WO2025151279A3 - Secure control frames in wireless communications - Google Patents
Secure control frames in wireless communicationsInfo
- Publication number
- WO2025151279A3 WO2025151279A3 PCT/US2024/061433 US2024061433W WO2025151279A3 WO 2025151279 A3 WO2025151279 A3 WO 2025151279A3 US 2024061433 W US2024061433 W US 2024061433W WO 2025151279 A3 WO2025151279 A3 WO 2025151279A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cmf
- control frames
- wireless communications
- integrity check
- security key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/037—Protecting confidentiality, e.g. by encryption of the control plane, e.g. signalling traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This disclosure provides methods, components, devices and systems for secure control frames in wireless communications. Some aspects more specifically relate to security for control frames based on one or more fields included in the control frames. In some examples, a frame is transmitted with a control message integrity check (MIC) field (CMF) that includes an identifier of a security key, at least a portion of a packet number (PN), and at least a portion of an integrity check computed based on one or more portions of the frame including the control information and the security key. The CMF may be transmitted is separate parts, such as a first portion of the CMF that includes the identifier of the security key and at least the portion of the PN, and a second portion of the CMF that includes at least a truncated portion of the integrity check.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN202441002125 | 2024-01-11 | ||
| IN202441002125 | 2024-01-11 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2025151279A2 WO2025151279A2 (en) | 2025-07-17 |
| WO2025151279A3 true WO2025151279A3 (en) | 2025-10-23 |
Family
ID=94386514
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2024/061433 Pending WO2025151279A2 (en) | 2024-01-11 | 2024-12-20 | Secure control frames in wireless communications |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2025151279A2 (en) |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190007904A1 (en) * | 2017-06-30 | 2019-01-03 | Qualcomm Incorporated | Wake-up radio frame formats and device communications |
| US20190200278A1 (en) * | 2018-03-02 | 2019-06-27 | Ido Ouzieli | Enhanced beacon frames in wireless communications |
| US20190268847A1 (en) * | 2018-02-26 | 2019-08-29 | Qualcomm Incorporated | Addressing for wake-up radio (wur) frames in wur device communications |
| US20200169382A1 (en) * | 2018-11-26 | 2020-05-28 | International Business Machines Corporation | Encrypted and Compressed Data Transmission with Padding |
| US20210050999A1 (en) * | 2019-08-27 | 2021-02-18 | Po-Kai Huang | Enhanced security for multi-link wireless operations |
| US20230362634A1 (en) * | 2017-06-15 | 2023-11-09 | Panasonic Intellectual Property Corporation Of America | Communication apparatus and method for secure low power transmission |
| WO2023234720A1 (en) * | 2022-06-03 | 2023-12-07 | 엘지전자 주식회사 | Method and device commanding operating mode for extended bandwidth in wireless lan system |
-
2024
- 2024-12-20 WO PCT/US2024/061433 patent/WO2025151279A2/en active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20230362634A1 (en) * | 2017-06-15 | 2023-11-09 | Panasonic Intellectual Property Corporation Of America | Communication apparatus and method for secure low power transmission |
| US20190007904A1 (en) * | 2017-06-30 | 2019-01-03 | Qualcomm Incorporated | Wake-up radio frame formats and device communications |
| US20190268847A1 (en) * | 2018-02-26 | 2019-08-29 | Qualcomm Incorporated | Addressing for wake-up radio (wur) frames in wur device communications |
| US20190200278A1 (en) * | 2018-03-02 | 2019-06-27 | Ido Ouzieli | Enhanced beacon frames in wireless communications |
| US20200169382A1 (en) * | 2018-11-26 | 2020-05-28 | International Business Machines Corporation | Encrypted and Compressed Data Transmission with Padding |
| US20210050999A1 (en) * | 2019-08-27 | 2021-02-18 | Po-Kai Huang | Enhanced security for multi-link wireless operations |
| WO2023234720A1 (en) * | 2022-06-03 | 2023-12-07 | 엘지전자 주식회사 | Method and device commanding operating mode for extended bandwidth in wireless lan system |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2025151279A2 (en) | 2025-07-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10440565B2 (en) | System and method of counter management and security key update for device-to-device group communication | |
| Khan et al. | Security analysis of 5G network | |
| CN101800989B (en) | Anti-replay-attack system for industrial wireless network | |
| WO2007120313A3 (en) | Insider attack defense for network client validation of network management frames | |
| Farha et al. | Timestamp scheme to mitigate replay attacks in secure ZigBee networks | |
| EP1992188A2 (en) | Obscuring temporary user equipment identities | |
| FI20001975A7 (en) | Control data signaling method | |
| EP4290918A3 (en) | Access stratum security for efficient packet processing | |
| BRPI0307055B1 (en) | selective combination of multiple non-synchronous transmissions in one wireless communication system | |
| KR20090032624A (en) | Method and device for providing MAC frame which can be set in security in IEEE 802.15.4 network | |
| US20140274169A1 (en) | Enhancing privacy in cellular paging system using physical layer identification | |
| Wu et al. | The weakness of integrity protection for LTE | |
| Ta et al. | Enhancing privacy in LTE paging system using physical layer identification | |
| Wu et al. | Safeguarding 5G-and-beyond networks with physical layer security | |
| US12155638B2 (en) | Method and system for constructing fusion covert channel | |
| Bienstock et al. | Asmesh: Anonymous and secure messaging in mesh networks using stronger, anonymous double ratchet | |
| Kalnoor et al. | Detection of intruder using KMP pattern matching technique in wireless sensor networks | |
| WO2025151279A3 (en) | Secure control frames in wireless communications | |
| Müller et al. | Protecting PROFINET cyclic real-time traffic: A performance evaluation and verification platform | |
| CN118402208A (en) | NR security enhancement | |
| MX2024005728A (en) | COMMUNICATION METHOD AND STATION. | |
| Sedghighadikolaei et al. | Signer-Optimal Multiple-Time Post-Quantum Hash-Based Signature for Heterogeneous IoT Systems | |
| Khan et al. | Pseudo random number based authentication to counter denial of service attacks on 802.11 | |
| Chen et al. | Physical Layer Deception with Non-Orthogonal Multiplexing | |
| SE0201758D0 (en) | Method and system of failure avoidace |