of other authenticated users.
2.
Signalling in Association messages (here referred to as “direct signalling solution”)
An alternative to the virtual AP solution is to explicitly signal in the association exchange (direct
signalling solution) that the association is being made for the emergency calls service. No authentication
(and no 4-way handshake) is performed. The broadcast traffic must then be separately managed for the
emergency service user (which is sent unauthenticated in the clear) and the authenticated users (which
share a group key).
3.
New Ethertype for Emergency Services
The IEEE 802.1x port access entity shall allow data frames using this new Emergency services ethertype
to pass through it’s uncontrolled port. Since the uncontrolled port is always open, frames of the
emergency call service shall always pass through this port, irrespective of authentication or whether keys
are in place or not. Further this mechanism is now scalable across different networks since the same
ethertype can be used across different networks.
Authentication Access
Since this scenario implies that the user is already authenticated, a layer 3 session will already be in place, so that
end-to-end emergency call services can be provided. Hence it is not required for any standardisation to be put in
place within IEEE 802.11 and therefore this scenario can be regarded as out of scope.
References
[1] 11-06-0280r0
[2] 11-06-0288r0
[3] 11-06-0290r0
Submission
page 7
Stephen McCann (Roke Manor Research)