Search

KR-20260065860-A - Method and device for transmitting or receiving a protected control frame in a wireless LAN system

KR20260065860AKR 20260065860 AKR20260065860 AKR 20260065860AKR-20260065860-A

Abstract

A method and apparatus for transmitting or receiving a protected control frame in a wireless LAN system are disclosed. A method according to one embodiment of the present disclosure may include the step of generating a block ACK (acknowledgement) (BA) frame containing encrypted information based on a specific encryption protocol by a first station (STA); and the step of transmitting the BA frame by the first STA to a second STA. The encrypted information may be based on the BA control field and the BA information field of the BA frame.

Inventors

  • 백선희
  • 최진수
  • 장인선
  • 김건환
  • 윤예린
  • 차동주

Assignees

  • 엘지전자 주식회사

Dates

Publication Date
20260511
Application Date
20241028
Priority Date
20231027

Claims (19)

  1. A step of generating a block ACK (acknowledgement) (BA) frame containing encrypted information based on a specific encryption protocol by a first station (STA); and The step of transmitting the above BA frame to the second STA by the first STA, and The above encrypted information is based on the BA control field and BA information field of the above BA frame, a method.
  2. In Article 1, A method in which encryption of the above BA frame is performed based on key information related to protection of the above BA frame.
  3. In Article 1, A method in which the above BA frame includes MIC (message integrity code) information calculated based on key information related to protection for the above BA frame.
  4. In Article 1, Based on the fact that the above specific encryption protocol corresponds to CCMP (counter mode with cipher-block chaining message authentication code protocol), CCMP-128 or CCMP-256 is used as a cipher suite for the said CCMP, and A method in which GCMP-128 or GCMP-256 is used as a cipher suite for said GCMP, based on the fact that the said specific encryption protocol corresponds to GCMP (galois/counter mode protocol).
  5. In Article 1, A method in which the encryption is applied to MIC information based on the fact that the above specific encryption protocol corresponds to CCMP.
  6. In Article 1, A method wherein the above BA frame comprises an encryption protocol header including a first field for a key ID (identifier) and a second field for a packet number.
  7. In Article 6, A method in which the encryption protocol header further includes information indicating an MPDU (MAC protocol data unit) format according to the specific encryption protocol within the BA frame.
  8. In Article 1, A method in which information indicating whether protection for the BA frame is supported is exchanged between the first STA and the second STA.
  9. In Article 8, Information indicating whether protection for the above BA frame is supported is exchanged through at least one of a beacon frame, a probe request frame, a probe response frame, a combination request frame, a combination response frame, a re-combination request frame, a re-combination response frame, or the above BA frame.
  10. In Article 1, A method in which, based on the application of the specific encryption protocol to the BA frame, the protected frame subfield within the frame control field included in the BA frame is set to a predefined specific value.
  11. In Article 1, A method in which information indicating an MPDU format according to a specific encryption protocol is exchanged between the first STA and the second STA.
  12. In Article 11, A method in which information indicating an MPDU format according to the above-mentioned specific encryption protocol is included in at least one of a combine request frame, a combine response frame, a re-combination request frame, a re-combination response frame, a beacon frame, or a data frame.
  13. In Article 1, Based on the fact that the above BA frame corresponds to an individually addressed control frame, key information related to protection for the above BA frame is based on the PTK (pairwise transient key) for the first STA and the second STA, and A method in which, based on the fact that the above BA frame corresponds to a group-addressed control frame, key information related to protection for the above BA frame is based on a GTK (group temporal key) for the above first STA and the above second STA.
  14. In Article 1, The above BA frame includes ACK information for data received from the second STA by the first STA, and A method in which key information related to protection for the above BA frame is distinguished from key information for protection of the above data.
  15. One or more transceivers; and It includes one or more processors connected to the above one or more transmitters and receivers, and The above one or more processors are: A block ACK (acknowledgement) (BA) frame containing encrypted information based on a specific encryption protocol is generated by the first station (STA); and The above BA frame is configured to be transmitted by the first STA to the second STA through the one or more transceivers, and The above encrypted information is based on the BA control field and BA information field of the above BA frame, a device.
  16. A step of receiving a block ACK (acknowledgement) (BA) frame containing information encrypted based on a specific encryption protocol from a first station (STA) to a second STA; and It includes the step of performing decryption and integrity checks on the above BA frame by the second STA, The above encrypted information is based on the BA control field and BA information field of the above BA frame, a method.
  17. One or more transceivers; and It includes one or more processors connected to the above one or more transmitters and receivers, and The above one or more processors are: Receiving a block ACK (acknowledgement) (BA) frame containing information encrypted based on a specific encryption protocol from a first station (STA) to a second STA through one or more transceivers; and The decryption and integrity check for the above BA frame are configured to be performed by the above 2 STA, and The above encrypted information is based on the BA control field and BA information field of the above BA frame, a device.
  18. One or more processors; and A processing device comprising one or more computer memories that are operably connected to one or more processors and store instructions for performing a method according to any one of claims 1 to 14 based on execution by one or more processors.
  19. One or more non-transitory computer-readable media storing one or more instructions that are executed by one or more processors to control the execution of a method according to any one of claims 1 through 14.

Description

Method and device for transmitting or receiving a protected control frame in a wireless LAN system The present disclosure relates to a method and apparatus for transmitting or receiving a protected control frame in a Wireless Local Area Network (WLAN) system. New technologies have been introduced for wireless LANs (WLANs) to improve transmission rates, increase bandwidth, enhance reliability, reduce errors, and reduce latency. Among wireless LAN technologies, the IEEE (Institute of Electrical and Electronics Engineers) 802.11 series of standards can be referred to as Wi-Fi. For example, technologies recently introduced to wireless LANs include enhancements for Very High-Throughput (VHT) in the 802.11ac standard and enhancements for High Efficiency (HE) in the IEEE 802.11ax standard. To provide an improved wireless communication environment, advanced technologies for Extremely High Throughput (EHT) are being discussed. For example, technologies for Multiple Input Multiple Output (MIMO) supporting increased bandwidth, efficient utilization of multiple bands, and increased spatial streams, as well as technologies for multiple access points (AP) coordination, are being researched. In particular, various technologies are being studied to support traffic with low latency or real-time characteristics. Furthermore, new technologies to support ultra-high reliability (UHR), including improvements or extensions of EHT technology, are being discussed. The accompanying drawings, which are included as part of the detailed description to aid in understanding the present disclosure, provide embodiments of the present disclosure and explain the technical features of the present disclosure together with the detailed description. FIG. 1 illustrates a block diagram of a wireless communication device according to one embodiment of the present disclosure. FIG. 2 is a drawing showing an exemplary structure of a wireless LAN system to which the present disclosure can be applied. FIG. 3 is a diagram illustrating a link setup process to which the present disclosure can be applied. FIG. 4 is a drawing illustrating a backoff process to which the present disclosure may be applied. FIG. 5 is a diagram illustrating a CSMA/CA-based frame transmission operation to which the present disclosure may be applied. FIG. 6 is a drawing for illustrating an example of a frame structure used in a wireless LAN system to which the present disclosure may be applied. FIG. 7 is a drawing illustrating examples of PPDUs defined in the IEEE 802.11 standard to which the present disclosure may be applied. FIG. 8 is a diagram illustrating a 4-way handshake procedure to which the present disclosure may be applied. FIG. 9 is a drawing showing an example of an expanded CCMP MPDU to which the present disclosure can be applied. FIG. 10 shows a CCMP encapsulation block diagram to which the present disclosure can be applied. Figure 11 shows an example of the format of a conventional AAD. FIG. 12 shows a CCMP decapsulation block diagram to which the present disclosure can be applied. FIG. 13 is a drawing showing an example of an expanded GCMP MPDU to which the present disclosure can be applied. FIG. 14 shows a GCMP encapsulation block diagram to which the present disclosure can be applied. FIG. 15 shows a GCMP decapsulation block diagram to which the present disclosure can be applied. FIG. 16 shows exemplary formats of block ACK frames to which the present disclosure may be applied. FIG. 17 is a drawing for explaining the operation of a first STA according to the present disclosure. FIG. 18 is a drawing for explaining the operation of a second STA according to the present disclosure. FIG. 19 shows examples of encryption protocol MPDU formats for BA frames according to the present disclosure. Hereinafter, preferred embodiments according to the present disclosure will be described in detail with reference to the accompanying drawings. The detailed description disclosed below, together with the accompanying drawings, is intended to describe exemplary embodiments of the present disclosure and is not intended to represent the only embodiment in which the present disclosure may be practiced. The following detailed description includes specific details to provide a complete understanding of the present disclosure. However, those skilled in the art will know that the present disclosure may be practiced without such specific details. In some cases, to avoid obscuring the concept of the present disclosure, known structures and devices may be omitted or illustrated in the form of a block diagram focusing on the core functions of each structure and device. In the present disclosure, when a component is described as being “connected,” “combined,” or “joined” with another component, this may include not only a direct connection but also an indirect connection in which another component exists between them. Furthermore, in the present disclosure, the terms “comprising” or “having”