Thread Links | Date Links | ||||
---|---|---|---|---|---|
Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
Hi Bo,
Can you please help queue the following SPs for 11bp May meeting agenda? All SPs are for SFD motion.
[SP1] Do you agree that 802.11bp defines an AMP Wake-Up frame, which an AMP AP transmits to AMP-enabled non-AP STA(s) to indicate that the AP intends to exchange non-AMP frames with the non-AP STA?
- The expectation is to reuse WUR frame format for the AMP Wake-Up frame and to carry it in an AMP PPDU
Supporting contribution: 11-25/0779r0[SP2] Do you agree that 802.11bp defines an AMP duty cycle operation for an AMP-enabled non-AP STA, which follows the state transition diagram shown in the figure?
- AMP duty cycle operation follows the negotiation procedure defined for WUR in the baseline
Supporting contribution: 11-25/0779r0[SP3] Do you agree that if an AMP-enabled non-AP STA successfully receives an AMP Wake-Up frame from the associated AMP AP, the non-AP STA should transition to the Awake State and transmit a PS-Poll/UL frame to the AP to indicate that it is in the Awake State (PS/Active mode)?Supporting contribution: 11-25/0779r0
[SP4] Do you agree that if the non-AP STA transmits a frame with PM = 1 to the associated AP, then the non-AP may transition to the Doze state, and the AMP-enabled non-AP STA shall enter the AMP mode?Supporting contribution: 11-25/0779r0[SP5] Do you agree that 802.11bp defines:
- AMP temporal key (ATK) to protect individually addressed AMP frames
- AMP integrity group temporal key (AIGTK) to protect group addressed AMP frames
Supporting contribution: 11-25/0779r0[SP6] Do you agree that 802.11bp uses the baseline authentication procedure to generate AMP temporal key(s) to protect individually and group addressed AMP frames?Supporting contribution: 11-25/0779r0[SP7] Do you agree that an AMP-enabled non-AP STA and the associated AMP AP use AMP mode setup to exchange AMP capabilities?
- AMP mode setup may occur during the association procedure or post-association
Supporting contribution: 11-25/0779r0[SP8] Do you agree that the clock error requirement of an AMP-enabled non-AP STA in AMP power state is the same as that of an Active Tx non-AP AMP STA?Supporting contribution: 11-25/0779r0[SP9]: Do you agree that 802.11bp defines a mechanism to generate a transient key at the AMP client to support secure communication, where:
- An AP transmits a downlink frame containing an ANonce.
- After receiving the downlink AMP frame from the AP that contains an ANonce, an AMP client generates an SNonce.
- The client generates a transient key using the ANonce, the SNonce, and a Pairwise Master Key (PMK) between the AP and the client.
- Note1—The mechanism to generate PMK is TBD.
- Note2—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112[SP10]: Do you agree that 802.11bp defines a mechanism to generate a transient key at the AP to support secure communication, where:
- In response to the downlink AMP frame from the AP that contains an ANonce, the AMP client transmits an uplink AMP frame that carries the SNonce and a MIC.
- The client generates the MIC using the derived transient key at the client.
- If the MIC is verified, the AP uses the ANonce it transmitted in the previous downlink AMP frame, the SNonce, and the PMK to generate the transient key.
- Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112[SP11]: Do you agree that the transient key generation at the AP and the AMP client in 802.11bp may occur concurrently with AMP downlink and uplink data communication:
- The downlink AMP frame from the AP carries ANonce along with downlink data from the AP (e.g., AMP trigger).
- The uplink AMP frame from the AMP client carries SNonce and MIC along with the UL data (e.g., UL response to the AMP trigger).
- Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112[SP12]: Do you agree that the transient key generation at the AP and the AMP client in 802.11bp may be performed immediately before AMP downlink and uplink data communication:
- Once the transient key is derived at both the AP and the AMP client, subsequent AMP data communication between the AP and the client can be secured using MIC and/or encryption based on the generated transient key.
- Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112Best,Sanket
To unsubscribe from the STDS-802-11-TGBP list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBP&A=1
To unsubscribe from the STDS-802-11-TGBP list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBP&A=1