Hi Bo,
Can you please help queue the following SPs for 11bp May meeting agenda? All SPs are for SFD motion.
[SP1] Do you agree that 802.11bp defines an AMP Wake-Up frame, which an AMP AP transmits to AMP-enabled non-AP STA(s) to indicate that the AP intends to exchange non-AMP frames with the non-AP STA?
o
The expectation is to reuse WUR frame format for the AMP Wake-Up frame and to carry it in an AMP PPDU
Supporting contribution: 11-25/0779r0
[SP2] Do you agree that 802.11bp defines an AMP duty cycle operation for an AMP-enabled non-AP STA, which follows the
state transition diagram shown in the figure?
o
AMP duty cycle operation follows the negotiation procedure defined for WUR in the baseline
Supporting contribution: 11-25/0779r0
[SP3] Do you agree that if an AMP-enabled non-AP STA successfully receives an AMP Wake-Up frame from the associated AMP
AP, the non-AP STA should transition to the Awake State and transmit a PS-Poll/UL frame to the AP to indicate that it is in the Awake State (PS/Active mode)?
Supporting contribution: 11-25/0779r0
[SP4] Do you agree that if the non-AP STA transmits a frame with PM = 1 to the associated AP, then the non-AP may transition
to the Doze state, and the AMP-enabled non-AP STA shall enter the AMP mode?
Supporting contribution: 11-25/0779r0
[SP5] Do you agree that 802.11bp defines:
o
AMP temporal key (ATK) to protect individually addressed AMP frames
o
AMP integrity group temporal key (AIGTK) to protect group addressed AMP frames
Supporting contribution: 11-25/0779r0
[SP6] Do you agree that 802.11bp uses the baseline authentication procedure to generate AMP temporal key(s) to protect
individually and group addressed AMP frames?
Supporting contribution: 11-25/0779r0
[SP7] Do you agree that an AMP-enabled non-AP STA and the associated AMP AP use AMP mode setup to exchange AMP capabilities?
o
AMP mode setup may occur during the association procedure or post-association
Supporting contribution: 11-25/0779r0
[SP8] Do you agree that the clock error requirement of an AMP-enabled non-AP STA in AMP power state is the same as that
of an Active Tx non-AP AMP STA?
Supporting contribution: 11-25/0779r0
[SP9]: Do you agree that 802.11bp defines a mechanism to generate a transient key at the AMP client to support secure
communication, where:
-
An AP transmits a downlink frame containing an ANonce.
-
After receiving the downlink AMP frame from the AP that contains an ANonce, an AMP client generates an SNonce.
-
The client generates a transient key using the ANonce, the SNonce, and a Pairwise Master Key (PMK) between the AP and the client.
-
Note1—The mechanism to generate PMK is TBD.
-
Note2—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
[SP10]: Do you agree that 802.11bp defines a mechanism to generate a transient key at the AP to support secure communication,
where:
-
In response to the downlink AMP frame from the AP that contains an ANonce, the AMP client transmits an uplink AMP frame that carries the SNonce and a MIC.
-
The client generates the MIC using the derived transient key at the client.
-
If the MIC is verified, the AP uses the ANonce it transmitted in the previous downlink AMP frame, the SNonce, and the PMK to generate the transient key.
-
Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
[SP11]: Do you agree that the transient key generation at the AP and the AMP client in 802.11bp may occur concurrently
with AMP downlink and uplink data communication:
·
The downlink AMP frame from the AP carries ANonce along with downlink data from the AP (e.g., AMP trigger).
·
The uplink AMP frame from the AMP client carries SNonce and MIC along with the UL data (e.g., UL response to the AMP trigger).
·
Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
[SP12]: Do you agree that the transient key generation at the AP and the AMP client in 802.11bp may be performed immediately
before AMP downlink and uplink data communication:
-
Once the transient key is derived at both the AP and the AMP client, subsequent AMP data communication between the AP and the client can be secured using MIC and/or encryption based on the generated transient key.
-
Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
Best,
Sanket