Thread Links Date Links
Thread Prev Thread Next Thread Index Date Prev Date Next Date Index

Re: [STDS-802-11-TGBP] SP request



Hi Bo,

Based on some offline discussions, I have updated SP9 - SP12 from the following list. Can you please update them on the agenda as well?

Thanks,
Sanket Kalamkar

[SP9]: Do you agree that 802.11bp defines a mechanism to generate a transient key at the AMP non-AP STA to support secure communication, where:
  • An AMP AP transmits a downlink frame containing an ANonce.
  • After receiving the downlink AMP frame from the AMP AP that contains an ANonce, an AMP non-AP generates an SNonce.
  • The AMP non-AP generates a transient key using the ANonce, the SNonce, the Authenticator Address (AA), the Supplicant Address (SA), and a Pairwise Master Key (PMK) between the AP and the client.
  • Note—Whether to include backscatter non-AP STAs in this procedure is TBD.
Supporting document: 11-24/1998, 11-24/2112, 11-25/0860r0, 11-24/1203r0
 
[SP10]: Do you agree that 802.11bp defines a mechanism to generate a transient key at the AP to support secure communication, where:
  • In response to the downlink AMP frame from the AMP AP that contains an ANonce, the AMP non-AP STA transmits an uplink AMP frame that carries the SNonce and a MIC.
    • The AMP non-AP STA generates the MIC using the derived transient key at the AMP non-AP STA.
    • If the uplink AMP frame is carrying any UL data, the data payload portion of the uplink AMP frame may be encrypted using the transient key generated at the AMP non-AP STA.
  • If the MIC is verified:
    • The AP uses the ANonce it transmitted in the previous downlink AMP frame, the SNonce, the Authenticator Address (AA), the Supplicant Address (SA), and the PMK to generate the transient key.
    • Using the generated transient key, the AMP AP decrypts the UL data payload (if the payload was encrypted).
  • Note—Whether to include backscatter non-AP STAs in this procedure is TBD.
Supporting document: 11-24/1998, 11-24/2112, 11-25/0860r0, 11-24/1203r0

[SP11]: Do you agree that the transient key generation at the AP and the AMP client in 802.11bp may occur concurrently with AMP downlink and uplink data communication:
  • The downlink AMP frame from the AP carries ANonce along with downlink data from the AP (e.g., AMP trigger).
  • The uplink AMP frame from the AMP client carries SNonce and MIC along with the UL data (e.g., UL response to the AMP trigger).
    • The UL data may be encrypted using the transient key generated at the AMP non-AP STA.
  • Note—Whether to include backscatter non-AP STAs in this procedure is TBD.
Supporting document: 11-24/2112, 11-25/0860r0, 11-24/1203r0

[SP12]: Do you agree that the transient key generation at the AP and the AMP client in 802.11bp may be performed immediately before AMP downlink and uplink data communication:
  • Once the transient key is derived at both the AP and the AMP client, subsequent AMP data communication between the AP and the client can be secured using MIC and/or encryption based on the generated transient key.
  • Note—Whether to include backscatter non-AP STAs in this procedure is TBD.
Supporting document: 11-24/2112


From: Sanket Kalamkar <sankal@xxxxxxxxxxxxxxxx>
Sent: Wednesday, May 14, 2025 6:10 PM
To: STDS-802-11-TGBP@xxxxxxxxxxxxxxxxx <STDS-802-11-TGBP@xxxxxxxxxxxxxxxxx>
Subject: SP request
 
Hi Bo,

Can you please help queue the following SPs for 11bp May meeting agenda? All SPs are for SFD motion.

[SP1] Do you agree that 802.11bp defines an AMP Wake-Up frame, which an AMP AP transmits to AMP-enabled non-AP STA(s) to indicate that the AP intends to exchange non-AMP frames with the non-AP STA?
    • The expectation is to reuse WUR frame format for the AMP Wake-Up frame and to carry it in an AMP PPDU
Supporting contribution: 11-25/0779r0
 
[SP2] Do you agree that 802.11bp defines an AMP duty cycle operation for an AMP-enabled non-AP STA, which follows the state transition diagram shown in the figure?
    • AMP duty cycle operation follows the negotiation procedure defined for WUR in the baseline
Supporting contribution: 11-25/0779r0
 
[SP3] Do you agree that if an AMP-enabled non-AP STA successfully receives an AMP Wake-Up frame from the associated AMP AP, the non-AP STA should transition to the Awake State and transmit a PS-Poll/UL frame to the AP to indicate that it is in the Awake State (PS/Active mode)?
Supporting contribution: 11-25/0779r0

 
[SP4] Do you agree that if the non-AP STA transmits a frame with PM = 1 to the associated AP, then the non-AP may transition to the Doze state, and the AMP-enabled non-AP STA shall enter the AMP mode?
Supporting contribution: 11-25/0779r0
 
[SP5] Do you agree that 802.11bp defines:
    • AMP temporal key (ATK) to protect individually addressed AMP frames
    • AMP integrity group temporal key (AIGTK) to protect group addressed AMP frames
Supporting contribution: 11-25/0779r0
 
[SP6] Do you agree that 802.11bp uses the baseline authentication procedure to generate AMP temporal key(s) to protect individually and group addressed AMP frames?
Supporting contribution: 11-25/0779r0
 
[SP7] Do you agree that an AMP-enabled non-AP STA and the associated AMP AP use AMP mode setup to exchange AMP capabilities?
    • AMP mode setup may occur during the association procedure or post-association
Supporting contribution: 11-25/0779r0
 
[SP8] Do you agree that the clock error requirement of an AMP-enabled non-AP STA in AMP power state is the same as that of an Active Tx non-AP AMP STA?
Supporting contribution: 11-25/0779r0
 
[SP9]: Do you agree that 802.11bp defines a mechanism to generate a transient key at the AMP client to support secure communication, where:
  • An AP transmits a downlink frame containing an ANonce.
  • After receiving the downlink AMP frame from the AP that contains an ANonce, an AMP client generates an SNonce.
  • The client generates a transient key using the ANonce, the SNonce, and a Pairwise Master Key (PMK) between the AP and the client.
  • Note1—The mechanism to generate PMK is TBD.
  • Note2—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
[SP10]: Do you agree that 802.11bp defines a mechanism to generate a transient key at the AP to support secure communication, where:
  • In response to the downlink AMP frame from the AP that contains an ANonce, the AMP client transmits an uplink AMP frame that carries the SNonce and a MIC.
    • The client generates the MIC using the derived transient key at the client.
  • If the MIC is verified, the AP uses the ANonce it transmitted in the previous downlink AMP frame, the SNonce, and the PMK to generate the transient key.
  • Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
[SP11]: Do you agree that the transient key generation at the AP and the AMP client in 802.11bp may occur concurrently with AMP downlink and uplink data communication:
  • The downlink AMP frame from the AP carries ANonce along with downlink data from the AP (e.g., AMP trigger).
  • The uplink AMP frame from the AMP client carries SNonce and MIC along with the UL data (e.g., UL response to the AMP trigger).
  • Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
[SP12]: Do you agree that the transient key generation at the AP and the AMP client in 802.11bp may be performed immediately before AMP downlink and uplink data communication:
  • Once the transient key is derived at both the AP and the AMP client, subsequent AMP data communication between the AP and the client can be secured using MIC and/or encryption based on the generated transient key.
  • Note—Whether to include backscatter clients is TBD.
Supporting document: 11-24/2112
Best,
Sanket

To unsubscribe from the STDS-802-11-TGBP list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBP&A=1