Thread Links Date Links
Thread Prev Thread Next Thread Index Date Prev Date Next Date Index

[STDS-802-11-TGBP] SP request



Hi Bo,

Can you please help queue the following SPs for 11bp May meeting agenda? All SPs are for SFD motion.

[SP1] Do you agree that 802.11bp defines an AMP Wake-Up frame, which an AMP AP transmits to AMP-enabled non-AP STA(s) to indicate that the AP intends to exchange non-AMP frames with the non-AP STA?
    • The expectation is to reuse WUR frame format for the AMP Wake-Up frame and to carry it in an AMP PPDU
Supporting contribution: 11-25/0779r0
 
[SP2] Do you agree that 802.11bp defines an AMP duty cycle operation for an AMP-enabled non-AP STA, which follows the state transition diagram shown in the figure?
    • AMP duty cycle operation follows the negotiation procedure defined for WUR in the baseline
Supporting contribution: 11-25/0779r0
 
[SP3] Do you agree that if an AMP-enabled non-AP STA successfully receives an AMP Wake-Up frame from the associated AMP AP, the non-AP STA should transition to the Awake State and transmit a PS-Poll/UL frame to the AP to indicate that it is in the Awake State (PS/Active mode)?
Supporting contribution: 11-25/0779r0

 
[SP4] Do you agree that if the non-AP STA transmits a frame with PM = 1 to the associated AP, then the non-AP may transition to the Doze state, and the AMP-enabled non-AP STA shall enter the AMP mode?
Supporting contribution: 11-25/0779r0
 
[SP5] Do you agree that 802.11bp defines:
    • AMP temporal key (ATK) to protect individually addressed AMP frames
    • AMP integrity group temporal key (AIGTK) to protect group addressed AMP frames
Supporting contribution: 11-25/0779r0
 
[SP6] Do you agree that 802.11bp uses the baseline authentication procedure to generate AMP temporal key(s) to protect individually and group addressed AMP frames?
Supporting contribution: 11-25/0779r0
 
[SP7] Do you agree that an AMP-enabled non-AP STA and the associated AMP AP use AMP mode setup to exchange AMP capabilities?
    • AMP mode setup may occur during the association procedure or post-association
Supporting contribution: 11-25/0779r0
 
[SP8] Do you agree that the clock error requirement of an AMP-enabled non-AP STA in AMP power state is the same as that of an Active Tx non-AP AMP STA?
Supporting contribution: 11-25/0779r0
 
[SP9]: Do you agree that 802.11bp defines a mechanism to generate a transient key at the AMP client to support secure communication, where:
  • An AP transmits a downlink frame containing an ANonce.
  • After receiving the downlink AMP frame from the AP that contains an ANonce, an AMP client generates an SNonce.
  • The client generates a transient key using the ANonce, the SNonce, and a Pairwise Master Key (PMK) between the AP and the client.
  • Note1—The mechanism to generate PMK is TBD.
  • Note2—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
[SP10]: Do you agree that 802.11bp defines a mechanism to generate a transient key at the AP to support secure communication, where:
  • In response to the downlink AMP frame from the AP that contains an ANonce, the AMP client transmits an uplink AMP frame that carries the SNonce and a MIC.
    • The client generates the MIC using the derived transient key at the client.
  • If the MIC is verified, the AP uses the ANonce it transmitted in the previous downlink AMP frame, the SNonce, and the PMK to generate the transient key.
  • Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
[SP11]: Do you agree that the transient key generation at the AP and the AMP client in 802.11bp may occur concurrently with AMP downlink and uplink data communication:
  • The downlink AMP frame from the AP carries ANonce along with downlink data from the AP (e.g., AMP trigger).
  • The uplink AMP frame from the AMP client carries SNonce and MIC along with the UL data (e.g., UL response to the AMP trigger).
  • Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
[SP12]: Do you agree that the transient key generation at the AP and the AMP client in 802.11bp may be performed immediately before AMP downlink and uplink data communication:
  • Once the transient key is derived at both the AP and the AMP client, subsequent AMP data communication between the AP and the client can be secured using MIC and/or encryption based on the generated transient key.
  • Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
Best,
Sanket

To unsubscribe from the STDS-802-11-TGBP list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBP&A=1