Medium access control header obfuscation

ABSTRACT

Techniques are provided for medium access control header obfuscation. One example method includes a first device encrypting a data payload using a first encryption algorithm. The first device can encrypt a field of a medium access control (MAC) header using a second encryption algorithm, different from the first encryption algorithm. The first device can generate a data frame comprising the encrypted MAC header field and the encrypted payload. The first device can transmit the data frame to a second communication device.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is claims the benefit of U.S. Provisional Application No. 63/396,220, filed on Aug. 8, 2022, which is incorporated by reference.

FIELD

This application relates to the field of networks and, in particular, to medium access control header obfuscation in said networks.

BACKGROUND

A wireless network is a communication network that enables computing devices to communicate through radio transmissions and receptions between network nodes. These wireless networks permit users with greater mobility within the home and office environments by untethering their computing device from wired communication.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an example illustration of an environment with an access point (AP) and station (STA), according to one or more embodiments.

FIG. 2 is an example table directed towards medium access control (MAC) header fields and privacy protection for each field, according to one or more embodiments.

FIG. 3 is an example illustration of a frame with offset descriptions, according to one or more embodiments.

FIG. 4 is an example illustration of subfields of a frame control field, according to one or more embodiments.

FIG. 5 is an example process flow for a transmitter operation, according to one or more embodiments.

FIG. 6 is an example process flow for a receiver operation, according to one or more embodiments.

FIG. 7 is an example table describing two alternatives for obfuscation and encryption, according to one or more embodiments.

FIG. 8 is an example illustration of a frame associated with obfuscation of MAC header bits and A-control field, according to one or more embodiments.

FIG. 9 is an example illustration of subfields of a frame control field, according to one or more embodiments.

FIG. 10 is an example table describing offset bit-stream randomization interval, according to one or more embodiments.

FIG. 11 is an example illustration of a scrambler seed extension operation, according to one or more embodiments.

FIG. 12 is an example table describing the number of keys in secure scrambling, according to one or more embodiments.

FIG. 13 is an example illustration for secure scrambling offsets of UL SU, according to one or more embodiments.

FIG. 14 is an example illustration for secure scrambling offsets of DL SU, according to one or more embodiments.

FIG. 15 is an example illustration for secure scrambling offsets in neighborhood area network (NAN)/Mesh networks, according to one or more embodiments.

FIG. 16 is an example illustration for secure scrambling offset for MU PPDU, according to one or more embodiments.

FIG. 17 is an example illustration of using MU PPDU for UL transmissions, according to one or more embodiments.

FIG. 18 is an example illustration for secure scrambling offsets of triggered PPDU, according to one or more embodiments.

FIG. 19 is an example illustration for secure scrambling offsets of triggered PPDU, according to one or more embodiments.

FIG. 20 is an example illustration for encryption-based secure scrambling, according to one or more embodiments.

FIG. 21 is an example illustration a frame describing obfuscation and encryption, according to one or more embodiments.

FIG. 22 is an example illustration of subfields of a frame control field, according to one or more embodiments.

FIG. 23 is an example illustration of an additional authentication data field, according one or more embodiments.

FIG. 24 is an example process flow for a transmitter operation, according to one or more embodiments.

FIG. 25 is an example process flow for a transmitter operation, according to one or more embodiments.

DETAILED DESCRIPTION

In the following description, various embodiments will be described. For purposes of explanation, specific configurations and details are set forth in order to provide a thorough understanding of the embodiments. However, it will also be apparent to one skilled in the art that the embodiments may be practiced without the specific details. Furthermore, well-known features may be omitted or simplified in order not to obscure the embodiment being described.

In a wireless communication network, a frame can be a unit of data that can be transmitted between nodes. The frame can include the information useful to transmit data from one network node to another, including addressing information and protocol control information. A frame can include a header, a payload, and a trailer. Each of the header, payload, trailer can be configured to convey particular information. For example, a medium access control (MAC) header can be an ethernet header that includes data fields that can be added to a beginning of a network data packet to convert the packet into a frame to be transmitted. The MAC header can include a transmission protocol version, a frame type, a frame subtype, and a frame control flag. Under IEEE 802.11, only the payload of the frame can be encrypted, and therefore and header and trailer remain unencrypted.

A scrambler can be a device that can encode a message by transposing or inverting a signal in the analog domain. The transmitting device can encode a message using the scrambler, such that the signal cannot be decoded by a receiver unless the receiver has the current descrambling device. Conventional scramblers can create a pseudorandom bitstream by using a scrambler seed, which can be a number used to initialize a pseudorandom number generator. A receiving station can be configured to know the scrambler seed and the scrambler function to permit the station to decode the transmission.

The embodiments described herein relate to obfuscating and encryption for time dependent fields in a MAC header. In particular, for data frames, obfuscation and encryption mechanisms for the aggregated control (A-control), more data, end of service period (EOSP), and power management (PM) fields, which can each be single bit values. To obfuscate single bit values, embodiments described here introduce offsets that can be changed to enhance security and discourage malicious attackers. Furthermore, rather than calculating offsets for each field in a PPDU frame, a single offset can be calculated and used for all fields (hereinafter “first alternative”). Alternatively, the embodiments herein introduce an encryption mechanism that can be directed toward these single bits (hereinafter “second alternative”).

FIG. 1 is an environment 100 with an access point (AP) and several computing devices (also called stations (STAs)), according to one or more embodiments. The environment 100 includes an AP 102, a first station 104, a second station 106, and a third station 108. The AP can be a device that can create a wireless local area network (WLAN) in the environment. The AP can connect to a wired router, switch, or hub via an Ethernet cable, and project a Wi-Fi signal to the environment 100 (e.g., home or office). Each of the first station 104, the second station 106, and the third station 108 can be a device that has access to the Wi-Fi and can allow transmission and reception of data. Thus, both of the ends of the data sharing process (transmission and reception) can be performed by a station. One station can be from where data is transmitted, and another station can be where the data is received. Various techniques can be implemented to secure the privacy of communications in the environment 100. Embodiments described herein relate to one or more of these techniques.

FIG. 2 is a table 200 directed towards medium access control (MAC) header fields and privacy protection for each field. As indicated above, a first alternative for obfuscation can be to calculate an offset for certain fields of a PPDU frame. A device can select the fields based on a level of privacy enhancement supported by the device. A first device (e.g., AP) and a second device (e.g., STA) can be configured to support different privacy support levels. These privacy support levels include an association privacy enhancement (APE) 202, an APE plus (APE+) 204, client privacy enhancement (CPE) 206, and a basic service set (BSS) privacy enhancement (BPE) 208. A device can choose which fields to offset based on a privacy support level of the device. A device that supports APE 202 does not calculate an offset for any field. A device that supported APE+204 can calculate an offset for the STA address, the sequence number (SN), and the packet number (PN). A device that supports CPE 206 can calculate an offset for, in unicast frames, all MAC fields with the exception of duration fields and selected subfields of the frame control field. A device that supports BPE 208 can calculate an offset for all fields with the exception of MAC field needed for interoperability.

FIG. 3 is an illustration of a frame 300 with offset descriptions, according to one or more embodiments. FIG. 3 provides examples of fields that can be selected for obfuscation. The frame 300 can include a field for frame control 302 which is discussed with more detail at FIG. 4 . The frame 300 can further include a Duration/ID field 304, which can remain clear regardless of the privacy support level of the device, and where clear means no changes to the values for an over the air (OTA) transmission. The frame 300 can further include a first address (ADD. 1) field 306, a second address (ADD. 2) field 308, and a third address (ADD. 3) field 310. For a device that supports APE+, or CPE, the device can apply an offset to obfuscate the STA address value in any of these fields. For a device that supports BPE, the device can apply an offset to all of the values in all of these fields. The frame 300 can further include a sequence control field 312. For a device that supports any of APE+, CPE, or BPE, the device can apply an offset to obfuscate the values in this field. The frame 300 can further include a fourth address (ADD. 4) field 314. For a device that supports any of APE+, CPE, or BPE, the device can apply an offset to obfuscate the values in this field. The frame 300 can further include a quality of service (QoS) field 316 and HT control field 318. For devices that support APE+, the device does not obfuscate any value in this field. For devices that support CPE or BPE, the device can obfuscate the values in this field, where obfuscation can by applying an offset or by encryption. The frame 300 can further include a field for counter mode cipher block chaining message authentication code protocol (CCMP) field 320. A device that supports any of APE+, CPE, or BPE can obfuscate any value in this field. The frame 300 can further include an aggregation MAC service data unit (A-MDSU) field 322 and a data payload field 324. A device that supports any of APE+, CPE, or BPE can encrypt the values in these fields, where encryption can be defined under IEEE 802.11. The frame 300 can further include a message integrity check (MIC) field 326 and a frame check sequence (FCS) field 328. A device supporting any of APE+, CPE or BPE can clear this field, which can be calculated from OTA values.

FIG. 4 is an illustration of subfields of a frame control field 400, according to one or more embodiments. The frame control field 400 can include a protocol version subfield 402, type subfield 404, and subtype subfield 406. Each of these subfields can remain clear regardless of the privacy support level of the device. The frame control field 400 can include to distribution system (DS) subfield 408 and a from DS subfield 410. The device can elect not to obfuscate the values in these fields for devices that support APE+ or CPE. The device can obfuscate the values for these fields if the device supports BPE. The frame control field 400 can further include for more fragments subfield 412, a retry subfield 414, a power management subfield 416, a more data subfield 418, a A-MDSU control subfield 420, a protected frame subfield 422, and a +HT control subfield 424. For a device that supports any of APE+, the device can elect to not apply obfuscation to any of these fields. For a device that supports any of CPE and BPE, the device can obfuscate the fields.

As described above, the embodiments herein can calculate a single offset for all fields using a single function. In particular, the function can calculate one bit-stream, and then the device can allocate bits from the stream over specific fields to be obfuscated. The bit-stream can have dedicated bits for specific fields. For example, bit 0 of the bit-stream can be dedicated to a first bit of the MAC header. The device can determine how long of a bit-stream to generate based on the fields that can be obfuscated. To obfuscate a field, the device can take the original value and use an XOR function to perform an “exclusive or” with an offset value to calculate the over the air value. An example single function to calculate the offset bit stream can be as follows: Truncate_(offsetlength)(SHA-256(LinkID, “Protection_Offset”, Of_Key, OF_Salt_ST_STA_LT) LinkID can be the Link ID in which the beacon in transmitted. “Protection_Offset” can be a long plain text. OF-Key can be the key to protect the offset, which can be changed periodically. OF-Salt can be a number that can be changed periodically. There can be two salt values, a long-term value and a short-term value.

FIG. 5 is a process flow 500 for a transmitter operation, according to one or more embodiments. While the operations of processes 500, 800, 2000, and 2100 are described as being performed by generic computers, it should be understood that any suitable device may be used to perform one or more operations of these processes. Processes 600, 800, 2000, and 2100 (described below) are respectively illustrated as logical flow diagrams, each operation of which represents a sequence of operations that can be implemented in hardware, computer instructions, or a combination thereof. In the context of computer instructions, the operations represent computer-executable instructions stored on one or more computer-readable storage media that, when executed by one or more processors, perform the recited operations. Generally, computer-executable instructions include routines, programs, objects, components, data structures, and the like that perform functions or implement data types. The order in which the operations are described is not intended to be construed as a limitation, and any number of the described operations can be combined in any order and/or in parallel to implement the processes.

At 502, a device can receive a data payload from an application or the internet. The data payload can be included in a physical layer protocol data unit (PPDU) transmission. In response to receiving the data payload, the device can assign the payload a sequence number (SN) and a packet number (PN).

At 504, the device can encrypt the data payload.

At 506, the device can obfuscate and encrypt the MAC header and aggregate control (A-control) fields. In some instances, step 506 can occur at the next transmission opportunity (TXOP) time that occurs after encrypting the payload (step 504).

At 508, the device can transmit the data to a receiving device. For example, the device can be a transmitting device such as an access point and the receiving device can be a station that connects to a wireless local area network provided by the access point.

FIG. 6 is a process flow 600 for a receiver operation, according to one or more embodiments. At 602, a device can receive a frame from a transmitting device. The device can be, for example, a station in an environment. The device can receive the frame over the air and further determine whether the device is the intended recipient. For example, the device can determine whether the transmitter address and the receiver address match the device information. If there is a match, the device can receive the frame. If there is no match, the device can discard the frame. The device can further determine the duration of the PPDU transmission from the preamble of the frame. The duration can be set in a TXOP field of the preamble or a duration field. The frame can be received, for example, from the device of FIG. 5 .

At 604, the device can parse the MAC header's obfuscated fields of a MAC protocol data unit (MPDU) to detect the size of the payload. The device can also use the +HTC field to determine the MAC header size. These values can be used later to assist in decryption of the payload, for example, to determine the size of a scrambler seed. The device can further use the over the air traffic identifier (OTA TID) and address field values of a received MAC protocol data unit to prepare a block acknowledgment frame and send the block acknowledgment a short interframe space (SIFS) after the PPDU. The device can further determine MD/end of service period (EOSP)/power management (PM). In some embodiments, step 604 can be a one-time operation regardless of the number of MAC protocol data units.

At 606, the device can decrypt the payload. In this step, the device can de-obfuscate addresses, packet numbers and sequence numbers for the additional authentication data (AAD) used for the payload decryption. The device can perform step 606 for each MAC protocol data unit that can be received at step 602. Upon decrypting the payload, the device can reorder the decrypted frames using a buffer. The device can then transmit the reordered frames to an application or the internet.

FIG. 7 is a table 700 describing two alternatives for obfuscation and encryption, according to one or more embodiments. As described above, a device can obfuscate or encrypt certain fields based on various parameters. As also described above, the first alternative can include obfuscating certain fields. The table 700 describes which fields the device can select to obfuscate. For the first alternative 702, the protocol version, type, subtype, duration/ID and frame check sequence (FCS) fields can be transmitted clear over the air. The first through fourth address fields, the traffic identifier (TID) field, and the sequence number (SN) fields can be obfuscated by applying the same offset value to each of the fields. The packet number, and aggregated MAC service data unit (A-MSDU) present fields can be obfuscated by applying the same offset value to each of the fields. The power management, more data, end of service period (EOSP)+HTC, and HT control fields can also be obfuscated by applying the same offset value to each of the fields. The retry field can either set to zero or transmitted clear.

For the second alternative 704, the protocol version, type, subtype, duration/ID and frame check sequence (FCS) fields can be transmitted clear over the air. The first through fourth address fields, the traffic identifier (TID) field, and the sequence number (SN) fields can be obfuscated by applying the same offset value to each of the fields. The packet number, and aggregated MAC service data unit (A-MSDU) present, power management, more data, end of service period (EOSP)+HTC, and HT control fields can be encrypted. The retry field can be either set to zero of transmitted clear, or in some embodiment, handled as MD, EOSP or +HTC fields.

FIG. 8 is an illustration of a frame 800 associated with obfuscation of MAC header bits and an A-control field, according to one or more embodiments. For this embodiment, a device can prepare a MAC header and apply the single offset for all appropriate fields. The frame 800 can include a field for frame control 802, which is discussed at FIG. 9 . The frame 800 can include a Duration/ID field 804, which can have no offset regardless of the privacy support level of the device. The frame 800 can include a first address (ADD. 1) field 806, a second address (ADD. 2) field 808, and a third address (ADD. 3) field 810. For a device that supports APE+, or CPE, the device can apply an offset to the STA address value in any of these fields. For a device that supports BPE, the device can apply an offset to all of all values in any of these fields. The frame 800 can further include a sequence control field 812. For a device that supports any of APE+, CPE, or BPE, the device can apply an offset to any values in this field. The frame 800 can further include a field for a fourth address (ADD. 4) field 814. For a device that supports any of APE+, CPE, or BPE, the device can apply an offset to a STA address in this field. The frame 800 can further include a quality of service (QoS) field 816 and HT control field 818. For devices that support APE+, the device can not apply an offset to any value in this field. For devices that support CPE or BPE, the device can apply an offset to any values in this field. The frame 800 can further include a Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) field 820. A device that supports any of APE+, CPE, or BPE can apply an offset any value in this field. The frame 800 can further include an aggregation MAC service data unit (A-MDSU) field 822 and a data payload field 824. A device that supports any of APE+, CPE, or BPE can encrypt any values in these fields. The frame 800 can further include a message integrity check (MIC) field 826 and a frame check sequence (FCS) field 828. A device supporting any of APE+, CPE or BPE can clear this field, which can be calculated from OTA values.

FIG. 9 is an illustration of subfields of a frame control field 900, according to one or more embodiments. The frame control field 900 can include a protocol version subfield 902, type subfield 904, and subtype subfield 906. Each of these subfields can have no offset applied regardless of the privacy support level of the device. The frame control field 900 can include a to distribution system (DS) subfield 908 and a from DS subfield 910. The device can elect not to apply an offset to the values in these fields for devices that support APE+ or CPE. The device can apply an offset to the values for these fields for a device that supports BPE. The frame control field 900 can further include a more fragments subfield 912, a retry subfield 914, a power management subfield 916, a more data subfield 918, an A-MDSU control subfield 920, a protected frame subfield 922, and a +HT control subfield 924. For a device that supports APE+, the device can elect not to apply an offset to any of these fields. For a device that supports any of CPE and BPE, the device can obfuscate the fields.

FIG. 10 is a table 1000 describing offset bit-stream randomization interval, according to one or more embodiments. This table 1000 relates to the first alternative. Even if an offset is applied for obfuscation, a malicious attacker can, with time ascertain the offset value through brute force. Therefore, to preserve the integrity of device-to-device communication, a device can, from time to time, change the offset value. Table 1000 provides various options of triggering mechanisms to change an offset value. A first option 1002. can be to change the offset value per PPDU transmission. The first option 1002 can be suitable for short-term salt value, has it would be coupled with a high rate of change due to the number of PPDU transmissions. The first option 1002 can further be suitable for all MAC header fields for devices that support BPE and CPE, as no offset is applied to a QoS control field or HT control field for devices that support APE+. The change to the offset can be effectuated by randomizing the preamble using a scrambler seed. A second option 1004 can be for the offset to change per target beacon transmission time (TBTT), which can be a time interval used to schedule a beacon. This second option 1004 can be suitable for a long-term salt value as the time intervals can be long enough such that the offset is not changed as frequently as on the per PPDU transmission basis. This second option 1004 can be suitable for obfuscating addresses, SN, the TID, and PN of MAC headers associated with devices that support BPE and CPE as offsets are applied to these fields for BPE and CPE supported devices. This option can be effectuated by using the beacon SN/TBTT number as an input into a function to generate the offset value. A third option 1006 can be for the device to change the offset at a time interval (e.g., between 30 s and 15 min). Again, this can be good for a long-term salt due to the infrequency of the change. This third option 1006 can be suitable for obfuscating addresses, SN, the TID, and PN of MAC headers associated with devices that support BPE and CPE as offsets are applied to these fields for BPE and CPE supported devices. The device can effectuate the change in the offset by using a preconfigured value, and the offset change time does not coincide with another signal that can be used as a triggering mechanism.

FIG. 11 is an illustration 1100 of a scrambler seed extension operation, according to one or more embodiments. A service field 202 can follow a frame preamble and precede a frame payload. The service field 202 can include scrambler initialization bits 204 and reserve service bits 206. A legacy scrambler can use the seven scrambler initialization bits to generate a scrambler seed. In particular, the legacy scrambler can use the seven bits (e.g., short PPDU number) as salt for obfuscating the MAC header included in the payload, where the salt is a value used as an input for a one-way hashing function.

However, using seven bits results in only one hundred and twenty-seven variations. Therefore, a malicious attacker can discover the scrambler seed through brute force. To increase the number of bits, the herein described embodiments suggest using the reserve service bits 206 in addition to using the scrambler initialization bits 204. By using the reserve service bits 206, the scrambler seed can be extended to 2 octets, and this increases the number of possible variations increases to more than one hundred and twenty-seven possibilities.

FIG. 12 is a table 1200 describing the number of keys in secure scrambling, according to one or more embodiments. A device can identify a PPDU type based on reading the elements of a frame. For various reasons, the payload obfuscation may complicate the frame reception and the PPDU type may not be readily ascertainable. Without knowing the PPDU type, a device may be unable to retrieve the correct key for de-obfuscation. Additionally, if an association ID (AID) is not readily ascertainable, it can be difficult to discover the intended receiver device. The BSS Color field may help to discover the BSS in which the AID value belongs. This can be hinder communication when communicating with multiple devices. One approach 1202 is that a device (e.g., an AP) can use one key for transmitting to all other devices. For example, all other devices (STAs) use the same key for all UL frames. Each other device, in turn, has its own device-specific key for transmitting to the device (e.g., AP). Another approach 1204 is for a device (e.g., AP) to have separate keys for transmitting to each other. In turn, each other device uses the same key for transmitting to the device (e.g., AP). These scenarios are illustrated with respect to FIGS. 13-15 .

FIG. 13 is an illustration 1300 for secure scrambling offsets of UL SU, according to one or more embodiments. For UL transmissions, a first device (e.g., AP) 1302 can detect an incoming transmission. However, the first device 1302 cannot determine whether the transmission is received from a second device (e.g., STA1) 1304, a third device (e.g., STA2) 1306, or a fourth device (e.g., STA3) 1308. Therefore, if a device sends a SU frame to the first device 1302, the first device 1302 may not be able to de-obfuscate the message if each other has separate keys to obfuscate the payload. Therefore, the first device 1302 can assign the same key to all of the other devices. As illustrated each other device has the same keys to obfuscate and same UL SU Key 1. Therefore, the second device 1304 can scramble the transmission using the keys to scramble and the UL SU offset 1. The second device 1304 can further transmit the message to the first device 1302. The first device 1302 can receive the message from the second device 1304 and use its keys to descramble the message, regardless of the transmitting device. If the payload matches with frame check sequence (FCS), the first device 1302 can receive the frame. In some embodiments, the first device 1302 can have the additional capability to be able to detect the payload, even if it has assigned several offsets. For instance, the first device 1302 may be able to detect the payload on eight shared offsets that it has assigned.

FIG. 14 is an illustration 1400 for secure scrambling offsets of DL SU, according to one or more embodiments. For DL transmissions, a first device (e.g., AP) 1402 can use a device specific key for transmissions. However, in this instance, the second device (e.g., STA1) 1404, the third device (e.g., STA2) 1406, and fourth device (e.g., STA3) 1408 may be configured to only receive the payload assigned to itself or a group addressed frame. As illustrated, each other device (e.g., the second device 1404, the third device 1406, and the fourth device 1408) can have a distinct DL SU Key to be used for individually addressed reception. Each of these other devices can receive a transmission that may be without an ascertainable AID. Therefore, the other device may not be able to detect the payload if it is not the intended recipient.

To resolve this, the first device 1402 can be configured to include device specific keys for each of the other devices. Therefore, the first device can obfuscate a message with a device specific key that only the intended recipient can de-obfuscate. Therefore, upon receipt of a message, the other device (e.g, the second device 1404, the third device 1406, or the fourth device 1408) can attempt to descramble the message using the device's DL SU key. If the payload matches with the FCS, the STA can receive the frame. If the payload does not match the FCS, the other device can discard the message. This ensures that DL transmissions may be received by the correct device. The group frames may have a separate key that for group addressed SU PPDU obfuscation. The same group offset value can be used for all the other device in a BSS.

FIG. 15 is an illustration 1500 for secure scrambling offsets in neighborhood area network (NAN)/Mesh networks, according to one or more embodiments. In NAN networks and Mesh networks a first device (e.g., NAN STA1 1502) may have a link setup with multiple other a second device (e.g., NAN STA2) 1504 and a third device (e.g., NAN STA3)1506. In some situations, multiple devices can transmit to the same device. Furthermore, each device can be configured with a different obfuscation offset. For example, both the first device 1502 and the second device 1404 can transmit to the third device 1506. Therefore, a receiving device needs to know the transmitting device and have the correct obfuscation key for de-obfuscation. To resolve this, each device can be configured with the obfuscation keys of the other devices. For example, when third device 1506 detects a reception, the third device 1506 can de-scramble the message by using the appropriate obfuscation keys as it has obfuscation keys of each other device. This simplifies frame reception but can require storing of multiple obfuscation keys.

FIG. 16 is an illustration 1600 for secure scrambling offset for MU PPDU, according to one or more embodiments. For an MU PPDU, a device (e.g., AP) can transmit to multiple other devices. Each transmitted frame can include a preamble 1602, and in particular the HE/EHT preamble, which can define the resource unit (RU) 1604 for carrying the frame, where each RU is a group of bandwidth carriers for UL and DL transmissions. The preamble can also define the AID 1606 that indicates the intended recipient of the frame. For each RU, a service field 1608 can be included. For MU PPDU, the recipient and scrambling type are obfuscated. Therefore, a first device 1610 can be configured with multiple device-specific DL MU keys and transmit frames to a second device (e.g., STA1) 1612, a third device (e.g., STA2) 1614, and forth device (e.g., STA3) 1616 using respective DL MU keys to obfuscate the frames. In turn, each of these devices can detect the AID in the frame and determine whether it should receive the frame. If a device determines that it is the intended recipient, it can try the RU and determine whether the payload matches with FCS. If there is a match the device can receive the frame, if there is no match, the device can discard the frame. In some embodiments, the DL SU key and DL MU key can have the same value, or device can have a separate key for both.

FIG. 17 is an illustration 1700 of using MU PPDU for UL transmissions, according to one or more embodiments. As illustrated a first device (e.g., STA) can use a UL MU PPDU to transmit to a second device (e.g., AP). Generally, only a single RU 1702 is used for this transmission. The UL MU PPDU can carry the AID X 1704, and the AID X 1704 can be used by the AP to detect the transmitter. This scheme allows for the first device to use first device specific scrambling keys. The second device can identify the transmitting first device from the AID and can apply the correct scrambling key to descramble the payload. In some embodiments, a network can send a command for all UL data frames to be sent in MU PPDUs. This can ensure that all the transmitted data is securely scrambled. Additionally, a BSS can also adopt a rule that when the payload is transmitted, MU PPDU is used, if the payload is greater than a threshold number of octets or if the payload transmission is longer than a threshold time.

FIG. 18 is an illustration 1800 for secure scrambling offsets of triggered PPDU, according to one or more embodiments. A first device (e.g., AP) can transmit a trigger frame 1802, which can indicate the respective RU 1804, and AID 1806. Upon reception, a second device (e.g., STA) can determine whether it has been allocated an RU based on the trigger frame 1802. If the second device has been allocated an RU, it can transmit on the RU. The respective service field values can be used as an RU specific PPDU number. The PPDU type (e.g., SU or MU) specific address detection can be performed with respect to trigger frame addresses. The first device can assume that if the triggered second device will respond, and the first device can apply the offset of the triggered second device. FIG. 19 is an illustration 1900 for secure scrambling offsets of triggered PPDU, according to one or more embodiments. The first device 1902 (e.g., AP) can be configured to store respective offsets for multiple STAs. The first device 1902 can transmit a trigger frame that is received by a second device (e.g., STA1) 1904. The first device 1902 can assume that the second device 1904 will read the AID in the trigger frame and use the allocated RU to respond. The first device 1902 can further use the stored UL TP STA1 key to descramble the response from the second device 1904.

FIG. 20 is an illustration 2000 for encryption-based secure scrambling, according to one or more embodiments. FIG. 20 relates to the second alternative. As illustrated FIG. 20 introduces the idea of a frame 2002 with an encrypted header 2004 and a message integrity check (MIC) field 2006 that follows the encrypted header 2004. The payload 2008 can be encrypted as described in IEEE 80.11. The encrypted header 2004 can, however, be encrypted differently than the payload 2008. Once the device encrypts the header, the encrypted header 2004 is added as a block cipher having a 16-octet size to the frame 2002. The encrypted header 2004 can include a QoS control field, a HT control field, a CCMP header or a GCMP header, a frame control field. The CCMP header or the GCMP header can include a MPDU specific value that can be used to encrypt the fields to generate the encrypted header. The MIC field 2006 can be added to the frame 2002 to protect the integrity of the encrypted header 2002. The MIC field 2006 can be 2 octets or 4 octets.

FIG. 21 is an illustration a frame 2100 describing obfuscation and encryption, according to one or more embodiments. FIG. 21 provides examples of fields that can be selected for obfuscation or encryption. The frame 2100 can include frame control field 2102, which is discussed with more detail at FIG. 22 . The frame 2100 can further include a Duration/ID field 2104, which can remain transmitted clear in an over the air transmission. The frame 2100 can further include a first address (ADD. 1) field 2106, a second address (ADD. 2) field 2108, a third address (ADD. 3) field 2110, a sequence control field 2112, and a fourth address (ADD. 4) field 2214. The device can apply an offset to obfuscate the values in these fields. The frame 2100 can further include an encrypted header field 2116 that the device can encrypt differently than the payload of the frame 2100. The frame 2100 can include a first MIC field 2218, an A-MDSU header field 2120, and a data payload field 2122. These fields can be encrypted as described in IEEE 802.11 The frame 300 can further include a second MIC field 2124 and an FCS field 2126. The device can transmit these fields as clear over the air. The sequence control for the frame can include a four-bit traffic identifier 2128 followed by a twelve bit sequence number 2130

FIG. 22 is an illustration 2200 of subfields of a frame control field, according to one or more embodiments. As a first option 2202, the device can transmit the protocol version, type and subtypes subfields as clear for an over the air transmission. The device can set the TD DS, From DS, More Fragments, Retry, Power Management, More Data, protected frame and +HTC fields to zero. A second option 2204, the device can transmit the protocol version, type, and subtype subfields as clear for an over the air transmission. The device can further set the first octet of the encrypted header field to zero.

FIG. 23 is an illustration of an additional authentication data field 2300, according one or more embodiments. IEEE 802.11 can specify for the creation of an additional authenticated data (AAD) field for CCMP and GCMP ciphers. The encrypted header can be a CCMP or GCMP cipher. The illustrated can differ from IEEE 802.11 in that the second octet of the Frame Control (FC) field 2302 can be punctured to 0, only the first four bits of the Sequence Control (SC) field 2304 are included, and the other bits are punctured, and the QoS control field is punctured to 0. During a MPDU payload encryption, the device can use the clear field values (e.g., without application of offsets). The encrypted header field can be encrypted using the OTA values of the fields as received from the frame. These OTA values can be used, because packet encryption is real time operation and should be applied to the frame as it is.

FIG. 24 is a process flow 500 for a transmitter operation, according to one or more embodiments. At 2402, a device can receive a data payload from an application or the internet. The data payload can be included in a physical layer protocol data unit (PPDU) transmission. In response to receiving the data payload, the device can assign the payload a sequence number (SN) and a packet number (PN).

At 2404, the device can encrypt the data payload.

At 2406, the device can add obfuscate MAC fields to an each MDPU. In some instances, step 2406 can occur at the next transmission opportunity (TXOP) time that occurs after encrypting the payload (step 2404).

At 2408, the device can encrypt the encrypted header field for each MPDU and the fields to the MAC headers of the MPDUs.

At 2410, the device can transmit the data to a receiving device. For example, the device can be a transmitting device such as an access point and the receiving device can be a station that connects to a wireless local area network provided by the access point.

FIG. 25 is a process flow 2500 for a receiver operation, according to one or more embodiments. At 2502, a device can receive a frame from a transmitting device. The device can be, for example, a station in an environment. The device can receive the frame over the air and further determine whether the device is the intended recipient. For example, the device can determine whether the transmitter address and the receiver address match the device information. If there is a match the device can receive the frame. If there is no match, the device can discard the frame. The device can further determine the duration of the PPDU transmission from the preamble of the frame. The duration can be set in a TXOP field of the preamble or a duration field. The frame can be received, for example, from the device of FIG. 24 .

At 2504, the device can prepare a block acknowledgment for the device.

At 2506, the device can decrypt the encrypted MAC header field for the packet number.

At 2508, the device can reorder the MPDU frames using a buffer.

At 2510, the device can transmit the reordered frames to an application or internet.

For one or more embodiments, at least one of the components set forth in one or more of the preceding figures may be configured to perform one or more operations, techniques, processes, or methods as set forth in the example section below.

Any of the above-described examples may be combined with any other example (or combination of examples), unless explicitly stated otherwise. The foregoing description of one or more implementations provides illustration and description but is not intended to be exhaustive or to limit the scope of embodiments to the precise form disclosed. Modifications and variations are possible in light of the above teachings or may be acquired from practice of various embodiments

Although specific embodiments have been described, various modifications, alterations, alternative constructions, and equivalents are also encompassed within the scope of the disclosure. Embodiments are not restricted to operation within certain specific data processing environments but are free to operate within a plurality of data processing environments. Additionally, although embodiments have been described using a particular series of transactions and steps, it should be apparent to those skilled in the art that the scope of the present disclosure is not limited to the described series of transactions and steps. Various features and aspects of the above-described embodiments may be used individually or jointly.

Further, while embodiments have been described using a particular combination of hardware and software, it should be recognized that other combinations of hardware and software are also within the scope of the present disclosure. Embodiments may be implemented only in hardware, or only in software, or using combinations thereof. The various processes described herein can be implemented on the same processor or different processors in any combination. Accordingly, where components or modules are described as being configured to perform certain operations, such configuration can be accomplished, e.g., by designing electronic circuits to perform the operation, by programming programmable electronic circuits (such as microprocessors) to perform the operation, or any combination thereof. Processes can communicate using a variety of techniques, including but not limited to conventional techniques for inter process communication, and different pairs of processes may use different techniques, or the same pair of processes may use different techniques at different times.

The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. It will, however, be evident that additions, subtractions, deletions, and other modifications and changes may be made thereunto without departing from the broader spirit and scope as set forth in the claims. Thus, although specific disclosure embodiments have been described, these are not intended to be limiting. Various modifications and equivalents are within the scope of the following claims.

The use of the terms “a” and “an” and “the” and similar referents in the context of describing the disclosed embodiments (especially in the context of the following claims) are to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. The terms “comprising,” “having,” “including,” and “containing” are to be construed as open-ended terms (i.e., meaning “including, but not limited to,”) unless otherwise noted. The term “connected” is to be construed as partly or wholly contained within, attached to, or joined together, even if there is something intervening. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein, and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate embodiments and does not pose a limitation on the scope of the disclosure unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the disclosure.

Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is intended to be understood within the context as used in general to present that an item, term, etc., may be either X, Y, or Z, or any combination thereof (e.g., X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.

Preferred embodiments of this disclosure are described herein, including the best mode known for carrying out the disclosure. Variations of those preferred embodiments may become apparent to those of ordinary skill in the art upon reading the foregoing description. Those of ordinary skill should be able to employ such variations as appropriate, and the disclosure may be practiced otherwise than as specifically described herein. Accordingly, this disclosure includes all modifications and equivalents of the subject matter recited in the claims appended hereto as permitted by applicable law. Moreover, any combination of the above-described elements in all possible variations thereof is encompassed by the disclosure unless otherwise indicated herein.

All references, including publications, patent applications, and patents, cited herein are hereby incorporated by reference to the same extent as if each reference were individually and specifically indicated to be incorporated by reference and were set forth in its entirety herein.

In the foregoing specification, aspects of the disclosure are described with reference to specific embodiments thereof, but those skilled in the art will recognize that the disclosure is not limited thereto. Various features and aspects of the above-described disclosure may be used individually or jointly. Further, embodiments can be utilized in any number of environments and applications beyond those described herein without departing from the broader spirit and scope of the specification. The specification and drawings are, accordingly, to be regarded as illustrative rather than restrictive.

It is well understood that the use of personally identifiable information should follow privacy policies and practices that are generally recognized as meeting or exceeding industry or governmental requirements for maintaining the privacy of users. In particular, personally identifiable information data should be managed and handled so as to minimize risks of unintentional or unauthorized access or use, and the nature of authorized use should be clearly indicated to users. 

What is claimed is:
 1. A method, comprising: by a first communication device: encrypting a data payload using a first encryption algorithm; encrypting a field of a medium access control (MAC) header using a second encryption algorithm, different from the first encryption algorithm; generating a data frame comprising the encrypted MAC header field and the encrypted payload; and transmitting the data frame to a second communication device.
 2. The method of claim 1, wherein the method further comprises generating additional authenticated data (AAD) responsive to adding the encrypted MAC header field to the frame, wherein a value of a quality of service field of the data frame is set to zero.
 3. The method of claim 1, wherein the method further comprises setting a first octet of the encrypted MAC header field to zero prior to transmitting the frame.
 4. The method of claim 1, wherein the encrypted MAC header field comprises a quality of service field, a counter mode cipher block chaining message authentication code protocol field, and a frame control field.
 5. The method of claim 1, wherein encrypting the data payload further comprises encrypting an aggregate MAC data unit field based on the first encryption algorithm.
 6. The method of claim 1, wherein a timing for encrypting the MAC header field is based on a transmission opportunity.
 7. The method of claim 1, wherein the method further comprises selecting the field of the MAC header to encrypt based on a privacy enhancement supported by the first device.
 8. A first communication device, comprising: one or more processors, one or more computer-readable media including instructions that, when executed, cause the one or more processors to: encrypt a data payload using a first encryption algorithm; encrypt a field of a medium access control (MAC) header using a second encryption algorithm, different from the first encryption algorithm; generate a data frame comprising the encrypted MAC header field and the encrypted payload; and transmit the data frame to a second communication device.
 9. The first communication device of claim 8, wherein the instructions that, when executed, further cause the one or more processors to generate additional authenticated data (AAD) responsive to adding the encrypted MAC header field to the frame, wherein a value of a quality of service field of the data frame is set to zero.
 10. The first communication device of claim 8, wherein the instructions that, when executed, further cause the one or more processors to set a first octet of the encrypted MAC header field to zero prior to transmitting the frame.
 11. The first communication device of claim 8, wherein the encrypted MAC header field comprises a quality of service field, a counter mode cipher block chaining message authentication code protocol field, and a frame control field.
 12. The first communication device of claim 8, wherein encrypting the data payload further comprises encrypting an aggregate MAC data unit field based on the first encryption algorithm.
 13. The first communication device of claim 8, wherein a timing for encrypting the MAC header field is based on a transmission opportunity.
 14. The first communication device of claim 8, wherein the instructions that, when executed, further cause the one or more processors to select the field of the MAC header to encrypt based on a privacy enhancement supported by the first device.
 15. One or more non-transitory, computer-readable media having stored thereon a sequence of instructions that, when executed by one or more processors, causes the one or more processors to: encrypt a data payload using a first encryption algorithm; encrypt a field of a medium access control (MAC) header using a second encryption algorithm, different from the first encryption algorithm; generate a data frame comprising the encrypted MAC header field and the encrypted payload; and transmit the data frame to a second communication device.
 16. The one or more non-transitory, computer-readable media of claim 15, wherein the instructions that, when executed, further cause the one or more processors to generate additional authenticated data (AAD) responsive to adding the encrypted MAC header field to the frame, wherein a value of a quality of service field of the data frame is set to zero.
 17. The one or more non-transitory, computer-readable media of claim 15, wherein the instructions that, when executed, further cause the one or more processors to set a first octet of the encrypted MAC header field to zero prior to transmitting the frame.
 18. The one or more non-transitory, computer-readable media of claim 15, wherein the encrypted MAC header field comprises a quality of service field, a counter mode cipher block chaining message authentication code protocol field, and a frame control field.
 19. The one or more non-transitory, computer-readable media of claim 15, wherein encrypting the data payload further comprises encrypting an aggregate MAC data unit field based on the first encryption algorithm.
 20. The one or more non-transitory, computer-readable media of claim 15, wherein a timing for encrypting the MAC header field is based on a transmission opportunity. 