{"id":397158,"date":"2024-10-20T04:28:39","date_gmt":"2024-10-20T04:28:39","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-802-11w-2009-2\/"},"modified":"2024-10-26T08:16:04","modified_gmt":"2024-10-26T08:16:04","slug":"ieee-802-11w-2009-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-802-11w-2009-2\/","title":{"rendered":"IEEE 802.11w-2009"},"content":{"rendered":"

Amendment Standard – Superseded. This amendment specifies the extensions to IEEE Std 802.11 for wireless local area networks (WLANs) providing mechanisms for protecting management frames.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
1<\/td>\nIEEE Std 802.11w-2009 (Amendment to IEEE Std 802.11-2007), Front cover <\/td>\n<\/tr>\n
3<\/td>\nTitle page
\n <\/td>\n<\/tr>\n
6<\/td>\nIntroduction
\n
Notice to users
\n
Laws and regulations
\n
Copyrights
\n
Updating of IEEE documents
\n <\/td>\n<\/tr>\n
7<\/td>\nErrata
\n
Interpretations
\n
Patents
\n
Participants
\n <\/td>\n<\/tr>\n
12<\/td>\nContents
\n <\/td>\n<\/tr>\n
19<\/td>\nList of figures
\n <\/td>\n<\/tr>\n
20<\/td>\nList of tables
\n <\/td>\n<\/tr>\n
21<\/td>\nImportant notice
\n <\/td>\n<\/tr>\n
22<\/td>\n3. Definitions
4. Abbreviations and acronyms
5. General description
5.2 Components of the IEEE 802.11 architecture
5.2.3 Distribution system (DS) concepts
5.2.3.2 RSNA <\/td>\n<\/tr>\n
23<\/td>\n5.4 Overview of the services
5.4.2 Services that support the distribution service
5.4.2.4 Disassociation
5.4.3 Access control and data confidentiality services
5.4.3.2 Deauthentication
5.4.3.3 Data confidentiality <\/td>\n<\/tr>\n
24<\/td>\n5.4.3.4 Key management
5.4.3.5 Data origin authenticity
5.4.3.6 Replay detection
5.4.3.7 Fast BSS transition
5.4.3.8 Robust Management frame protection <\/td>\n<\/tr>\n
25<\/td>\n5.8 IEEE Std 802.11 and IEEE Std 802.1X-2004
5.8.2 Infrastructure functional model overview
5.8.2.1 Authentication and key management (AKM) operations with Authentication Server (AS) <\/td>\n<\/tr>\n
27<\/td>\n5.8.2.2 Operations with PSK
5.8.5 PMKSA caching
5.8.6 Protection of broadcast and multicast Robust Management frames <\/td>\n<\/tr>\n
28<\/td>\n6. MAC service definition
6.1 Overview of MAC services
6.1.2 Security services
7. Frame formats
7.1 MAC Frame formats
7.1.3 Frame fields
7.1.3.1 Frame control field
7.1.3.1.8 Protected Frame field <\/td>\n<\/tr>\n
29<\/td>\n7.2 Format of individual frame types
7.2.3 Management frames
7.2.3.3 Disassociation frame format
7.2.3.5 Association Response frame format <\/td>\n<\/tr>\n
30<\/td>\n7.2.3.7 Reassociation Response frame format
7.2.3.11 Deauthentication <\/td>\n<\/tr>\n
31<\/td>\n7.2.3.12 Action frame format
7.3 Management frame body components
7.3.1 Fields that are not information elements
7.3.1.9 Status Code field <\/td>\n<\/tr>\n
32<\/td>\n7.3.1.11 Action field
7.3.2 Information elements <\/td>\n<\/tr>\n
34<\/td>\n7.3.2.25 RSN information element <\/td>\n<\/tr>\n
35<\/td>\n7.3.2.25.1 Cipher suites <\/td>\n<\/tr>\n
37<\/td>\n7.3.2.25.2 AKM suites
7.3.2.25.3 RSN capabilities <\/td>\n<\/tr>\n
38<\/td>\n7.3.2.48 Fast BSS transition information element (FTIE) <\/td>\n<\/tr>\n
39<\/td>\n7.3.2.49 Timeout Interval information element (TIE)
7.3.2.54 Supported Regulatory Classes element
7.3.2.55 Management MIC information element <\/td>\n<\/tr>\n
40<\/td>\n7.4 Action frame format details
7.4.5 Vendor-specific action details
7.4.7 Public Action details
7.4.7.1 Public Action frames <\/td>\n<\/tr>\n
41<\/td>\n7.4.7.9 DSE Power Constraint frame format
7.4.7.10 Vendor Specific Public Action frame format
7.4.8 Action frame details
7.4.9 SA Query Action frame details
7.4.9.1 SA Query Request frame <\/td>\n<\/tr>\n
42<\/td>\n7.4.9.2 SA Query Response frame
7.4.9a Protected Dual of Public Action frames
7.4.9a.1 Protected Dual of Public Action details <\/td>\n<\/tr>\n
43<\/td>\n7.4.9a.2 Protected DSE Enablement frame format
7.4.9a.3 Protected DSE Deenablement frame format
7.4.9a.4 Protected Extended Channel Switch Announcement frame format
7.4.9a.5 Protected DSE Measurement Request frame format
7.4.9a.6 Protected DSE Measurement Report frame format <\/td>\n<\/tr>\n
44<\/td>\n7.4.9a.7 Protected DSE Power Constraint frame format
8. Security
8.1 Framework
8.1.1 Security methods
8.1.3 RSNA establishment
8.3 RSNA data confidentiality and integrity protocols
8.3.1 Overview <\/td>\n<\/tr>\n
45<\/td>\n8.3.3 CTR with CBC-MAC Protocol (CCMP)
8.3.3.1 CCMP Overview
8.3.3.3 CCMP cryptographic encapsulation
8.3.3.3.2 Construct AAD <\/td>\n<\/tr>\n
46<\/td>\n8.3.3.3.3 Construct CCM nonce
8.3.3.3.5 CCM originator processing
8.3.3.4 CCMP decapsulation <\/td>\n<\/tr>\n
47<\/td>\n8.3.3.4.1 CCM recipient processing
8.3.3.4.3 PN and replay detection
8.3.4 The Broadcast\/Multicast integrity protocol <\/td>\n<\/tr>\n
48<\/td>\n8.3.4.1 BIP overview
8.3.4.2 BIP MMPDU format
8.3.4.3 BIP AAD construction
8.3.4.4 BIP replay protection <\/td>\n<\/tr>\n
49<\/td>\n8.3.4.5 BIP transmission
8.3.4.6 BIP reception <\/td>\n<\/tr>\n
50<\/td>\n8.4 RSNA security association management
8.4.1 Security associations
8.4.1.1 Security association definitions
8.4.1.1.3 GTKSA
8.4.1.1.3a IGTKSA
8.4.1.2 Security association life cycle
8.4.1.2.1 Security association in an ESS <\/td>\n<\/tr>\n
51<\/td>\n8.4.3 RSNA policy selection in an ESS <\/td>\n<\/tr>\n
52<\/td>\n8.4.4 RSNA policy selection in an IBSS <\/td>\n<\/tr>\n
53<\/td>\n8.4.6 RSNA authentication in an ESS
8.4.6.1 Preauthentication and RSNA key management
8.4.6.2 Cached PMKSAs and RSNA key management
8.4.9 RSNA key management in an IBSS
8.4.10 RSNA security association termination <\/td>\n<\/tr>\n
54<\/td>\n8.4.11 Protection of Robust Management frames <\/td>\n<\/tr>\n
55<\/td>\n8.4.12 Robust Management frame Selection Procedure
8.5 Keys and key distribution
8.5.1 Key hierarchy
8.5.1.1 PRF <\/td>\n<\/tr>\n
56<\/td>\n8.5.1.2 Pairwise key hierarchy
8.5.1.3 Group key hierarchy
8.5.1.3a Integrity group key hierarchy
8.5.1.4 PeerKey key hierarchy <\/td>\n<\/tr>\n
57<\/td>\n8.5.2 EAPOL-Key frames
8.5.2.1 EAPOL-Key frame notation <\/td>\n<\/tr>\n
58<\/td>\n8.5.3 4-Way Handshake
8.5.3.2 4-Way Handshake Message 2
8.5.3.3 4-Way Handshake Message 3
8.5.3.6 Sample 4-Way Handshake <\/td>\n<\/tr>\n
59<\/td>\n8.5.4 Group Key Handshake <\/td>\n<\/tr>\n
60<\/td>\n8.5.4.1 Group Key Handshake Message 1
8.5.4.4 Sample Group Key Handshake <\/td>\n<\/tr>\n
61<\/td>\n8.5.5 RSNA Supplicant key management state machine <\/td>\n<\/tr>\n
62<\/td>\n8.5.5.2 Supplicant state machine variables
8.5.5.3 Supplicant state machine procedures <\/td>\n<\/tr>\n
64<\/td>\n8.5.6 RSNA Authenticator key management state machine <\/td>\n<\/tr>\n
66<\/td>\n8.6 Mapping EAPOL keys to IEEE 802.11 keys
8.6.3 Mapping PTK to CCMP keys
8.6.6a Mapping IGTK to BIP Keys <\/td>\n<\/tr>\n
67<\/td>\n8.7 Per-frame pseudo-code
8.7.2 RSNA frame pseudo-code
8.7.2.1 Per-MSDU Tx pseudo-code
8.7.2.1a Per-MMPDU Tx pseudo-code <\/td>\n<\/tr>\n
69<\/td>\n8.7.2.2a Per-MPDU Tx pseudo-code for MMPDU
8.7.2.3a Per-MPDU Rx pseudo-code for an MMPDU <\/td>\n<\/tr>\n
73<\/td>\n8.7.2.5 Per-MMPDU Rx pseudo-code <\/td>\n<\/tr>\n
74<\/td>\n10. Layer Management
10.3 MLME SAP interface
10.3.17 SetKeys
10.3.17.1 MLME-SETKEYS.request
10.3.17.1.2 Semantics of the service primitive
10.3.18 DeleteKeys
10.3.18.1 MLME-DELETEKEYS.request
10.3.18.1.2 Semantics of the service primitive
10.3.22 SetProtection
10.3.22.1 MLME-SETPROTECTION.request
10.3.22.1.2 Semantics of the service primitive <\/td>\n<\/tr>\n
75<\/td>\n10.3.39 SA Query support
10.3.39.1 MLME-SAQuery.request
10.3.39.1.1 Function
10.3.39.1.2 Semantics of the service primitive
10.3.39.1.3 When generated
10.3.39.1.4 Effect of receipt
10.3.39.2 MLME-SAQuery.confirm
10.3.39.2.1 Function
10.3.39.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n
76<\/td>\n10.3.39.2.3 When generated
10.3.39.2.4 Effect of receipt
10.3.39.3 MLME-SAQuery.indication
10.3.39.3.1 Function
10.3.39.3.2 Semantics of the service primitive <\/td>\n<\/tr>\n
77<\/td>\n10.3.39.3.3 When generated
10.3.39.3.4 Effect of receipt
10.3.39.4 MLME-SAQuery.response
10.3.39.4.1 Function
10.3.39.4.2 Semantics of the service primitive
10.3.39.4.3 When generated
10.3.39.4.4 Effect of receipt
10.3.40 Protected Extended Channel Switch Announcement <\/td>\n<\/tr>\n
78<\/td>\n10.3.40.1 MLME-PDEXTCHANNELSWITCH.request
10.3.40.1.1 Function
10.3.40.1.2 Semantics of the service primitive
10.3.40.1.3 When generated
10.3.40.1.4 Effect of receipt
10.3.40.2 MLME-PDEXTCHANNELSWITCH.confirm
10.3.40.2.1 Function <\/td>\n<\/tr>\n
79<\/td>\n10.3.40.2.2 Semantics of the service primitive
10.3.40.2.3 When generated
10.3.40.2.4 Effect of receipt
10.3.40.3 MLME-PDEXTCHANNELSWITCH.indication
10.3.40.3.1 Function
10.3.40.3.2 Semantics of the service primitive <\/td>\n<\/tr>\n
80<\/td>\n10.3.40.3.3 When generated
10.3.40.3.4 Effect of receipt
10.3.40.4 MLME-PDEXTCHANNELSWITCH.response
10.3.40.4.1 Function
10.3.40.4.2 Semantics of the service primitive <\/td>\n<\/tr>\n
81<\/td>\n10.3.40.4.3 When generated
10.3.40.4.4 Effect of receipt
10.3.41 Protected DSE Power Constraint Announcement
10.3.41.1 MLME-PDDSETPC.request
10.3.41.1.1 Function
10.3.41.1.2 Semantics of the service primitive <\/td>\n<\/tr>\n
82<\/td>\n10.3.41.1.3 When generated
10.3.41.1.4 Effect of receipt
10.3.41.2 MLME-PDDSETPC.confirm
10.3.41.2.1 Function
10.3.41.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n
83<\/td>\n10.3.41.2.3 When generated
10.3.41.2.4 Effect of receipt
10.3.41.3 MLME-PDDSETPC.indication
10.3.41.3.1 Function
10.3.41.3.2 Semantics of the service primitive
10.3.41.3.3 When generated
10.3.41.3.4 Effect of receipt <\/td>\n<\/tr>\n
84<\/td>\n10.3.41.4 MLME-PDDSETPC.response
10.3.41.4.1 Function
10.3.41.4.2 Semantics of the service primitive
10.3.41.4.3 When generated
10.3.41.4.4 Effect of receipt
10.3.42 Protected Enablement
10.3.42.1 MLME-PDENABLEMENT.request
10.3.42.1.1 Function
10.3.42.1.2 Semantics of the service primitive <\/td>\n<\/tr>\n
85<\/td>\n10.3.42.1.3 When generated
10.3.42.1.4 Effect of receipt
10.3.42.2 MLME-PDENABLEMENT.confirm
10.3.42.2.1 Function
10.3.42.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n
86<\/td>\n10.3.42.2.3 When generated
10.3.42.2.4 Effect of receipt
10.3.42.3 MLME-PDENABLEMENT.indication
10.3.42.3.1 Function
10.3.42.3.2 Semantics of the service primitive <\/td>\n<\/tr>\n
87<\/td>\n10.3.42.3.3 When generated
10.3.42.3.4 Effect of receipt
10.3.42.4 MLME-PDENABLEMENT.response
10.3.42.4.1 Function
10.3.42.4.2 Semantics of the service primitive <\/td>\n<\/tr>\n
88<\/td>\n10.3.42.4.3 When generated
10.3.42.4.4 Effect of receipt
10.3.43 Protected Deenablement
10.3.43.1 MLME-PDDEENABLEMENT.request
10.3.43.1.1 Function
10.3.43.1.2 Semantics of the service primitive
10.3.43.1.3 When generated
10.3.43.1.4 Effect of receipt <\/td>\n<\/tr>\n
89<\/td>\n10.3.43.2 MLME-PDDEENABLEMENT.confirm
10.3.43.2.1 Function
10.3.43.2.2 Semantics of the service primitive
10.3.43.2.3 When generated
10.3.43.2.4 Effect of receipt
10.3.43.3 MLME-PDDEENABLEMENT.indication
10.3.43.3.1 Function <\/td>\n<\/tr>\n
90<\/td>\n10.3.43.3.2 Semantics of the service primitive
10.3.43.3.3 When generated
10.3.43.3.4 Effect of receipt
10.3.44 Vendor Specific Public Action
10.3.44.1 MLME-PVSPECIFIC.request
10.3.44.1.1 Function
10.3.44.1.2 Semantics of the service primitive <\/td>\n<\/tr>\n
91<\/td>\n10.3.44.1.3 When generated
10.3.44.1.4 Effect of receipt
10.3.44.2 MLME-PVSPECIFIC.confirm
10.3.44.2.1 Function
10.3.44.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n
92<\/td>\n10.3.44.2.3 When generated
10.3.44.2.4 Effect of receipt
10.3.44.3 MLME-PVSPECIFIC.indication
10.3.44.3.1 Function
10.3.44.3.2 Semantics of the service primitive
10.3.44.3.3 When generated
10.3.44.3.4 Effect of receipt <\/td>\n<\/tr>\n
93<\/td>\n11. MLME
11.3 STA authentication and association
11.3.1 Authentication and deauthentication
11.3.1.1 Authentication-originating STA
11.3.1.2 Authentication-destination STA
11.3.2 Association, reassociation, and disassociation
11.3.2.2 AP association procedures <\/td>\n<\/tr>\n
94<\/td>\n11.3.2.4 AP reassociation procedures
11.11 DSE procedures
11.11.1 General <\/td>\n<\/tr>\n
95<\/td>\n11.12 Broadcast and multicast Robust Management frame procedures
11.13 SA Query procedures
11A. Fast BSS Transition
11A.2 Key holders
11A.2.2 Authenticator key holders <\/td>\n<\/tr>\n
96<\/td>\n11A.4 FT initial mobility domain association
11A.4.2 FT initial mobility domain association in an RSN <\/td>\n<\/tr>\n
97<\/td>\n11A.5 FT protocol
11A.5.2 Over-the-air FT protocol authentication in an RSN <\/td>\n<\/tr>\n
98<\/td>\n11A.5.3 Over-the-DS FT Protocol authentication in an RSN <\/td>\n<\/tr>\n
99<\/td>\n11A.6 FT Resource Request Protocol
11A.6.2 Over-the-air fast BSS transition with resource request
11A.6.3 Over-the-DS fast BSS transition with resource request <\/td>\n<\/tr>\n
100<\/td>\n11A.7 FT reassociation
11A.7.1 FT reassociation in an RSN
11A.8 FT authentication sequence
11A.8.5 FT authentication sequence: contents of fourth message <\/td>\n<\/tr>\n
101<\/td>\n11A.9 FT security architecture state machines
11A.9.3 R1KH state machine <\/td>\n<\/tr>\n
103<\/td>\nAnnex A (normative) Protocol Implementation Conformance Statement (PICS) proforma
\n
A.4 PICS proforma-IEEE Std 802.11-2007
A.4.4 MAC protocol
A.4.4.1 MAC protocol capabilities <\/td>\n<\/tr>\n
105<\/td>\nAnnex D (normative) ASN.1 encoding of the MAC and PHY MIB
\n <\/td>\n<\/tr>\n
110<\/td>\nAnnex H (informative) RSNA reference implementations and test vectors
\n
H.8 Test vectors for AES-128-CMAC
H.9 Management Frame Protection test vectors
H.9.1 BIP with broadcast Deauthentication frame <\/td>\n<\/tr>\n
111<\/td>\nH.9.2 CCMP with unicast Deauthentication frame <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 4: Protected Management Frames<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2009<\/td>\n111<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":397164,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-397158","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/397158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/397164"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=397158"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=397158"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=397158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}