throbber
Servi
`-s
`Digital Access Service
`(DAS)
`
`WIPO
`WORLD
`INTELLECTUAL PROPERTY
`ORGANIZATION
`
`CERTIFICATE OF AVAILABILITY OF A CERTIFIED PATENT DOCUMENT INA
`DIGITAL LIBRARY
`
`The International Bureau certifies that a copy of the patent application indicated
`
`below has been available to the WIPO Digital Access Service since the date of
`availability indicated, and that the patent application has been available to the
`indicated Office(s) as of the date specified following the relevant Office code:
`
`Documentdetails:|Country/Office: JP
`
`Filing date:
`
`O02 Nov 2017 (02.11.2017)
`
`Application number: 2017-212884
`
`Date of availability of document:
`
`06 Nov 2017 (06.11.2017)
`
`The following Offices can retrieve this document by using the access code:
`JP, US, SE, NZ, KR, EA, IN, BR, GB, AU, EP, ES, IB, EE, CN, MA, FI
`
`Date of issue of this certificate:
`
`07 May 2018 (07.05.2018)
`
`34, chemin des Colombettes
`
`
`
`

`

`H A El
`
`OF
`
`AF
`
`OPP
`
`JAPAN PATENT OFFICE
`
`ABST OBR TRS NCVZLHBRAPROMMBMK MRE
`WS BIBL fl — CHAS teak yZ .
`This is to certify that the annexed is a true copy of the following application as filed
`with this Office.
`
`T
`
`OA
`HBR fF OA
`Date of Application:
`
`i i ee
`Application Number:
`
`
`AN) HILL SHEA OB
`(ALY S ESRD ERO RM
`ce SHRORI— Fe oe
`BS
`The country code and number
`of your priority application,
`to be used for filing abroad
`under the Paris Convention, is
`
`Hy
`
`We
`
`A
`
`Applicant(s):
`
`20174F11A 24
`
`fe2017—-212884
`
`JP2017—212884
`
`WIVAVYI AVFVIFAYNM FON
`—Yayv AT yYAUA
`
`I— RY
`
`rary & EB
`Commissioner,
`Japan Patent Office
`
`
`
`#
`
`

`

`(Ae ]
`CAS]
`CRF ad S404)
`(HET)
`(dC 5G]
`CEE BaarPA
`(seH a]
`(Cerri ds rr)
`
`(G44)
`(Se)
`(ErrIe)
`
`(44)
`(FéHI 2 )
`(eArXIeAr)
`(44)
`CFF ELA)
`Canal Ae]
`(4 KIL]
`
`FFPFREL
`P100926902
`RPA 3 6 RO 2S LIBOMMICkS RH
`Ae2HE LA 271
`Tea eeBe ErIe
`HO4W 88/00
`
`|
`YU ARK- IY 202 KAByF PHYA FRrma=a-
`#O2—11 WHYSEYIA?
`FrUM FYYR FA- HYR
`— YYVARA— FHATAVavy ADF WV FV
`TF WYIAVYI SPI7R—p ViFvkwn
`FIA-W AY¥Y
`
`YYAR—Y 202 REYF YFUA ~Rrra- 1
`#HO2—11 WHVSYIA FY-NW FYE FA- HY
`— YYAR—NV FATAVaY AT KRIVSAVI FV
`TF WYIAVYID SI7R—-p VFvy A
`mryv ut
`
`AIAG MELTAEE 1 0 0 6 AR SPY Sy THERA
`WE SEK
`
`514136668
`IFYaRVYID AYFVIF ATW PANFH A-W-VY
`av AF FRU
`
`100105050
`
`(AREA)
`Cio aS)
`(FFHEt)
`mH
`(Re MISA iN)
`(8) eA ic KS HES ESE OD EG]
`(4)
`FAVAGRE
`CHAR A)
`201746 6H 15H
`62/520, 452
`CHR)
`(HRA 4)
`RFF
`(yV7RAI—F})
`1267
`(Bel Henk Wertecke] CRED)
`[FARO RA)
`(SMAI)
`Ci<iA
`feHe A eK]
`Ctr 44
`CHE]
`CHE]
`Cte 44
`(ERAS)
`
`]
`
`[Ue RA TSHES
`
`041243
`22, O0OFJ
`
`Sasa
`Sh aeARAFan RkOe 1
`TE ieee 1
`Phe need it
`1
`1406849
`
`

`

`CA] ob ne A AE
`
`Title of the Invention
`
`COMMUNICATION APPARATUS AND METHOD FOR SECURE LOW POWER
`TRANSMISSION
`
`Technical Field
`
`The present disclosure is generally related to a communication apparatus and a
`
`communication method.
`
`Background Art
`
`The IEEE(Institute of Electrical and Electronics Engineers) 802,11ba Taskgroup is
`
`currently in the process of standardizing wireless communication technologies related to
`
`the operations of a wake-up radio (WUR) apparatus. The WURapparatus is a companion
`
`radio apparatus to the primary connectivity radio (PCR) apparatus and may operate in the
`
`same frequency band as the PCR or mayalso operate in a different frequency band. The
`
`PCR may be any of the existing mainstream IEEE 802.11 amendments (802.11a, 802.11,
`
`802.11n or 802.1 lac) or even other applicable future amendments(e.g. 802.1 lax). The
`
`purpose of the WURapparatusis to triggerthe transition of the PCR apparatus out of
`
`sleep upon reception of a valid wake-up packet (also known as WUR PHYProtocol Data
`
`Unit (PPDU)) , while the PCRis used as the primary wireless communication radio. The
`
`PCRapparatus is only turned on during active communication, while during period of
`
`idle listening, the PCR apparatus is turned off and only the WUR apparatus is operating.
`
`The WURapparatus is expected to have active receiver power consumption less than one
`
`milliwatt, which is much lesser compared to the active receiver power consumption of
`
`the PCR apparatus. Devices with a WUR apparatus may be called WUR devices and
`
`WUR. mode may refer to operation mode where only the WURis in operation while the
`
`PCRis turned off, while PCR mode mayrefer to operations with the PCR apparatus
`
`turned on.
`
`The IEEE 802.1 1ba amendmentis targeted at applications and Internet-of-Things
`
`(JOT) use cases in which the communication devices are usually powered by a battery
`
`and it is highly desirable to extend the battery lifetime while maintaining reasonably low
`
`latency.
`
`

`

`Citation List
`Non Patent Litcrature
`[NPL 1] IEEE Std 802,11-2016
`[NPL 2] IEEE 802.11-17/057512, Specification Framework for TGba, July 2017
`
`[NPL 3] IEEE 802.11-16/0722r1, “Proposal for Wake-Up Receiver (WUR) Study
`
`Group”
`
`[NPL 4] IEEE 802.11-17/0660r0, “WUR Security Proposal”
`[NPLS] Ching-Tsung Hsuehet. al. , “A Secure Scheme Against Power Exhausting
`
`Attacks in Hicrarchical Wireless Sensor Networks”
`
`Patent Literature
`[PL 1] US2017/0099662AI ~ Pascal Thubert et. al. , “Dynamically hashed MAC
`
`address for transmission in a network”
`
`Disclosure Summary of Invention
`Technical Problem
`
`Since much of the power saving for WUR devices is expected to be a result of the
`devices turning off the main PCR apparatus and staying in the WUR mode for extended
`period of time, unnecessary switching to the PCR modeis detrimental to the device’s
`battery life. Duc to the low data rates available for communication in the WUR mode, the
`WURsignal is expected to be much simpler and shorter as compared to the PCR signal.
`As aresult, WURsignals are very easy to be captured and reproduced by malicious
`
`devices for ulterior motives. This makes WUR devices especially susceptible to replay
`
`aliacks, whereby an attacker captures genuine WURsignals used by a central controller
`
`to wake up WUR devices and uses them in the future to falsely wake up the WOR
`
`devices with the intent of causing battery drainage. Such attacks may also be known as
`
`power exhausting attacks or denial of sleep attacks.
`One non-limiting and exemplary embodimentof the present disclosure provides means
`for transmission and reception of secure WURsignals and prevent the above mentioned
`
`malicious attacks on WUR devices.
`
`Solution to Problem
`
`In one general aspect, the techniques disclosed here features: a communication
`
`2
`
`

`

`apparatus comprising a cryptographic circuitry which, in operation, uses a shared
`
`cryptographic secret Key and a cryptographic salt to generate a cryptographically
`
`encoded MessageIntegrity Code (MIC) that is computed overthe address field of a
`
`Wake Up Radio (WUR)frame; and a transmission signal generator which, in operation,
`generates a secure WUR signal by replacing the address field of the WUR framewith the
`
`MIC; and a transmitter which, in operation, transmits the secure WURsignal.
`
`It should be noted that genera! or specific embodiments may be implemented as a
`
`system, a method, an integrated circuit, a computer program, a storage medium, or any
`
`selective combination thereof.
`
`Advantageous Effects of Invention
`The communication appatatus and communication method described in the present
`
`disclosure provides means for transmission and reception of secure WURsignals and
`
`prevent false wake ups as a result of malicious attacks on WUR devices.
`
`Additional benefits and advantages of the disclosed embodiments will become apparent
`
`from the specification and drawings. The benefits and/or advantages may be individually
`obtained by the various embodiments and features of the specification and drawings,
`
`which need notall be provided in order to obtain one or more of such benefits and/or
`
`advantages.
`
`Brief Description of the Drawings
`
`[Fig. 1]
`Figure 1 shows an example heterogeneous 802.11 wireless network with a mixture of
`genuine and malicious WURcapable devices.
`
`[Fig. 2]
`
`Figure 2 shows the format of WUR PPDU being considered in the 802.11ba Taskgroup.
`
`[Fig. 3]
`
`Figure 3 depicts a frame transmission sequencethatillustrates an example of a malicious
`
`attack,
`
`[Fig. 4]
`Figure 4 depicts a frame transmission sequence used to negotiate/initiate WUR mode as
`
`perthe first embodiment.
`
`[Fig. 5]
`
`

`

`Figure 5 shows the format of the WUR Action frame used for WUR mode
`
`negotiation/initiation as per the first embodiment.
`
`[Fig. 6]
`
`Figure 6 depicts the 4-way handshake used to obtain the secret keys to be used in secure
`
`transmissions.
`
`[Fig. 7]
`
`Figure 7 is a table of the encoding of the Cipher suite field in WUR security element as
`
`perthe first embodiment.
`
`[Fig. 8]
`
`Figure 8 shows the frame format proposed for secure WUR framesas perthe first
`
`embodiment.
`
`[Fig. GA]
`
`Figure 9A showsan alternative frame format proposed for secure WUR. framesas per the
`
`first embodiment.
`
`[Fig. 9B]
`
`Figure 9B shows the format of the WUR Action frame used for notifying the
`
`cryptographic salt value as perthe first embodiment.
`
`[Fig. LOA]
`
`Figure 10A showsthe frame format proposed for secure WUR framesas per the second
`
`embodiment.
`
`[Fig. 10B}
`
`Figure 10B showsthe format of the WUR Action frame used for notifying the MIC as
`
`perthe second embodiment.
`
`[Fig. L1A]
`
`Figure 11A depicts a first frame transmission sequence used in secure WUR
`
`transmissions as per the third embodiment.
`
`jFig. 11B]
`
`Figure 11B depicts a second frame transmission sequence used in secure WUR
`
`transmissions as perthe third embodiment.
`
`[Fig. 12]
`
`Figure 12 depicts a frame transmission sequence used in secure WURtransmissionsas
`
`perthe fourth embodiment.
`
`[Fig. 13]
`
`

`

`Figure 13 shows the format of the WUR Action frame used for notifying a cryptographic
`
`salt range as perthe fifth embodiment.
`
`[Fig. 14]
`
`Figure 14 is a table of example MIC valuesas perthe fifth embodiment.
`
`[Fig. 15]
`Figure 15 showsthe frame format proposed for secure WUR frames as perthe fifth
`
`embodiment.
`
`[Fig. 16]
`Figure 16 shows the frame format proposed for secure multicast WUR frames as per the
`
`fifth embodiment.
`
`[Fig. 17]
`
`Figure 17 shows the format of the Timing Synchronization Function (TSF)field as per
`
`the sixth embodiment.
`
`[Fig. 18]
`Figure 18 shows the frame format proposed for secure WUR framesas perthe sixth
`
`embodiment.
`
`[Fig. 19]
`Figure 19 is a table of an example clock drift issue that may occur when P-TSFis used
`
`for time synchronization.
`
`[Fig. 20]
`
`Figure 20 showsthe intermediate process of creating the TSF field for inpul to the WUR
`
`authentication module as per the sixth embodiment.
`
`[Fig. 21]
`Figure 21 shows an example process to create secure WURframesat the transmitter side
`
`as per the sixth embodiment.
`
`[Fig. 22]
`Figure 22. shows an example process to verify secure WUR framesat the receiver side as
`
`perthe sixth embodiment.
`
`[Fig. 23]
`Figure 23 showsa frame formal proposed for secure multicast WUR frames as per the
`
`sixth embodiment.
`
`{Fig. 24]
`
`Figure 24 showsan alternate frame format proposed for secure multicast WUR frames as
`
`5
`
`

`

`per the sixth embodiment.
`
`[Fig.25]
`
`Figure 25 showsthe frame format proposed for unsecure WUR framesas perthe sixth
`
`embodiment.
`
`[Fig. 26]
`
`Figure 26 showsthe format of the Packet Number (PN)field as per the seventh
`
`embodiment.
`
`[Fig. 27]
`
`Figure 27 shows a frame format proposed for secure WUR frames as per the seventh
`
`embodiment.
`
`[Fig. 28]
`
`Figure 28 shows a frame format proposed for updating the PN field as per the seventh
`
`embodiment.
`
`[Fig. 29]
`
`Figure 29 shows a frame format proposed for secure WURframesas perthe eight
`
`embodiment.
`
`[Fig. 30]
`
`Figure 30 is a simplified block diagram of an example AP that implements the disclosed
`
`transmission scheme.
`
`[Fig.31]
`
`Figure 31 is a detailed block diagram of an example AP that implements the disclosed
`transmission scheme.
`
`[Fig. 32]
`
`Figure 32 is a simplified block diagram of an example WUR STA that implements the
`
`disclosed transmission scheme.
`
`|Fig. 33]
`
`Figure 33 is a detailed block diagram of an example WUR STAthat implements the
`
`disclosed transmission scheme.
`
`Description of Embodiments
`The present disclosure can be better understood with the aid of following figures and
`
`embodiments. The embodiments described here are merely exemplary in nature and are
`
`6
`
`

`

`used to describe some of the possible applications and uses of the present disclosure and
`
`should not be taken as limiting the present disclosure with regard to alternative
`
`embodiments that are not explicitly described herein.
`
`Figure 1 shows an example of a wireless communication network 100 in which the
`present disclosure may be applied. The wireless communication may be based on popular
`
`wireless standards such as IEEE 802.11. The wireless communication network 100 may
`
`comprise an Access Point (AP) 110 and three stations (STA) 120, 130 and 140 associated
`with the AP 110. The AP 110 is equipped with a Primary Connectivity Radio (PCR)
`
`apparatus (hereinafter stated simply as “PCR”) 112 whichis capable of transmitting and
`receiving wireless signals in the 802.11 waveform (e.g. Orthogonal Frequency Division
`Multiplexing (OFDM)) as well as being capable of transmitting wireless signals in the
`Wake-up radio (WUR) waveform (e.g. On-Off Keying (OOK)). STAs 120, 130 and 140
`
`are WUR capable STAs and are equipped with PCRs 122, 132 and 142 respectively as
`
`well as Wake-up radio receivers (WURx) apparatus (hereinafter stated simply as
`“WURx”) 124, 134 and 144 respectively. STAs 130 and 140 are capable of transmitting
`and receiving 802.11 signals and are also capable of receiving WURsignals, The PCRs
`
`132 and 142 may only be turned on during active communication (PCR mode), while
`
`during period ofidle listening, the PCRs may be turned off and only the WURx 134 and
`
`144 may be operating (WUR mode). STA 120 however may be a custom made device
`that has ali the functionalities of a WUR capable STA andin addition is PCR 122 also
`
`has the ability to transmit wireless signals in the Wake-up radio (WUR) waveform
`
`((OOK), Or STA 120 may simply be a device that possesses both the WUR AP
`
`functionalities as well as the WUR STA functionalities. When the AP 110 needs to
`
`communicate with STAsoperating in WUR mode,it may first transmit wake-up signal to
`
`instruct the STAsto transit to PCR. mode by turning on the respective PCRs and
`
`switching off the WURx. Subsequently the AP and the STAs may perform
`
`communication over the PCR. Once the communication is over, the STAs may switch
`
`back to WUR mode by switching off the PCR and turning on the WURx.
`
`Figure 2 shows the wake-up signal transmission scheme being considered in the IEEE
`
`802.11ba Taskgroup. The wake-up signal may be represented as the WUR PHY Protocol
`Data Unit (PPDU) 200. The WUR PPDU 200 is composed of two distinct portions, The
`
`7
`
`

`

`first portion is comprised of a 20 MHz legacy (also known as non-high-throughput (HT))
`802.11 preamble 210 and one extra OFDM symbol 218 called WUR Mark, which are
`transmitted in the 802.11 OFDM waveform overthe entire 20 MHz channel. The second
`
`portion is the wake-up packet (WUP) payload 220 whichis transmitted ina WUR OOK
`waveform in a narrowersub-channel within the 20 MHz channel, for example a 4 MHz
`
`sub-channel. Although only a single WUP Payload 220 is shown in Figure 2,it is also
`
`possible that more than one, for example three WUP Payloads, are transmitted on
`different, non-overlapping sub-channels within the 20 MHz channel.
`
`The legacy 802.11 preamble 210 provides coexistence with legacy 802.11 STAsthat
`do not understand the WURsignals. Preamble 210 further comprises a non-HT Short
`
`Training Field (L-STF) 212, a non-HT Long Training Field (L-LTF) 214 and a non-HT
`SIGNALfield (L-SIG) 216. The L-SIG 216 carries information regarding the length of
`the WUP payload 220, allowing legacy 802.11 devices to defertheir transmissions for
`the correct duration. The WUR Mark 218 of duration 4 micro-seconds modulated in
`
`Binary Phase Shift Keying (BPSK)is transmitted right after the L-SIG 216 to prevent
`$02.11n devices from wrongly decoding the WUR PPDU 200 as being an 802.11n packet.
`
`The WUP Payload 220 carries the actual wake-up signal and comprises a wake-up
`preamble 222 and a WURframe 230. The wake-up preamble 222 is used for automatic
`gain control (AGC), timing synchronization, packet detection etc., while the WUR frame
`230 carries the control information. The WUR frame 230 may also be known as a WUR
`
`MACProtocol Data Unit (MPDU) and maybe further composed of various sub-fields
`such as a MAC header240, a Frame check sequence (FCS) 252 as well as the optional
`
`Frame body 250. The MAC header 240 may be further comprised of a Frame control
`field 242 that species the frame Type, frame length etc., an Address field 242 that may
`carry eitherone ofthe ‘lransmitter Address, Receiver address or both. Other control
`information may be carried in the TD Controlfield 246 depending on the frame Type.
`For example in WURbeaconframes, the TD Control field 246 may carry a timestamp
`field, while in unicast WUR frames, the TD Control field 246 may carry a packet number
`
`etc.
`
`Figure 3 depicts a frame transmission sequence 300 that illustrates an example replay
`attack launched by an attacker in the wireless network 100 in Figure 1. The attacker may
`
`be the STA 120 in Figure 1, while the AP and the STA may be the AP 110 and STA 130
`
`8
`
`

`

`in Figure 1 respectively. STA 130 may have undergone WUR mode negotiation with AP
`
`110 and maybe operating in WUR mode with only its WORx 134 in operation while its
`
`PCR 132 is tumed off. The attacker STA 120 on the other hand has both its WURx 124
`
`as well as PCR 122 turned on and may be monitoring the traffic between AP 110 and
`
`STA 130. When the AP 110 gets data from the upper layer protocol destined for STA
`
`130, it saves the data frame in buffer and transmits a WUR PPDU 310 to wake STA 130.
`
`Uponreceiving the WUR PPDU 310, STA 130 verifies that the PPDU is addressed to it
`
`and proceedsto turn on its PCR 132 and transmit a PS-Poll frame 312 to the AP 110. In
`
`the meanwhile, the WURx 124 of attacker 120 also receives the WUR PPDU 310 and
`
`saves it in memory for future use. The AP 110 responds to the PS-Poll frame 312 by
`
`transmitting the buffered data frame 314 to STA 130. STA 130 confirmsthe receipt of
`
`the data frame 314 by sending the acknowledgement (ACK) frame 316 to the AP 110 and
`
`may proceed to WUR modeby turning off its PCR radio 132. At a later point in time, the
`
`attacker STA 120 may use the captured WUR PPDU 310 to launch a replay attack on
`
`STA 130 by retransmitting the WUR PPDU 310 toit, causing it to transition to PCR
`
`mode. Since the WUR PPDU 320 is a replay of a valid WUR PPDUtransmitted by AP
`
`110 in the past, it appears to be a valid WUR PPDU to STA 130 and it may proceed to
`
`transmit another PS-Poll frame 322 and may wait for AP 110 to send data frametoit.
`
`Eventually, when STA 130 does not receive any frames from the AP, it may time out of
`
`the PCR mode and goes back to WUR mode, howeverit would already have lost some
`
`powerunnecessarily transitioning to PCR mode. If no measures are implemented to
`
`mitigate such attacks, the attacker STA 120 may repeat the replay attack until STA 130
`
`completely runs out of battery.
`
`Several exemplary embodiments are described in detail in later sections to describe the
`
`disclosure in detail. The various embodiments for mitigating malicious false wake up
`
`attacks as perthe present disclosure are described in detail in the following sections.
`
`<First Embodiment>
`
`Figure 4 depicts the frame exchange sequence 400 used by a WUR STAto negotiate
`the parameters used during WUR mode with its AP. The frame exchange 400 needs to be
`
`completed before a WUR STA enters the WUR modeforthe first time, It may also be
`
`used subsequently to change parameters related to WUR mode and also to enter or exit
`
`9
`
`

`

`the WUR mode. WURAction frame 500 in Figure 5 may be used for the WUR mode
`
`negotiations. A WUR STAinitiates the WUR mode negotiation by transmitting a WUR
`Mode Request frame 410, which may be a variant of the WUR Action frame 500 with
`
`the WUR Mode Request/Response field 512 in the WUR Mode element 510 set to WUR
`
`Mode Request. Alternatively, the WUR Mode Request indication mayalso be carried
`
`within the WUR Action field 502. In either case, a WUR Mode Request framerefers to a
`
`WUR Action framethat carries an indication for WUR Mode request. Although not
`
`shownin Figure 5, the WUR mode element may also carry other parameters related to
`WURmode operation such as duty cycle parameters etc. As per the first embodiment, the
`
`WUR mode element also contains a Security field 514 that may be set to 1 by a WUR
`
`STA to request the AP to enable secure transmission mode for future transmissions of
`
`WUR PPDUs. Secure WURtransmission may be requested by WUR STAsright from
`
`the beginning or it may only be requested when a WUR STAdetectsthat it is under
`
`attack. Although it may not be possible for a WUR STAto detect an attack just from one
`
`or two false wake ups, if the STA keeps getting woken up without receiving any follow
`
`up downlink frames from the AP for more than a certain threshold value, for example 5
`
`times, the STA may consideritself under attack and request for security to be enabled.
`
`Upon receiving the WUR Mode request frame 410, the AP responds with the WUR mode
`response frame 420, which is another variant of the WUR Action frame 500 in Figure 5
`
`with the WUR Mode Request/Responsefield 512 in the WUR Mode element 510 set to
`
`WUR Mode Response. Alternatively, the WUR mode response indication may also be
`
`carried within the WUR Action field 502. In either case, a WUR Mode Response frame
`
`refers toa WUR Action frame that carries an indication for WUR Mode response. Aside
`
`from the parameters necessary for the WUR STA’s WUR modeoperation, if the WUR
`STA had requested security to be enabled for WURtransmissions, the AP also includes
`
`the WUR Security element 520 in Figure 5 in the WUR moderesponse frame 420
`
`carrying the parameters required for secure WUR communication. Once the security
`parameters have beennotified, the AP will use the secure WUR PPDU 430 whenit necds
`
`to wake the WUR STA.
`
`The WURsecurity element 520 in Figure 5 carries the WUR Security Parameters 530
`
`that contains the information regarding the secret keys to be used by a WUR STAto
`
`receive secure WUR PPDUs. Since a WUR STAis also an JEEE 802.11 device, it makes
`
`10
`
`

`

`sense that the STA reuses the existing 802.11 security framework as much as possible.
`
`Robust security network association (RSNA)is the default security protocol used by
`
`IEFE 802.11 devices. Although within RSNAthere are several security algorithms such
`
`as counter mode with cipher-block chaining message authentication code protocol
`
`(CCMP), Galois/counter mode (GCM)protocol (GCMP), broadcast/multicast integrity
`protocol (BIP) ete., as well as several hash algorithms, the secret Keys that these
`algorithms use may be broadly classified as either Pairwise Key or Group Key. Pairwise
`
`Keys are used for unicast communication between a pair of devices, while Group Kcys
`
`are used for broadcast or multicast communication. The Pairwise Cipher Suite field 540
`
`indicates the Ciphersuite to be used for unicasl. WUR PPDUsandis identified by the
`organizationally unique identifier (OUI) field 542 and the Suite Type field 544, The
`
`pairwise Key ID field 545 indicates the identifier of the Pairwise Key to be used for
`WUR PPDUsif more than one Pairwise Key has been negotiated between the AP and the
`
`WUR STA. The Group Key count 548 indicates the number of Group Keysincluded in
`the element. If the same Group Keyis to be used for all WOR broadcast and muiticast
`
`PPDUs, only one Group Key is required, howeverif the AP decides to use different
`Group Keysfor broadcast and multicast WUR PPDUs, two or more Group Keys may be
`
`included in the element. The Group Key Data field 550, is variable in length, and
`
`includes the information regarding the Group Keys. For each included Group Key,the
`
`Group Cipher Suite field 550 indicates the Ciphersuite to be used for broadcast or
`multicast WUR PPDUsandis identified by the organizationally unique identifier (OUD)
`
`field 552 and the Suite Type field 554. The Group Key Info field 560 identifies a Group
`
`Key as well as its use. The Key ID field 562 indicates the identifier of the Group key to
`be used for WUR PPDUs if more than one Key has been negotiated between the AP and
`
`the WUR STA; the GIK/IGTKfield 564 indicates whether the Group Key is Group
`
`Temporal Key (GTK)or Integrity Group ‘l'emporal Key (GTK) and the B’cast/M’cast
`field 566 indicates whether the Group Keyis to be used or broadcast or multicast WUR
`
`PPDUs. The Group ID field 568 may be used to specify a particular multicast group with
`which the Group Keyis associated and this field is set only if the B’cast/M’cast field 566
`is set as multicast, The Key Len field 570 indicates the length of the Wrapped Key field
`
`580 and maybeset to 0 if the Wrapped Keyfield 580 is not included in the element.
`When the Key ID field indicates that the Group Key to be used for WUR PPDUsis the
`
`same as that negotiated for use in PCR, the Wrapped Keyfield 580 is omitted, else the
`
`11
`
`

`

`Wrapped Key field 580 contains the encrypted GTK. or IGTK Key to be used for WUR
`
`PPDUs.
`
`Figure 6 depicts the WUR mode negotiation process 600 in which the AP and WUR
`
`STA negotiates separate secret Keys to be used exclusively for WUR PPDUs. Even
`
`though it would be possible to reuse the same secret Keys for WUR PPDUsas the ones
`used for PCR communications, if the WUR STA has the capability, the AP may also
`
`initiate a separate 4 way handshake process 620 with the WUR STAto obtain the PT
`
`and GTK/IGTKto be used exclusively for WUR PPDUs. Since the PCR mode of
`
`operation and the WUR modeof operation are very distinct from each other and a STA
`may only operate in either one modeat a time, generating separate secret keys to be used
`
`exclusively for WUR PPDUs may be beneficial as the security risks are isolated to each
`
`mode of operation and the risk of a cryptographic salt being repeated for a secret key is
`
`minimized. In addition, renegotiation of the Group Keys used for PCR need notaffect the
`
`Group Keys used for WUR PPDUs. Uponreceiving the WUR Mode Request frame 410
`from a STA requesting security to be enabled for WUR PPDUs in a WUR Mode Request
`
`procedure 610, the AP may chooseto initiate the 4 way handshake 620 to derive separate
`
`secrets Keys used to encode/decode WUR PPDUs. The 4 way handshake 620, shown
`
`within the dotted box, is the same as used in RSNA when a STA associates with the AP
`
`to negotiate the Pairwise Transient Key (PTK) and Group Keys (GTK and IGTK)to be
`
`used for secure sessions except that the secret Keys are meant to be used exclusively for
`
`WUR PPDUsand hencethe secret Keys may be referred to as W-PTK, W-GTK and W-
`
`IGTKto differentiate them from the secret Keys used during PCR communications. The
`
`AP concludes the WURmode negotiation by transmitting the WUR Mode Response
`
`frame 420 which carries the rest of the parameters necessary for the WUR STAto enter
`
`WUR mode in a WUR Mode Responseprocedure 630. In this case the WUR Mode
`
`Response frame 420 does not include the Wrapped Key field 580 shownin Figure 5.
`
`Howeverthe AP may chcose to transmit unsolicited WUR Mode Response frame 500 in
`
`Figure 5 that includes the Wrapped Keyfield 580 to the WUR STAat a future time to
`
`update the Group Keys in the event that the Group Keys may have changed while the
`
`WURSTA was in WUR mode,
`
`Figure 7 is the table 700 of the OUI and Suite Type encoding used in the WUR
`
`12
`
`

`

`Security element and is used to identify the security algorithm used for secure WUR.
`PPDUs. The AP may choose the appropriate algorithm to use based on factors such as
`
`STA’s capabilities. For example, for very resource limited WUR STAs, AP may choose
`simple hash functions such as SHA1-128 or SHA-256, while for WUR STAs with higher
`processing power, the AP may choose the CCMP-128 Ciphersuite. Ifthe AP indicates
`“Use group ciphersuite” for pairwise cipher suite, PTI. is not used for WUR PPDUsand
`only Group Keysare used. Althoughthe use of pairwise cipher suite is recommended for
`
`unicast WUR PPDUs,under certain circumstance the AP may also decide to use Group
`cipher suite for all WUR PPDUs.
`
`Figure 8 illustrates a secure WUR frame 800 that carries a cryptographically encoded
`
`MIC field 816 which helps the intended receiver WUR STAto categorically authenticate
`
`the transmitter of the frame. In orderto differentiate secure WUR frames from unsecure
`
`WURframes, the AP sets the Security bit 814 within the Frame Control field 812 to 1.
`
`The Security bit 814 alerts the receiving WUR STA ofthe presence of the MIC field 816
`
`within the WUR frame. As mentioned earlier, due to the comparatively simple signals
`
`used for transmissions of WUR PPDUs, itis not very difficult for an attacker to replay an
`
`earlier WUR PPDU,or even generate a forged WURframe with the malicious intention
`
`of causing a WURSTAto waste battery power by forcing fhe STA to wake up
`
`unnecessarily, Such attempts may be thwarted if the WUR frame contains somefield that
`can only be generated by a trusted transmitter using a shared secret Key and which can be
`verified by the intended WUR STAusing the same secret Key. Suchfields are generally
`
`known as Message Authentication Codes (MAC) or Message Integrity Codes (MIC). The
`
`AP may use popular cryptographic hash functions that are also commonly used in IEEE
`
`$02.11 devices such as SHA-1-128, SHA-256, SHA-384 or MDS etc. to generate the
`
`MICfield 816, or the AP may also choose to generate the MIC field 816 using block
`
`cipher algorithm such as Cipher Block Chaining Message Authentication Codes (CBC-
`MAC) whichin turn may be based on Advanced Encryption Standard (AES) such as
`
`AES-128-CMACor AES-256-CMAC. The AP’s choice of the cryptographic algorithm
`
`to use to generate the MIC field 816 may be based onfactors such as STA’s capabilities,
`for example for very resource limited WUR STAs, AP may choose simple hash functions
`
`such as SHA1-128 or SHA-256, while for WUR STAswith higher processing power, the
`
`AP may choose the CCMP-128 which is based on AES. A key assumption in using MAC
`
`13
`
`

`

`or MICto provide security is the fact that an attacker that does not possess the secret Key
`
`is not able to generate the same MIC orit is too computationally expensive to reverse
`
`engineer the secret key based on the MIC. However,it is still possible for an attacker to
`
`sniff a genuine secure WUR PPDUand useit at a future time to launch a replay attack.
`
`To prevent such replay attacks, the transmitter must ensure that each MIC computation
`
`uses a unique input (or a random number)that is different for each secure WUR PPDU
`
`for a particular secret Key. Such unique inputs are generally knownas “salt” or “nonce”,
`Several types of WURframes arc being considered in the IEEE 802.11ba Taskgroup
`
`and even thoughthe format of the frames may be similar, as shown in the gencric WUR
`
`frame 230 in Figure 2, the content of the frame fields may differ slightly depending on
`
`frame type. WUR frames that are addressed to a single WUR STA may be known as
`unicast WUR frame, WUR frames that are addressed to a group of WUR STAs may be
`
`known as multicast WUR frames while WUR frames that are addressed to all the WUR
`
`STAsassociated with an AP may be known as broadcast WUR frames. A unicast WOR
`
`frame may contain both the Receiver Address (RA) as well as Transmitter Address (TA)
`within the Address field 244, and the TD contro! field 246 may contain a timestampfield
`
`or a packet number, while the Frame body 250 field may be absent. Similarly a broadcast
`
`WUR frame such as WUR Beacon,that is purely used for time synchronization (i.c. not
`
`used to wake WUR STAs) may only contain a Transmitter Address (TA) within the
`
`Address field 244, and the TD control field 246 may contain a timestamp field use for
`
`time synchronization and the Frame body 250 may be absent. A mullicast WUR frame on
`
`the other hand may contain the Transmitter Address in the Address field 244, a
`
`timestamp or packet numberin the TD control field, while the Frame body field 250 may
`
`contain a list of the WUR STAsthat are targeted for waking by the multicast frame.
`
`Referring again to Figure 8, ifa WUR frame contains a unique numberthat is different
`
`for each WUR frame, for example a Partial-TSF (P-TSF) field 818, this may be used as a
`
`salt for the cryptographic function. The P-TSF field may represent some selected bits of
`
`the Time Synchronization l'unction (TSF) maintained by the AP. If the WURframeis a
`unicast frame, the AP uses its secret Key, for example the Temporal Key (TK) portion of
`
`the pairwise secrel Key PTK or W-PTK,the Transmitter Address (TA) and the Receiver
`Address (RA), as well as the P-TSF field as input to the cryptographic algorithm to
`
`obtain a MIC. Usually, the output o

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket