CN108012315B - Communication method, network equipment and terminal - Google Patents

Communication method, network equipment and terminal Download PDF

Info

Publication number
CN108012315B
CN108012315B CN201711052385.6A CN201711052385A CN108012315B CN 108012315 B CN108012315 B CN 108012315B CN 201711052385 A CN201711052385 A CN 201711052385A CN 108012315 B CN108012315 B CN 108012315B
Authority
CN
China
Prior art keywords
terminal
wakeup
frame
identification information
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711052385.6A
Other languages
Chinese (zh)
Other versions
CN108012315A (en
Inventor
韩云博
方平
丁志明
李小仙
杨云松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from PCT/CN2016/104090 external-priority patent/WO2018076356A1/en
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN108012315A publication Critical patent/CN108012315A/en
Application granted granted Critical
Publication of CN108012315B publication Critical patent/CN108012315B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • H04W52/0229Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal where the received signal is a wanted signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • H04W52/0248Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal dependent on the time of the day, e.g. according to expected transmission activity
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The embodiment of the invention provides a communication method, network equipment and a terminal. The communication method provided by the embodiment of the invention can comprise the following steps: a first device (network device, such as an access point) receives a wake-up confirmation frame sent by a second device (terminal), wherein the wake-up confirmation frame comprises indication information to indicate that the terminal is awakened by a wake-up receiver of the terminal; and when the first equipment determines that the wake-up frame is not sent to the second equipment within the preset time period according to the indication information, the first equipment sends a message carrying the updated identification information to the second equipment so as to be used for communicating with the second equipment. The method avoids the terminal being attacked by an attacker by updating the identification information, thereby reducing the extra energy consumption of the terminal and reducing the signaling overhead when the WUR in the terminal is not attacked.

Description

Communication method, network equipment and terminal
Technical Field
The embodiment of the invention relates to the field of communication, in particular to a communication method, network equipment and a terminal.
Background
With the evolution of the WLAN (Wireless Local Area Network) standard, in a Wireless Fidelity (WiFi) Network, when there is No message transmission or reception (e.g. No data phase), a terminal (e.g. a workstation) may waste a large part of energy in an idle listening channel when there is No received signal. The IEEE (Institute of Electrical and Electronic Engineers) 802.11 working group is providing a Low Power Wake Up Radio (LP-WUR) as a core technology to reduce WiFi Power consumption. Therefore, in a communication process between a network device in a WiFi network, such as a wireless Access Point (AP), and a terminal, a communication method for reducing power consumption of the terminal is needed.
In the prior art, a communication method for reducing the power consumption of a terminal is to adopt a low-power-consumption WUR for the terminal to replace a wireless transceiver to listen to a channel when a medium is idle. And when the wireless transceiver of the terminal enters deep sleep, the WUR with low power consumption wakes up to start working. When the AP needs to communicate with a terminal with a WUR and a wireless transceiver, the AP sends a wakeup frame (WURP) to the WUR of the terminal, the WUR receiving the WURP compares the WUR ID (namely WUR identification information for identifying the WUR) in the WURP with the WUR ID allocated by the AP, if the comparison result is consistent, the WUR considers that the WURP is sent to the WURP, then the WUR wakes Up the wireless transceiver of the terminal, the WUR goes to sleep again, and the AP communicates with the awakened wireless transceiver. The wireless transceiver of the terminal can enter the sleep mode after the communication with the AP is completed, and meanwhile the WUR wakes up and starts to listen whether the WUPs sent to the terminal exist or not so as to wake up the wireless transceiver again.
In order to realize low power consumption, factors such as a circuit structure, a frame structure design (such as WUP) and the like of the wake-up receiver WUR need to be simple and low in complexity, and the wake-up receiver WUR is easy to attack. Therefore, to prevent attacks, the WUP incorporates simplified Frame Authentication Code (FAC) information to authenticate whether the Frame was transmitted by the AP associated with the terminal. Broadly, the FAC is part of the WUR ID (i.e., the identification information of the WUR) that is used by the WUR to identify whether the WUP is intended for itself. In a narrow sense, the FAC is a type of verification information that helps the WUR determine whether the WUP is a legitimate message. In this specification, the term FAC is used in a broad sense and is considered part of the WUR ID.
The FAC is updated each time the WUR successfully wakes up the wireless transceiver, i.e., the WUR ID is updated each time the wireless transceiver is successfully woken up, which introduces additional signaling overhead, out-of-synchronization risk, and energy consumption. Out-of-sync is a phenomenon in which the AP and the terminal do not update the WUR ID of the WUR synchronously (for example, the terminal updates the FAC to the WUR, but the AP side is not updated yet).
Disclosure of Invention
The embodiment of the application provides a communication method, network equipment and a terminal, and the method is used for reducing energy waste of an interception channel when the terminal is idle and improving communication safety of the terminal.
In a first aspect, a communication method is provided, and the method includes: a first device (network device, such as an access point) receives a wake-up acknowledgement frame, which may be a control frame, a data frame, or a management frame, sent by a wireless transceiver (e.g., an 802.11 transceiver module) of a second device (terminal). The wake-up confirmation frame includes wake-up indication information, where the wake-up indication information is used to indicate that a wireless transceiver of the second device is woken up by a wake-up receiver of the second device after receiving a wake-up frame, and the wake-up frame includes first identification information of the wake-up receiver, where the first identification information is identification information currently used by the wake-up receiver, where the first identification information may be complete WUR identification information or partial WUR identification information, such as a complete Media Access Control (MAC) address or a partial address capable of distinguishing a MAC address. When the first device determines that the wakeup frame has been sent to the second device within the preset time period according to the wakeup indication information, the first device sends a first message to the second device, where the first message is a message that the first device has been determined to send to the second device when sending the wakeup frame, and the first message may be a data frame, so as to implement communication between the first device and the second device. When the first device determines that the wakeup frame is not sent to the second device within the preset time period according to the wakeup indication information, the first device sends a second message to the second device, where the second message may be a data frame, a control frame, or a management frame, and the second message includes second identification information of the wakeup receiver or indication information of the second identification information, so that the second device updates identification information currently used by the wakeup receiver according to the second identification information or the indication information of the second identification information, so as to ensure communication security of the terminal.
In an alternative implementation, when the first device has other information (e.g., data) to be transmitted in addition to the second identification information, the first device first sends a second message including the second identification information to the second device, and then transmits a subsequent message. The wireless transceiver of the second device is in an awakening state, and the second message carrying the second identification information is received, so that the out-of-synchronization condition caused by the fact that the first device and the second device do not synchronously update the identification information of the WUR due to the fact that the wireless transceiver of the second device enters the sleep mode is avoided.
In an optional implementation, before the first device sends the second message to the second device, the first device performs encryption processing on the second message to ensure that the updated second identification information is not acquired by other devices (attackers).
In an optional implementation, after the first device sends the second message to the second device, the first device receives a confirmation message of the second message sent by the second device after the second device updates the identification information currently used by the wake-up receiver according to the second identification information or the indication information of the second identification information, where the confirmation message includes the authentication information of the second device. The first equipment determines attribute information of the second equipment according to the identity authentication information; the first device communicates with the second device according to the attribute information of the second device, so that the first device further confirms that the second device is awakened.
In an optional implementation, the wake-up confirmation frame further includes attribute information of the second device, such as address information of the terminal.
After the first device receives the wakeup confirm frame sent by the wireless transceiver of the second device, the first device determines the current protection mode of the second device according to the attribute information of the second device, that is, determines which protection mode the second device currently works in. The first device identifies the duration of the second device working in the current protection mode, and determines whether to switch the current protection mode according to the identification result, so that the first device can update the WUR ID of the WUR, and meanwhile, the first device is prevented from being attacked by an attacker, thereby reducing signaling overhead and reducing extra energy consumption.
In an optional implementation, the identifying, by the first device, the duration of the second device operating in the current protection mode specifically includes: after the first device determines that the current protection mode of the second device is the first protection mode, the first protection mode is a mode in which the first device updates the identification information of the wake-up receiver each time the wireless transceiver of the second device is awakened by the wake-up receiver of the second device. The first device identifies whether the second device is attacked within a first time period of the first protection mode. Wherein, the attack of the second device means that the first device receives the wakeup confirm message sent by the second device, but the first device does not send a wakeup frame to the second device within a preset time period. After the first device determines that a wakeup frame has been sent to the second device within a preset time period according to the wakeup indication information, the first device switches the current protection mode of the second device according to the identification result, and the method specifically includes: when the first device identifies that the time that the second device works in the first protection mode exceeds the first time length and the second device is not attacked within the first time length, the first device switches the current protection mode of the second device from the first protection mode to the second protection mode. The method avoids the second equipment from being in the first protection mode with high cost for a long time in multi-round communication, and can flexibly place the second equipment under different safety protection strengths according to different practical situations.
In an optional implementation, the identifying, by the first device, the duration of the second device operating in the current protection mode specifically includes: after the first device determines that the current protection mode of the second device is the second protection mode, the second protection mode is a mode for updating the identification information of the wake-up receiver of the second device when the first device receives the wake-up acknowledgement frame sent by the wireless transceiver of the second device and determines that the first device does not send the wake-up frame to the wake-up receiver of the second device within a preset time period. And the first equipment identifies the second time length and the attack times of the second equipment working in the second protection mode. The attack of the second device means that the first device receives the wakeup confirm message sent by the second device, but the first device does not send the wakeup frame to the second device within the preset time period. After the first device determines that the wake-up frame is not sent to the second device within the preset time period according to the wake-up indication information, the first device switches the current protection mode of the second device according to the identification result, and the method specifically includes: and when the first equipment identifies that the time of the second equipment working in the second protection mode does not exceed the second duration and the attacked times of the second equipment are not less than the attacked times, the first equipment switches the current protection mode of the second equipment from the second protection mode to the first protection mode. The method avoids the second equipment from being continuously attacked in multi-round communication, and can flexibly place the second equipment under different security protection strengths according to different actual conditions.
In a second aspect, another communication method is provided, the method comprising: and the awakening receiver of the second equipment awakens the wireless transceiver of the second equipment after receiving the awakening frame, wherein the awakening frame comprises first identification information of the awakening receiver, and the first identification information is identification information currently used by the awakening receiver.
The first identification information may be complete WUR identification information or partial WUR identification information, such as a complete MAC address or a partial address capable of distinguishing MAC addresses.
The wireless transceiver of the second device, upon being woken up, sends a wake-up acknowledgement frame, which may be a control frame, a data frame, or a management frame, to the first device. The wake-up acknowledgement frame includes wake-up indication information for indicating that the wireless transceiver of the second device is to be woken up by the wake-up receiver of the second device after receiving the wake-up frame.
The second device receives a first message sent by the first device, where the first message is sent after the first device determines that the first device has sent a wakeup frame to the second device within a preset time period after receiving the wakeup indication information, the first message is a message that the first device has determined to send to the second device when sending the wakeup frame, and the first message may be a data frame, so as to implement communication between the first device and the second device. Alternatively, the first and second electrodes may be,
the second device receives a second message sent by the first device, the second message is sent after the first device determines that the first device does not send a wakeup frame to the second device in a preset time period after receiving wakeup indication information, the second message can be a data frame, a control frame or a management frame, the second message includes second identification information of a wakeup receiver or indication information of the second identification information, and the identification information currently used by the wakeup receiver is updated according to the second identification information or the indication information of the second identification information, so that the second device updates the identification information currently used by the wakeup receiver according to the second identification information or the indication information of the second identification information, and communication safety of the terminal is guaranteed.
In an alternative implementation, when the first device has other information (e.g., data) to be transmitted in addition to the second identification information, the second device sequentially receives a second message including the second identification information and subsequent messages sent by the first device. The method and the device ensure that the wireless transceiver of the second device receives subsequent messages when being in the awakening state, and avoid the asynchronous condition caused by the fact that the first device and the second device do not synchronously update the identification information of the WUR because the wireless transceiver of the second device enters the dormancy state.
In an alternative implementation, the second message is sent by the first device after being encrypted, so as to ensure that the second identification information which follows the new message is not acquired by other devices (attackers).
In an optional implementation, after the second device updates the identification information currently used by the wake-up receiver according to the second identification information or the second identification information indication information,
and the second equipment sends a confirmation message of the second message to the first equipment, wherein the confirmation message comprises the authentication information of the second equipment, so that the first equipment is communicated with the first equipment after determining the attribute information of the second equipment according to the authentication information. The attribute information may be identity information of the terminal or identification information of a wake-up receiver of the terminal.
In an optional implementation, the wakeup confirmation frame further includes attribute information of the second device, so that the first device determines a current protection mode of the second device according to the attribute information, identifies a duration of the second device operating in the current protection mode, and switches the current protection mode between at least two protection modes according to an identification result, where the at least two protection modes include a first protection mode and a second protection mode; the first protection mode is a mode that the first equipment updates the identification information of the awakening receiver after the wireless transceiver of the second equipment is awakened by the awakening receiver of the second equipment every time; the second protection mode is a mode for updating the identification information of the wake-up receiver when the first device receives the wake-up acknowledgement frame sent by the wireless transceiver of the second device and determines that the first device does not send the wake-up frame to the wake-up receiver of the second device within a preset time period. The method avoids the second equipment from being continuously attacked in multi-round communication, and can flexibly place the second equipment under different security protection strengths according to different actual conditions.
In a third aspect, a network device is provided, which has a function of implementing the behavior of the network device in practice of the above method. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In a fourth aspect, a terminal is provided, which has a function of implementing the terminal behavior in practice of the above method. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
In a fifth aspect, another network device is provided, which may include: a receiver, a transmitter, and a processor. The receiver is used for receiving a wake-up confirmation frame sent by a wireless transceiver of the terminal, the wake-up confirmation frame comprises wake-up indication information, the wake-up indication information is used for indicating that the wireless transceiver of the terminal is awakened by the wake-up receiver of the terminal after receiving the wake-up frame, the wake-up frame comprises first identification information of the wake-up receiver, and the first identification information is identification information currently used by the wake-up receiver. And the processor is used for determining that the awakening frame is sent to the terminal within a preset time period according to the awakening indication information. The transmitter is used for sending a first message to the terminal when the processor determines that the wake-up frame is sent to the terminal within a preset time period, wherein the first message is a message which is determined to be sent to the terminal when the network device sends the wake-up frame. The processor is further configured to determine that the wakeup frame is not sent to the terminal within a preset time period according to the wakeup indication information. The transmitter is further configured to send a second message to the terminal when the processor determines that the wake-up frame is not sent to the terminal within the preset time period, where the second message includes second identification information for waking up the receiver or indication information of the second identification information, so that the terminal updates identification information currently used by the wake-up receiver according to the second identification information or the indication information of the second identification information.
The network device may also include a memory for storing program instructions and data necessary for the network device.
In an alternative implementation, the processor is further configured to encrypt the second message before the transmitter transmits the second message to the terminal.
In an optional implementation, after the sender sends the second message to the terminal, the receiver is further configured to receive a confirmation message for the second message sent by the terminal, where the confirmation message for the second message is sent by the terminal after the terminal updates and wakes up the identification information currently used by the receiver according to the second identification information or the indication information of the second identification information, and the confirmation message for the second message includes the authentication information of the terminal. The processor is further configured to determine attribute information of the terminal according to the authentication information of the terminal, and communicate with the terminal according to the attribute information of the terminal. The attribute information may be identity information of the terminal or identification information of a wake-up receiver of the terminal.
In an optional implementation, the wakeup confirm frame further includes attribute information of the terminal; after the receiver receives the awakening confirmation frame sent by the wireless transceiver of the terminal, the processor is also used for determining the current protection mode of the terminal according to the attribute information of the terminal; and identifying the duration of the terminal working in the current protection mode, and switching the current protection mode between at least two protection modes according to an identification result, wherein the at least two protection modes comprise a first protection mode and a second protection mode.
In an alternative implementation, after the processor determines that the current protection mode of the terminal is the first protection mode, the first protection mode is a mode in which the processor updates the identification information of the wake-up receiver of the terminal each time the wireless transceiver of the terminal is awakened by the wake-up receiver of the terminal. The processor is specifically configured to identify a first time period in which the terminal is operating in a first protected mode. The attack means that the receiver receives the wakeup confirm message sent by the terminal, but the sender does not send the wakeup frame to the terminal within a preset time period. After the processor determines that a wake-up frame is sent to the terminal within a preset time period according to the wake-up indication information, when the processor identifies that the time of the terminal working in the first protection mode exceeds a first time length and the terminal is not attacked within the first time length, the processor switches the current protection mode of the terminal from the first protection mode to the second protection mode.
In an optional implementation, after the processor determines that the current protection mode of the terminal is the second protection mode, the second protection mode is a mode in which the receiver receives a wakeup confirm frame sent by the wireless transceiver of the terminal, and determines that the transmitter does not send the wakeup frame to the wakeup receiver of the terminal within a preset time period, and updates the identification information of the wakeup receiver of the terminal. The processor is specifically configured to identify a second duration and attack times of the terminal operating in the second protection mode. The terminal is attacked, namely, the receiver receives the wakeup confirm message sent by the terminal, but the receiver does not send the wakeup frame to the terminal within a preset time period. And after the processor determines that the awakening frame is not sent to the terminal within a preset time period according to the awakening indication information, when the processor identifies that the time of the terminal working in the second protection mode does not exceed a second duration and the number of times of the terminal being attacked is not less than an attack number threshold, the processor switches the current protection mode of the terminal from the second protection mode to the first protection mode.
In a sixth aspect, a computer storage medium is provided for storing computer software instructions for the network device, which contains programs designed for executing the above aspects.
In a seventh aspect, another terminal is provided, which may include: wake-up receiver, processor and wireless transceiver. The wake-up receiver is configured to receive a wake-up frame. The processor is used for awakening the wireless transceiver of the terminal after receiving the awakening frame, wherein the awakening frame comprises first identification information of the awakening receiver, and the first identification information is identification information currently used by the awakening receiver. The wireless transceiver is used for sending a wake-up confirmation frame to the network device, the wake-up confirmation frame comprises wake-up indication information, and the wake-up indication information is used for indicating that the wireless transceiver is woken up by the wake-up receiver after receiving the wake-up frame. The wireless transceiver is used for receiving a first message sent by the network device, the first message is sent after the network device determines that the network device sends a wakeup frame to the wakeup receiver within a preset time period after receiving the wakeup indication information, and the first message is a message which is determined to be sent to the wireless transceiver when the network device sends the wakeup frame. Or, the wireless transceiver is further configured to receive a second message sent by the network device, where the second message is sent after the network device determines that the network device does not send a wakeup frame to the wakeup receiver in a preset time period after receiving the wakeup indication information, and the second message includes second identification information of the wakeup receiver or indication information of the second identification information, and the second identification information or the indication information of the second identification information. And the processor updates the identifier currently used by the awakening receiver according to the second identification information or the second identification information indication information.
The terminal may also include a memory for storing program instructions and data necessary for the terminal.
In an alternative implementation, the second message is sent by the network device after being encrypted.
In an alternative implementation, after the processor updates the identification information currently used by the wake-up receiver according to the second identification information or the indication information of the second identification information,
and the wireless transceiver sends a confirmation message of the second message to the network equipment, wherein the confirmation message comprises the identity authentication information of the terminal, so that the network equipment can communicate with the network equipment after determining the identification information of the terminal according to the identity authentication information.
In an optional implementation, the wakeup confirmation frame further includes attribute information of the terminal, so that the network device determines, according to the attribute information, that the current protection mode of the terminal identifies a duration that the terminal operates in the current protection mode, and switches, according to an identification result, the current protection mode between at least two protection modes, where the at least two protection modes include a first protection mode and a second protection mode.
The first protection mode is a mode that the network equipment updates the identification information of the awakening receiver after the wireless transceiver is awakened by the awakening receiver every time; the second protection mode is a mode for updating the identification information of the wake-up receiver when the network device receives the wake-up acknowledgement frame sent by the wireless transceiver and determines that the network device does not send the wake-up frame to the wake-up receiver within a preset time period.
In yet another aspect, a computer storage medium is provided for storing computer software instructions for the network device, which includes a program designed to perform the aspects described above.
Embodiments provided herein also include any of:
1. a method of communication, the method comprising:
the method comprises the steps that a first device receives a wakeup confirmation frame sent by a wireless transceiver of a second device, wherein the wakeup confirmation frame comprises wakeup indication information, the wakeup indication information is used for indicating that the wireless transceiver of the second device is awakened by a wakeup receiver of the second device after the wakeup frame is received, the wakeup frame comprises first identification information of the wakeup receiver of the second device, and the first identification information is identification information currently used by the wakeup receiver of the second device;
when the first device determines that the wakeup frame is sent to the second device within a preset time period according to the wakeup indication information, the first device sends a first message to the second device, wherein the first message is a message which is determined to be sent to the second device when the first device sends the wakeup frame;
when the first device determines that the wakeup frame is not sent to the second device within a preset time period according to the wakeup indication information, the first device sends a second message to the second device, where the second message includes second identification information of a wakeup receiver of the second device or indication information of the second identification information, so that the second device updates identification information currently used by the wakeup receiver of the second device according to the second identification information or the indication information of the second identification information.
2. The method of embodiment 1, wherein before the first device sends the second message to the second device, the method further comprises: and the first equipment carries out encryption processing on the second message.
3. The method according to embodiment 1 or 2, wherein after the first device sends the second message to the second device, the method further comprises:
the first device receives a confirmation message of the second message sent by the second device, where the confirmation message of the second message is sent by the second device after the second device updates the identification information currently used by the wake-up receiver according to the second identification information or the indication information of the second identification information, and the confirmation message includes the identity authentication information of the second device;
the first equipment determines attribute information of the second equipment according to the identity authentication information of the second equipment;
and the first equipment communicates with the second equipment according to the attribute information of the second equipment.
4. The method according to embodiment 1 or 2, wherein the wakeup confirm frame further includes attribute information of the second device;
after the first device receives a wake-up acknowledgement frame sent by a wireless transceiver of a second device, the method further comprises:
the first equipment determines the current protection mode of the second equipment according to the attribute information of the second equipment;
the first equipment identifies the time length of the second equipment working in the current protection mode;
and the first equipment switches the current protection mode between at least two protection modes according to the identification result, wherein the at least two protection modes comprise a first protection mode and a second protection mode.
5. The method according to embodiment 4, wherein the identifying, by the first device, the duration of the second device operating in the current protection mode specifically includes:
after the first device determines that the current protection mode of the second device is a first protection mode, the first protection mode is a mode in which the first device updates the identification information of the wake-up receiver each time the wireless transceiver of the second device is awakened by the wake-up receiver of the second device;
the first equipment identifies whether the second equipment is attacked within a first time length of the first protection mode;
the attack of the second device means that the first device receives the wakeup confirm message sent by the second device, but the first device does not send the wakeup frame to the second device within a preset time period;
after the first device determines, according to the wakeup indication information, that the wakeup frame has been sent to the second device within a preset time period, the first device switches the current protection mode according to an identification result, which specifically includes:
when the first device identifies that the second device works in the first protection mode for more than the first time length, and the second device is not attacked within the first time length, the first device switches the current protection mode of the second device from the first protection mode to the second protection mode.
6. The method according to embodiment 4, wherein the identifying, by the first device, the duration of the second device operating in the current protection mode specifically includes:
after the first device determines that the current protection mode of the second device is a second protection mode, the second protection mode is a mode for updating identification information of a wake-up receiver of the second device when the first device receives a wake-up acknowledgement frame sent by a wireless transceiver of the second device and determines that the first device does not send a wake-up frame to the wake-up receiver of the second device within the preset time period;
the first equipment identifies a second time length and attack times of the second equipment working in the second protection mode;
the attack of the second device means that the first device receives the wakeup confirm message sent by the second device, but the first device does not send the wakeup frame to the second device within a preset time period;
after the first device determines, according to the wakeup indication information, that the wakeup frame is not sent to the second device within a preset time period, the first device switches the current protection mode according to an identification result, which specifically includes:
when the first device identifies that the time of the second device working in the second protection mode does not exceed the second duration and the attacked times of the second device are not less than the attacked times, the first device switches the current protection mode of the second device from the second protection mode to the first protection mode.
7. The method according to any of embodiments 1 to 6, wherein the wakeup confirm frame is a PS-Poll frame, and the PS-Poll frame type itself is the wakeup indication information.
8. A method of communication, the method comprising:
a wake-up receiver of a second device wakes up a wireless transceiver of the second device after receiving a wake-up frame, wherein the wake-up frame comprises first identification information of the wake-up receiver, and the first identification information is identification information currently used by the wake-up receiver;
after being awakened, the wireless transceiver of the second device sends an awakening acknowledgement frame to the first device, wherein the awakening acknowledgement frame comprises awakening indication information which is used for indicating that the wireless transceiver of the second device is awakened by an awakening receiver of the second device after receiving the awakening frame;
the second device receives a first message sent by the first device, wherein the first message is sent after the first device determines that the first device sends the wakeup frame to the second device within a preset time period after receiving the wakeup indication information, and the first message is determined to be sent to the second device when the first device sends the wakeup frame; alternatively, the first and second electrodes may be,
the second device receives a second message sent by the first device, where the second message is sent after the first device determines that the first device does not send the wakeup frame to the second device within a preset time period after receiving the wakeup indication information, and the second message includes second identification information of the wakeup receiver or indication information of the second identification information,
and the second equipment updates the identification information currently used by the awakening receiver according to the second identification information or the second identification information indication information.
9. The method of embodiment 8, wherein the second message is sent after the first device is encrypted.
10. The method according to embodiment 8 or 9, wherein after the second device updates the identification information currently used by the wake-up receiver according to the second identification information or the second identification information indication information, the method further includes:
and the second equipment sends a confirmation message of the second message to the first equipment, wherein the confirmation message comprises the identity authentication information of the second equipment, so that the first equipment is communicated with the second equipment according to the attribute information of the second equipment after determining the attribute information of the second equipment according to the identity authentication information.
11. The method according to embodiment 8 or 9, wherein the wakeup acknowledgement frame further includes attribute information of the second device, so that the first device determines, according to the attribute information, a current protection mode of the second device, identifies a duration of the second device operating in the current protection mode, and switches the current protection mode between at least two protection modes according to an identification result, where the at least two protection modes include a first protection mode and a second protection mode; the first protection mode is a mode in which the first device updates the identification information of the wake-up receiver each time the wireless transceiver of the second device is awakened by the wake-up receiver of the second device; the second protection mode is a mode for updating the identification information of the wake-up receiver when the first device receives a wake-up acknowledgement frame sent by a wireless transceiver of the second device and determines that the first device does not send a wake-up frame to the wake-up receiver of the second device within the preset time period.
12. The method according to any of embodiments 8 to 11, wherein the wakeup confirm frame is a PS-Poll frame, and the type of the PS-Poll frame is the wakeup indication information.
13. A network device, characterized in that the network device comprises:
the receiving unit is used for receiving a wakeup confirmation frame sent by a wireless transceiver of a terminal, the wakeup confirmation frame comprises wakeup indication information, the wakeup indication information is used for indicating that the wireless transceiver unit of the terminal is wakened by the wakeup receiving unit of the terminal after receiving the wakeup frame, the wakeup frame comprises first identification information of the wakeup receiving unit, and the first identification information is identification information currently used by the wakeup receiving unit;
the processing unit is used for determining that the awakening frame is sent to the terminal within a preset time period according to the awakening indication information;
a sending unit, configured to send a first message to the terminal when the processing unit determines that the wake-up frame has been sent to the terminal within a preset time period, where the first message is a message that the network device has determined to send to the terminal when sending the wake-up frame; alternatively, the first and second electrodes may be,
the processing unit is further configured to determine, according to the wakeup indication information, that the wakeup frame is not sent to the terminal within a preset time period;
the sending unit is further configured to send, to the terminal, a second message when the processing unit determines that the wakeup frame is not sent to the first device within a preset time period, where the second message includes second identification information of the wakeup receiving unit or indication information of the second identification information, so that the terminal updates the identification information currently used by the wakeup receiving unit according to the second identification information or the indication information of the second identification information.
14. The network device of embodiment 13, wherein, prior to the sending unit sending the second message to the terminal,
the processing unit is further configured to perform encryption processing on the second message.
15. The network device according to embodiment 13 or 14, wherein, after the sending unit sends the second message to the terminal,
the receiving unit is further configured to receive a confirmation message of the second message sent by the terminal, where the confirmation message of the second message is sent by the second device after updating the identification information currently used by the wakeup receiving unit according to the second identification information or the indication information of the second identification information, and the confirmation message includes the identity authentication information of the terminal;
the processing unit is further configured to determine attribute information of the terminal according to the authentication information of the terminal;
and communicating with the terminal according to the attribute information of the terminal.
16. The network device according to embodiment 13 or 14, wherein the wakeup confirm frame further includes attribute information of the terminal;
after the receiving unit receives the wake-up acknowledgement frame sent by the wireless transceiving unit of the terminal,
the processing unit is further configured to determine a current protection mode of the terminal according to the attribute information of the terminal;
identifying the time length of the terminal working in the current protection mode;
and switching the current protection mode between at least two protection modes according to the identification result, wherein the at least two protection modes comprise a first protection mode and a second protection mode.
17. The network device according to embodiment 16, wherein after the processing unit determines that the current protection mode of the terminal is the first protection mode, the first protection mode is a mode in which the processing unit updates the identification information of the wakeup receiving unit of the terminal each time the wireless transceiver unit of the terminal is awakened by the wakeup receiving unit of the terminal;
the processing unit is specifically configured to identify a first duration of the terminal operating in the first protection mode, and whether the terminal is attacked within the first duration;
wherein, the terminal being attacked means that the receiving unit receives the wakeup confirm message sent by the terminal, but the sending unit does not send the wakeup frame to the terminal within a preset time period;
after the processing unit determines that the wake-up frame is sent to the terminal within a preset time period according to the wake-up indication information,
when the processing unit identifies that the time that the terminal works in the first protection mode exceeds the first duration and the terminal is not attacked within the first duration, the processing unit switches the current protection mode of the terminal from the first protection mode to the second protection mode.
18. The network device according to embodiment 16, wherein after the processing unit determines that the current protection mode of the terminal is the second protection mode, the second protection mode is a mode in which the receiving unit receives a wakeup confirm frame sent by a wireless transceiver unit of the terminal, and when it is determined that the sending unit does not send a wakeup frame to the wakeup receiving unit of the terminal within the preset time period, the identification information of the wakeup receiving unit of the terminal is updated;
the processing unit is specifically configured to identify a second duration and attack times of the terminal operating in the second protection mode;
wherein, the terminal being attacked means that the receiving unit receives the wakeup confirm message sent by the terminal, but the sending unit does not send the wakeup frame to the terminal within a preset time period;
after the processing unit determines that the wake-up frame is not sent to the terminal within a preset time period according to the wake-up indication information,
and when the processing unit identifies that the time of the terminal working in the second protection mode does not exceed the second duration and the number of times of the terminal being attacked is not less than the attack number threshold, the processing unit switches the current protection mode of the terminal from the second protection mode to the first protection mode.
19. A terminal, characterized in that the terminal comprises: a wake-up receiving unit, a processing unit and a wireless transceiving unit,
the wake-up receiving unit is used for receiving a wake-up frame;
the processing unit is used for awakening the wireless transceiver unit of the terminal after receiving an awakening frame, wherein the awakening frame comprises first identification information of the awakening receiving unit, and the first identification information is identification information currently used by the awakening receiving unit;
the wireless transceiver unit is configured to send a wakeup confirm frame to a network device, where the wakeup confirm frame includes wakeup indication information, and the wakeup indication information is used to indicate that the wireless transceiver unit is awakened by a wakeup receiving unit of the terminal after receiving the wakeup frame;
the wireless transceiver unit is further configured to receive a first message sent by the network device, where the first message is sent after the network device determines that a wakeup frame is sent to the wakeup receiver unit within a preset time period after receiving the wakeup indication information, and the first message is a message that the network device has determined to send to the wireless transceiver unit when sending the wakeup frame; alternatively, the first and second electrodes may be,
receiving a second message sent by the network device, where the second message is sent after the network device determines that the network device does not send a wakeup frame to the wakeup receiving unit within a preset time period after receiving the wakeup indication information, and the second message includes second identification information of the wakeup receiving unit or indication information of the second identification information;
and the processing unit updates the identifier currently used by the awakening receiving unit according to the second identifier information or the indication information of the second identifier information.
20. The terminal of embodiment 19, wherein the second message is sent by the network device after being encrypted.
21. The terminal according to embodiment 19 or 20, wherein after the processing unit updates the identification information currently used by the wakeup receiving unit according to the second identification information or the indication information of the second identification information,
the wireless transceiver unit is further configured to send a confirmation message of the second message to the network device, where the confirmation message includes the authentication information of the terminal, so that the network device communicates with the network device after determining the attribute information of the terminal according to the authentication information.
22. The terminal according to embodiment 19 or 20, wherein the wakeup confirm frame further includes attribute information of the terminal, so that the network device determines a current protection mode of the terminal according to the attribute information, identifies a duration of the terminal operating in the current protection mode, and switches the current protection mode between at least two protection modes according to an identification result, where the at least two protection modes include a first protection mode and a second protection mode;
the first protection mode is a mode in which the processing unit updates the identification information of the awakening receiving unit each time the wireless transceiver unit is awakened by the awakening receiving unit; the second protection mode is a mode for updating the identification information of the awakening receiving unit when the network equipment receives the awakening confirmation frame sent by the wireless receiving and sending unit and determines that the network equipment does not send the awakening frame to the awakening receiving unit in the preset time period.
23. A network device, characterized in that the network device comprises:
the terminal comprises a receiver and a wireless transceiver, wherein the receiver is used for receiving a wake-up confirmation frame sent by the wireless transceiver of the terminal, the wake-up confirmation frame comprises wake-up indication information, the wake-up indication information is used for indicating that the wireless transceiver of the terminal is awakened by the wake-up receiver of the terminal after receiving the wake-up frame, the wake-up frame comprises first identification information of the wake-up receiver, and the first identification information is identification information currently used by the wake-up receiver;
the processor is used for determining that the awakening frame is sent to the terminal within a preset time period according to the awakening indication information;
a transmitter, configured to send a first message to the terminal when the processor determines that the wake-up frame has been sent to the terminal within a preset time period, where the first message is a message that the network device has determined to be sent to the terminal when sending the wake-up frame;
the processor is further configured to determine, according to the wakeup indication information, that the wakeup frame is not sent to the terminal within a preset time period;
the transmitter is further configured to send a second message to the terminal when the processor determines that the wakeup frame is not sent to the terminal within a preset time period, where the second message includes second identification information of the wakeup receiver or indication information of the second identification information, so that the terminal updates identification information currently used by the wakeup receiver according to the second identification information or the indication information of the second identification information.
24. The network device of embodiment 22, wherein prior to the transmitter transmitting the second message to the terminal,
the processor is further configured to perform encryption processing on the second message.
25. The network device of embodiment 23 or 24, wherein, after the transmitter transmits the second message to the terminal,
the receiver is further configured to receive a confirmation message, which is sent by the terminal and is directed to the second message, where the confirmation message of the second message is sent by the second device after updating, according to the second identification information or the indication information of the second identification information, the identification information currently used by the wakeup receiver, and the confirmation message includes the authentication information of the terminal;
the processor is further configured to determine attribute information of the terminal according to the authentication information of the terminal;
and communicating with the terminal according to the attribute information of the terminal.
26. The network device according to embodiment 23 or 24, wherein the wakeup confirm frame further includes attribute information of the terminal;
after the receiver receives the wake-up confirm frame transmitted by the wireless transceiver of the terminal,
the processor is further configured to determine a current protection mode of the terminal according to the attribute information of the terminal;
identifying the time length of the terminal working in the current protection mode;
and switching the current protection mode between at least two protection modes according to the identification result, wherein the at least two protection modes comprise a first protection mode and a second protection mode.
27. The network device of embodiment 26, wherein after the processor determines that the current protection mode of the terminal is the first protection mode, the first protection mode is a mode in which the processor updates identification information of a wake-up receiver of the terminal each time the wireless transceiver of the terminal is awakened by the wake-up receiver of the terminal;
the processor is specifically configured to identify a first duration of the terminal operating in the first protection mode, and whether the terminal is attacked within the first duration;
wherein, the terminal being attacked means that the receiver receives the wakeup confirm message sent by the terminal, but the receiver has not sent the wakeup frame to the terminal within a preset time period;
after the processor determines that the wake-up frame is sent to the terminal within a preset time period according to the wake-up indication information, when the processor identifies that the time of the terminal working in the first protection mode exceeds the first duration and the terminal is not attacked within the first duration, the processor switches the current protection mode of the terminal from the first protection mode to the second protection mode.
28. The network device of embodiment 26, wherein after the processor determines that the current protection mode of the terminal is the second protection mode, the second protection mode is a mode that the receiver receives a wake-up ack frame sent by a wireless transceiver of the terminal, and determines that the transmitter does not send a wake-up frame to the wake-up receiver of the terminal within the preset time period, and updates identification information of the wake-up receiver of the terminal;
the processor is specifically configured to identify a second duration and attack times of the terminal operating in the second protection mode;
wherein, the terminal being attacked means that the receiver receives the wakeup confirm message sent by the terminal, but the receiver has not sent the wakeup frame to the terminal within a preset time period;
after the processor determines that the wake-up frame is not sent to the terminal within a preset time period according to the wake-up indication information, when the processor identifies that the time of the terminal working in the second protection mode does not exceed the second duration and the number of times of the terminal being attacked is not less than the attack number threshold, the processor switches the current protection mode of the terminal from the second protection mode to the first protection mode.
29. A terminal, characterized in that the terminal comprises: the wake-up receiver, the processor and the wireless transceiver,
the wake-up receiver is used for receiving a wake-up frame;
the processor is configured to wake up the wireless transceiver of the terminal after receiving the wake-up frame, where the wake-up frame includes first identification information of the wake-up receiver, and the first identification information is identification information currently used by the wake-up receiver;
the wireless transceiver is configured to send a wakeup confirm frame to a network device, where the wakeup confirm frame includes wakeup indication information, and the wakeup indication information is used to indicate that the wireless transceiver is waken up by the wakeup receiver after receiving the wakeup frame;
the wireless transceiver is configured to receive a first message sent by the network device, where the first message is sent after the network device determines that the network device sends a wakeup frame to the wakeup receiver within a preset time period after receiving the wakeup indication information, and the first message is a message that the network device determines to send to the wireless transceiver when sending the wakeup frame; alternatively, the first and second electrodes may be,
the wireless transceiver is further configured to receive a second message sent by the network device, where the second message is sent after the network device determines that the network device does not send a wakeup frame to the wakeup receiver within a preset time period after receiving the wakeup indication information, and the second message includes second identification information of the wakeup receiver or indication information of the second identification information, and the second identification information or indication information of the second identification information;
and the processor updates the identifier currently used by the awakening receiver according to the second identifier information or the second identifier information indication information.
30. The terminal of embodiment 29, wherein the second message is sent by the network device after being encrypted.
31. The terminal according to embodiment 29 or 30, wherein the processor updates the identification information currently used by the wake-up receiver according to the second identification information or the indication information of the second identification information,
and the wireless transceiver sends a confirmation message of the second message to the network equipment, wherein the confirmation message comprises the authentication information of the terminal, so that the network equipment communicates with the network equipment after determining the identification information of the terminal according to the authentication information.
32. The terminal according to embodiment 29 or 30, wherein the wakeup confirmation frame further includes attribute information of the terminal, so that the network device determines a current protection mode of the terminal according to the attribute information, identifies a duration of the terminal operating in the current protection mode, and switches the current protection mode between at least two protection modes according to an identification result, where the at least two protection modes include a first protection mode and a second protection mode;
the first protection mode is a mode in which the processor updates the identification information of the wake-up receiver after the wireless transceiver is awakened by the wake-up receiver each time; the second protection mode is a mode for updating the identification information of the wake-up receiver when the network device receives the wake-up acknowledgement frame sent by the wireless transceiver and determines that the network device does not send the wake-up frame to the wake-up receiver within the preset time period.
The numbers of the foregoing embodiments do not have explicit correspondences with the numbers of the following embodiments, and are for convenience of description only.
Drawings
Fig. 1 is a schematic structural diagram of a WLAN system according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of the AP and the terminal shown in fig. 1;
fig. 3 is a signaling interaction diagram of a communication method according to an embodiment of the present invention;
fig. 4 is a frame structure of a wakeup confirm frame according to an embodiment of the present invention;
FIG. 5 is a frame structure of a wakeup confirm frame in the prior art;
fig. 6 is a frame structure of another wake-up ack frame according to an embodiment of the present invention;
fig. 7 is a frame structure of a wake-up ack frame according to another embodiment of the present invention;
fig. 8 is a frame structure of a wake-up ack frame according to another embodiment of the present invention;
fig. 9 is a frame structure of a wake-up ack frame according to another embodiment of the present invention;
fig. 10 is a flowchart of a communication method according to an embodiment of the present invention;
fig. 11 is a flowchart illustrating a state switching of a protection mode according to an embodiment of the present invention;
fig. 12 is a flow chart of another communication method provided by the embodiment of the invention;
fig. 13 is a schematic structural diagram of a network device according to an embodiment of the present invention;
fig. 14 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 15 is a schematic structural diagram of another network device according to an embodiment of the present invention;
fig. 16 is a schematic structural diagram of another terminal according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
The communication method provided by the invention can be applied to a WLAN system, and the WLAN system can comprise a terminal and an AP.
Taking the WLAN system shown in fig. 1 as an example, the WLAN system may include an AP (first device), a terminal (second device) associated with the AP, and an attacker AP1 (third device).
The terminal may be called a User Equipment (UE), a Mobile Station (MS), a mobile terminal (mobile terminal), a computer, a microcomputer, or a 5G terminal. For example, the terminal may be a mobile telephone (or so-called "cellular" telephone), a mobile computer, a computer with a mobile terminal, a smart watch, or the like, and may also be a portable, pocket, hand-held, computer-included, or vehicle-mounted mobile device that exchanges voice and/or data with the wireless access apparatus. The invention is not limited in this respect, for example, the terminal also includes a terminal with a wired access having a multi-bearer feature.
As shown in fig. 2, the terminal may include a wireless transceiver (e.g., an 802.11 host transceiver module, which may also be referred to as a WiFi transceiver) and a WUR for receiving a wake-up frame to wake-up the wireless transceiver. The AP includes at least a wireless transceiver (e.g., an 802.11 primary transceiver module).
During communication, the WLAN system involves communication between the AP and the WUR in the terminal, communication between the wireless transceiver of the terminal and the wireless transceiver of the AP, communication from the attacker AP1 to the WUR in the terminal, and communication from the attacker AP1 to the AP.
Communications between WURs from the attacker AP1 to the terminal may include: the attacker AP1 attempts to wake up the communication of the wireless transceiver of the terminal by acquiring the identification information (WUR ID) of the WUR in the terminal, and sending a wake-up frame WUP containing the identification information of the WUR to the WUR of the terminal.
Communications from attacker AP1 to the AP may include: the attacker AP1 sends a message to the AP via a wireless transceiver disguised as a terminal to let the AP update the communication of identification information to the terminal's WUR.
Where the WUR identification information (WUR ID) may be updated, i.e., may be all changeable, or may be partly changeable, the WUR identification information may include a Single User (SU) ID, a Multi User (MU) ID, and a broadcast (broadcast) ID of the WUR, any of which may wake up the wireless transceiver of the terminal. The identification information of the WUR may be updated in its entirety or may be partially updated. The identification information of the WUR may also include a reduced Frame Authentication Code (FAC), i.e., the identification information of the WUR is updated by a change of the FAC.
In the prior art, the WUR ID is updated no matter whether the WUR is attacked or not, so that new signaling overhead, out-of-step risks and extra energy consumption are introduced, and meanwhile, the flexibility of aiming at different conditions (the same strategy is adopted if the WUR is attacked or not) is lacked. Therefore, before the AP communicates with at least one associated terminal in the embodiment of the present invention, the AP may set a protection mode for the at least one terminal, so as to update the WUR ID of the WUR in the terminal, and avoid being attacked by the attacker AP1, so as to protect the second device wake-up receiver, thereby reducing signaling overhead, reducing additional energy consumption, and improving the working flexibility of the WUR in the terminal for different situations.
It should be noted that the AP may provide one or more protection modes to protect at least one terminal, and the AP may provide the following protection modes:
the AP may set a strict protection mode (denoted as a first protection mode) for the terminal, or may set a loose protection mode (denoted as a second protection mode) for the terminal.
The first protection mode is a mode in which the AP updates the identification information of the WUR each time the wireless transceiver of the terminal is successfully awakened by the WUR. The method for updating the identification information of the WUR by the AP may be any one of the following two methods:
in the first mode, after successfully waking up a wireless transceiver of a terminal through a WUR of the terminal, an AP sends Frame Authentication Code (FAC) information or a new WUR ID used for next WUR communication with the terminal to the wireless transceiver of the terminal, and after the current AP finishes communicating with the wireless transceiver of the terminal, the AP updates the FAC synchronously with the WUR of the terminal.
In the second mode, the AP does not directly send FAC information used for the next WUR communication with the terminal to the wireless transceiver of the terminal, but when the AP is associated with the terminal or the current protection mode of the terminal is switched to the first protection mode, the AP sends a key (key) to the wireless transceiver of the terminal, the AP and the terminal use the same algorithm respectively, and calculate new FAC information (i.e. new identification information) used for the next WUR communication between the AP and the terminal by using the key and some current information (such as FAC used by the WUR of the terminal during the current communication), and after the current communication between the AP and the wireless transceiver of the terminal is finished, the FAC information of the WUR is synchronously updated by the AP and the WUR of the terminal without additional message interaction.
The second protection mode is a mode in which the AP may update the identification information of the WUR only when it is determined that the AP does not transmit a WUP to the WUR of the terminal within a preset time period after receiving the wakeup confirm frame transmitted by the terminal, and does not update the identification information of the WUR when it is determined that the AP has transmitted a WUP to the WUR of the terminal within a preset time period after receiving the wakeup confirm frame transmitted by the terminal.
The wakeup confirm frame WUP is an indication that the wireless transceiver of the terminal has been awakened by the WUR when the wireless transceiver of the terminal is successfully awakened by the WUR and the wireless transceiver of the portable terminal is sent to the AP by the wireless transceiver of the terminal.
Alternatively, the AP may set the first duration, the second duration, and a first integer (attack times threshold).
The first time length acts in the first protection mode, is the time length for keeping the WUR of the terminal not woken up by mistake or attacked continuously, and is used for the AP to judge whether the current protection mode of the terminal needs to be switched from the first protection mode to the second protection mode.
The false wake-up refers to a behavior of waking up a wireless transceiver of a terminal after the WUR of the terminal erroneously receives a wake-up frame of a WUR in another terminal (the WUR of the terminal erroneously recognizes as a wake-up frame sent by the AP to itself). It should be noted that, in a short time, the probability that the terminal is continuously mistakenly awakened is low.
The WUR of the terminal is attacked, which means that the WUR of the terminal wakes up the wireless transceiver of the terminal after receiving the wake-up frame sent by the attacker AP 1. If the attacker AP1 exists, the terminal is continuously attacked in a short time, and the wireless transceiver is continuously woken up.
And the AP receives the awakening confirmation frame sent by the wireless transceiver of the terminal, and under the condition that the AP recognizes that the awakening frame is not sent to the WUR of the terminal within the preset time period, the AP considers that the terminal is awakened by mistake or attacked. At the moment, the AP judges whether the time that the terminal is continuously not awoken by mistake or attacked exceeds a first time length or not, if so, the AP switches the current protection mode of the terminal from the first protection mode to a second protection mode; if the first duration is not exceeded, the AP updates the identification information of the WUR and sets the first duration again.
It should be noted that the basis for the AP to determine that the terminal is continuously awoken by mistake or attacked is: when the AP does not transmit a wakeup frame to the WUR of the terminal for a preset period of time, but continuously receives a wakeup confirm frame transmitted by the wireless transceiver of the terminal, the AP considers that the terminal is continuously woken up by mistake or attacked (hereinafter, the expression of "wake up by mistake or attacked" is referred to as "attacked" in this specification).
The second duration and the first integer act in a second protection mode. The second duration is the duration of whether the WUR of the AP recording terminal is attacked by the first integer, and is used for judging whether the current protection mode of the terminal needs to be switched from the second protection mode to the first protection mode so as to judge whether the WUR of the terminal is attacked continuously, and therefore protection mode switching caused by mistaken awakening of the terminal is avoided. The first integer is a preset number threshold of continuous attack times of the WUR of the terminal, when the attack times of the terminal in the second time length is not less than the first integer, the AP considers that the possibility of attack on the WUR of the terminal is far higher than that of false awakening, and if the attack times of the terminal is less than the first integer, the AP considers that the WUR of the terminal has a certain probability of false awakening.
The terminal works in a first time length of a first protection mode, and the AP updates the identification information of the WUR after a wireless transceiver of the terminal is successfully awakened by the WUR each time; the terminal works in a first protection mode, and after the first time length is exceeded, the terminal is not attacked within the first time length, and the AP switches the current protection mode of the terminal from the first protection mode to a second protection mode.
Under the second duration of the second protection mode, when the AP receives the awakening confirmation frame and determines that the AP does not send the WUP to the WUR of the terminal in the preset time period, if the terminal is attacked for at least the first integer times, the AP switches the current protection mode of the terminal from the second protection mode to the first protection mode so as to update the identification information of the WUR; if the terminal is attacked for less than the first integer, the AP may not update the identification information of the WUR according to the actual situation. In the second protection mode, when the AP receives the awakening confirmation frame and determines that the AP does not send the WUP to the WUR of the terminal in the preset time period, the AP and the terminal interact data, and the current round of communication is normally completed.
Optionally, the AP may further include a first timer, a second timer, and a third timer.
The first timer is used to time the first protection mode to determine whether the first protection mode has been operated for a long enough time with the overhead and risk.
The second timer is used for timing the second protection mode to judge whether the WUR is attacked continuously or not so as to avoid mistaken awakening of the terminal.
And the third timer is used for setting a preset time period so as to judge whether the terminal is attacked or not.
In a first protection mode, when the working state of a first timer is a timing state, after a wireless transceiver of a terminal is successfully awakened by a WUR each time, an AP updates the identification information of the WUR; and when the working state of the first timer is changed from the timing state to the stop state, the AP switches the current protection mode of the terminal from the first protection mode to the second protection mode.
In a second protection mode, when the AP receives the awakening confirmation frame and determines that the AP does not send the WUP to the WUR of the terminal in a preset time period and the working state of a second timer is a timing state, the AP considers that the terminal is continuously attacked, and the AP switches the current protection mode of the terminal from the second protection mode to the first protection mode so as to update the identification information of the WUR; and when the AP receives the awakening confirmation frame and determines that the AP does not send the WUP to the WUR of the terminal in a preset time period, and the working state of the second timer is a stop state, the AP and the terminal exchange data, and the current round of communication is normally completed.
Optionally, the AP performs the same protection mode setting for at least one terminal, or performs the same protection mode setting for at least two terminals.
In an example, taking an example that the AP sets the protection mode for three terminals, the setting result of the AP on the terminal protection mode may be as shown in the terminal protection mode table 1.
TABLE 1
Terminal device Protection mode
Terminal 1 First protection mode
Terminal 2 Second protection mode
Terminal 3 First protection mode
In table 1, terminal 1 is set to operate in the first protection mode (current protection mode), terminal 2 is set to operate in the second protection mode, and terminal 3 is set to operate in the first protection mode. It can be understood that the AP may query the current protection mode of the terminal through the attribute information of the terminal. The attribute information of the terminal may be identity information of the terminal, or identification information of a wake-up receiver of the terminal, or the like.
Optionally, according to the actual needs of the user, the AP may set the duration of the timing state of the second timer to be shorter than the duration of the timing state of the first timer, for example, if the duration of the timing state of the second timer may be set to 1 hour, the duration of the timing state of the first timer may be set to 6 hours, so as to avoid that the wireless transceiver of the terminal is prematurely dormant, which may result in that the AP and the terminal do not synchronously update the WUR ID, i.e., lose synchronization. In order to avoid continuous attack and give the AP the ability to flexibly select the current protection mode of the terminal among different protection strengths, the AP may reasonably switch the current protection mode of the terminal between the first protection mode and the second protection mode. The functions of the first timer and the second timer may be implemented by a software program.
In the communication process, an attacker AP1 acquires first identification information of the WURs in the terminal to send the WUPs to the WURs of the terminal; the AP associates with a terminal as an example, and details a communication method between the AP and the terminal.
Fig. 3 is a signaling interaction diagram of a communication method according to an embodiment of the present invention. As shown in fig. 3, the method may include:
in step 310, the AP receives a wake-up confirm frame sent by the wireless transceiver of the terminal, where the wake-up confirm frame may include first indication information (wake-up indication information) for indicating that the wireless transceiver of the terminal is to be woken up by a wake-up receiver of the terminal after receiving the wake-up frame.
The wakeup confirm frame may be a control frame, a data frame, or a management frame. The first indication information may be identified by at least one bit in the respective frame structures.
Optionally, prior to step 310, step 308 is performed and the AP or attacker AP1 may send a wake-up frame to the terminal to wake-up the terminal.
When the AP has a downlink message to send to the terminal, the AP sends a wake-up frame to the WUR of the terminal to wake up the wireless transceiver of the terminal. The wakeup frame WUP may include first identification information (original identification information) for waking up the receiver, and the first identification information may be complete WUR identification information or partial WUR identification information, such as a complete Media Access Control (MAC) address, or a partial address capable of distinguishing a MAC address.
When the attacker AP1 listens to the first identification information of the terminal, the attacker AP1 sends a wake-up frame to the WUR of the terminal to wake up the wireless transceiver of the terminal, i.e., the terminal is attacked by the attacker AP 1.
Step 309, after the WUR of the terminal receives the wake-up frame, the WUR sends a first trigger signal to the wireless transceiver of the terminal for waking up the wireless transceiver of the terminal. After waking up the wireless transceiver of the terminal, the WUR of the terminal goes to sleep.
Returning to step 310, further, if the AP receives the wakeup confirm frame sent by the wireless transceiver of the terminal within the preset time period, the AP regards as successfully waking up the wireless transceiver of the terminal. And if the AP does not receive the awakening confirmation frame sent by the wireless transceiver of the terminal in the preset time period, the AP considers that the wireless transceiver of the terminal is attacked.
The mode of setting the preset time period by the AP may include, but is not limited to: the preset time period is set by the third timer, for example, the AP may set the preset time period of the third timer to count down from 50ms to zero, or to increase from zero to 50 ms; or, acquiring whether the difference value between the time A and the time B is within a preset time period by recording the time A for sending the wake-up frame and the time B for receiving the wake-up confirmation frame sent by the terminal. It can be understood that the AP transmits the wakeup frame to the terminal, and if the AP does not receive the wakeup confirm frame transmitted by the wireless transceiver of the terminal within the preset time period, the AP does not successfully wake up the wireless transceiver of the terminal.
In an example, taking the setting of the preset time period by the third timer as an example, different or the same preset time period may be set for different terminals associated with the AP according to the actual design requirement of the user or the operator. If the AP is to delay the wireless transceiver of the terminal for a period of time (e.g., 300ms), and then wake up the wireless transceiver of the terminal, the AP may set the preset time period of the third timer for the terminal to 50-0ms left by the third timer (e.g., count down from 300ms +50ms, the first 300ms is the delayed time), or the third timer is between 300 and 350ms (count positive from 0ms, the first 300ms is the delayed time). It can be understood that the AP may wake up multiple terminals associated with the AP at the same time by setting a delay time for a preset time period.
Alternatively, when the wakeup confirm frame is a control frame, the wakeup confirm frame may be a modified PS-Pol frame or a new control frame.
As shown in fig. 4, the control frame includes a Frame Control (FC) field, an ID field of an ID value assigned by the AP to the wireless transceiver of the AP, a Receive Address (RA) field, a Transmit Address (TA) field, a WUR identification information (which may be a WUR ID Index) field, and a Frame Check Sequence (FCs), where the ID field and the WUR identification information field are optional.
In one example, when the wakeup confirm frame is a modified PS-Poll frame (the ID field is optional), that is, a WUR identification information field is added to the PS-Poll frame, and the WUR identification information field is used to carry second indication information, where the second indication information may indicate the complete or partial first identification information in the wakeup frame WUP (such as a single user ID, a multi-user ID, or a broadcast ID of the WUR), or indicate the location information of the first identification information in the wakeup frame WUP. When the WUR identification information field may include 2 bits, different first identification information may configure different address information. Such as address 01, a single user ID for the assigned WUR; an address 10, assigning a first multi-user ID (one of the multi-user IDs) of the WUR; address 11, the first broadcast ID (one of the multicast IDs) of the WUR is assigned.
In another example, when the wakeup confirm frame is a new control frame, at least one indication bit may be reserved in the FC domain to identify the first indication information. The method can comprise the following steps:
(1) the first indication information is indicated in a subtype subfield of an FC field. As shown in fig. 5, when the type subfield in the FC field indicates that the frame is a control frame (i.e. the type subfield value is set to B3B2 as 01), four indication bits (0000-. Wherein B2-B7 represent bits
(2) Indicating the first indication information in a control frame extension (control frame extension) field. As shown in fig. 6, when the type subfield in the FC domain indicates a control frame (i.e., the type subfield value is set to 01) and the subtype subfield is 0110, the B11-B8 bits of the FC domain are a control frame extension field in which seven indication bits (0000,0001, 1011-.
(3) The first indication information is indicated in other reserved idle bits except the subtype field and the control frame extension field in the control frame. As shown in fig. 7, the frame type is a control frame, and the subtype field value is not 0110 (i.e., there is no control frame extension field), a protocol version field (protocol) for indicating the protocol of the frame; a type (type) field and a subtype (subtype) field for commonly indicating the type of the frame; a To DS field indicating that the frame is a frame transmitted by a Basic Service Set (BSS) To a routing server (DS), a From DS field indicating that the frame is a frame transmitted by the DS To the BSS, a multi-fragment (More) field indicating whether a long frame is fragmented and there are other frames, a retransmission (retry) field indicating retransmission of the frame by which a receiving terminal cancels the retransmitted frame, a power management (power management) field 1 indicating that the STA is in a power saving mode, a 0 indicating that the STA is in a non-power saving mode, a multiple Data (More Data) field 1 indicating that at least one More Data frame is To be transmitted To the terminal, a protected frame field indicating whether a body part of the frame contains Data processed by a key cover, a sequence number field 1 indicating whether the long frame fragment transmission is in a strict reservation numbering manner, and at this time, six indicating bits (B8-B11, B14-B15) as a free bit (the six indicator bits are set to zero by default), i.e. there is no special meaning, so the first indication information can be identified by one of the six indicator bits in B8-B11, B14-B15.
Optionally, in an embodiment, in a case that the low power wake-up receiver mechanism is turned on, when the wake-up ack frame is a control frame, the PS-Poll frame existing in the conventional 802.11 protocol may be directly regarded as the wake-up ack frame without modifying the structure of the PS-Poll frame, where the PS-Poll frame type itself may be used as the wake-up indication information.
In a conventional sleep mechanism of an 802.11 protocol (i.e., periodic waking and sleeping of a terminal), a PS-Poll frame is generally used for requesting downlink data from an AP after the terminal actively wakes up, and after the AP receives the PS-Poll frame sent by the terminal, if the AP has downlink data to be sent to the terminal, the AP performs data communication with the terminal; if the AP does not have downlink data to be sent to the terminal, the terminal can continue to sleep to save energy consumption. When the terminal works in the low-power consumption wake-up receiver mechanism, if the AP needs to send downlink data to the terminal, the AP can wake up the wireless transceiver of the terminal first through the wake-up frame and then send the downlink data to the terminal, and the effect of the communication mode on energy consumption saving is possibly more obvious than that of a sleep mechanism in the traditional 802.11 protocol. Therefore, when the terminal operates in the low power wake-up receiver mechanism, it may not need to operate in the sleep mechanism of the conventional 802.11 protocol at the same time, which may result in that the terminal does not need to actively wake up and send a PS-Poll frame to the AP to request downlink data. In this case, the wireless transceiver of the terminal may use the existing PS-Poll frame in the conventional 802.11 protocol as the wakeup confirm frame to inform the AP that the wireless transceiver of the terminal has been awakened by the wakeup frame (e.g., after the WUR of the terminal receives the wakeup frame sent by the AP, the WUR of the terminal wakes up the wireless transceiver of the terminal); the AP may know explicitly that the reason the terminal sends the PS-Poll frame is that the terminal acknowledges to the AP that the wireless transceiver of the terminal has been awakened by the wake-up frame, rather than the terminal actively waking up and requesting downlink data from the AP. It should be noted that the PS-Poll frame type itself can be used as the wake-up indication information, and one or more indication bits are not required to be used in the PS-Poll frame to indicate the wake-up indication information.
Alternatively, when the wakeup confirm frame is a data frame, the wakeup confirm frame may be a new Null Data Packet (NDP) frame.
Functionally, the NDP frame is similar to the PS-Poll frame for the terminal to notify the AP that the terminal is awake, but structurally, the frame length of the NDP frame is shorter than that of the PS-Poll frame, so as to save transmission time, for example, in the 802.11ah protocol, the length of the NDP frame with PS-Poll function (NDP _1M PS-Poll) with bandwidth of 1MHz is 25bits, the length of the NDP _2M PS-Poll with bandwidth of 2MHz is 37bits, while the traditional PS-Poll frame is 160bits and bandwidth is 20 MHz.
As shown in fig. 8, the data Frame may include an NDP Frame Control (NDP FC) field, a short RA field, a short TA field, and a WUR id field carrying indication information.
The NDP frame control field may be used to indicate a frame type of the WUR wakeup confirm frame. The indication information in the WUR identification information field may indicate complete or brief first identification information (such as a single user ID, a first multi-user ID, or a first broadcast ID of the WUR) in the wake frame WUP when the terminal is awake, or position information indicating the first identification information in the wake frame WUP.
Alternatively, when the wakeup confirm frame is a management frame, for example, the wakeup confirm frame may be a function frame, and the function frame is a management subtype frame, so as to require the AP to take necessary actions, such as channel switch announcement, and the like.
As shown in fig. 9, the management Frame may include an FC field, a Duration (Duration) field, a receive Address field (Address1), a transmit Address (Address2) field, a receive Address (Address3) field, a Sequence Control (Sequence Control) field, an HT Control (HT Control) field, a Frame Body (Frame Body) field, and a Frame Check (FCs) field. The Duration field is used to schedule the time to occupy the channel. The Address3 field may be the receiving Address of the ultimate recipient after the transmitted message has been forwarded multiple times over the ethernet. The Sequence Control field is used to reassemble frame fragments or discard duplicate frames. The Frame Body field is used to carry specific types of frames and interpretation information, such as channel switch announcements. The HT control field is used to indicate some control information. It should be noted that the frame format of the management frame is independent of the subtype of the frame, and the address field does not change with the subtype of the frame. When the subtype of the Frame changes, only the Frame Body field changes.
As shown in fig. 9, the Frame Body field as a management Frame of the wakeup confirm Frame includes at least two parts, a type field (Category) and a WUR ID Index field. The Category field is used to indicate that the management frame is a wakeup confirm frame. The WUR ID Index field is used to carry second indication information, which may indicate the complete or partial first identification information (such as a single user ID, a multi-user ID, or a broadcast ID of the WUR) in the WUP of the wake-up frame, or indicate the location information of the first identification information in the WUP of the wake-up frame.
It can be understood that, in the case that the terminal can only be woken up by the WUR through the only one piece of first identification information, the frame length of the WUR ID Index field in the wake-up confirmation frame may be 0bit, where the AP may determine whether the wake-up confirmation frame has the WUR ID Index field through the frame length of the received WUR wake-up confirmation frame.
Alternatively, if the wakeup confirm frame is a functional frame in the management frame, whether the management frame has the WUR ID Index field may be determined by the first indication information in the Category field.
And step 320, the AP sends the first message or the second message to the terminal according to the first indication information.
The first message is a data frame and the second message may be a data frame, a control frame, or a management frame.
Optionally, before performing step 320, the AP determines whether the terminal has sent the wakeup frame within the preset time period according to the first indication information.
When the AP determines that the terminal has sent the wakeup frame within the preset time period according to the first indication information, that is, the wireless transceiver of the terminal is normally waken up by the AP, the AP sends a first message to the terminal, where the first message may include first data information, so as to implement normal communication between the terminal and the AP.
When the AP determines that the wake-up frame is not sent to the terminal within the preset time period according to the first indication information, that is, the wireless transceiver of the terminal is woken up by mistake or the WUR is attacked by the attacker AP1, the AP sends a second message to the wireless transceiver of the terminal, where the second message may include second identification information for waking up the receiver, and the second identification information is obtained by updating the first identification information by the AP, so as to prevent the WUR of the terminal from being continuously woken up the wireless transceiver of the terminal due to continuous attack, so that the energy of the terminal is rapidly consumed, and normal communication between the terminal and the AP is realized.
Optionally, the AP encrypts the second message before the AP sends the second message to the wireless transceiver of the terminal. The AP encryption method may include:
(1) the AP uses a similar procedure as that used in 802.11 to update the Group Temporal Key (GTK). The AP sends a message of an improved Extended Authentication Protocol Over LAN (EAPOL) key based on the local area network to the terminal.
The Message may include an encrypted data portion (i.e., the second identification information) and Message Integrity Code (MIC) information for verifying the identity of the sender (e.g., the AP).
(2) The AP defines a new encrypted management frame, the structure of which is similar to the functional frame. The management frame carrier may carry the MIC and some encrypted other information (e.g., second identification information).
(3) The AP uses the encrypted data frame and the data portion carries the second identification information.
Optionally, the second message may further include indication information of second identification information for waking up the receiver, such as key (key), to instruct the terminal to use the same algorithm to calculate the second identification information used by the AP for the next WUR communication with the terminal using the key and the first identification information.
Optionally, if the AP has other messages (e.g., a data frame carrying the first data information) to be transmitted besides the second identification information, the AP sends the second message including the second identification information to the terminal first, and then transmits subsequent messages (e.g., a data frame). Therefore, the wireless transceiver of the terminal is ensured to be awake and has received the second message carrying the second identification information through the transmission of the subsequent message, and the situation that the AP and the terminal do not synchronously update the identification information of the WUR, namely the second identification information, because the wireless transceiver of the terminal enters the sleep mode is avoided.
Step 330, the terminal sends an acknowledgement message to the AP.
If the wireless transceiver of the terminal receives the first message, the terminal transmits a first acknowledgement message (acknowledgement message for the first message) to the AP. If the wireless transceiver of the terminal receives the second message, the terminal sends a second acknowledgement message (acknowledgement message for the second message) to the AP.
The first and second acknowledgement messages may be control frames (e.g., ACK), data frames (e.g., data + ACK), or management frames, among others.
It is to be understood that the first acknowledgement message and the second acknowledgement message may be the same or different.
When the AP determines that the WUR to the terminal has sent the wake-up frame within a preset time period, namely the wireless transceiver of the terminal is awakened by the AP, the first confirmation message is used for indicating the terminal to receive the first data information. After all messages between the AP and the terminal are transmitted, the wireless transceiver of the terminal may wait for a period (e.g., 100ms) before entering sleep, during which the terminal may wait to receive a third acknowledgement message sent by the AP, where the third acknowledgement message indicates that the AP received the first acknowledgement message sent by the terminal. When the wireless transceiver of the terminal is going to sleep, the wireless transceiver sends a second trigger signal to the WUR for waking up the WUR. The communication of the current round is completed.
When the AP determines that the wake-up frame is not transmitted to the WUR of the terminal within the preset time period, i.e., the wireless transceiver of the terminal is mistakenly woken up or attacked by the attacker AP1, the second confirmation message may include authentication information (e.g., MIC) of the terminal, so that the AP determines attribute information of the terminal, e.g., identity information of the terminal, according to the authentication information, so that the AP communicates with the terminal.
It should be noted that, when the AP updates the GTK flow in the modified 802.11 protocol, the second acknowledgement message may be a modified EAPOL _ key response frame. The second confirmation message may include MIC information of the terminal. The second acknowledgement message may also be a frame of a modified Action frame, which may carry MIC information in its frame body.
After all messages between the AP and the terminal are transmitted, the wireless transceiver of the terminal may wait for a period (e.g., 100ms) before going to sleep, during which the terminal may wait to receive a third acknowledgement message sent by the AP, indicating that the AP received the aforementioned acknowledgement message sent by the terminal. The terminal and the AP can mutually confirm to acquire the second identification information respectively by delaying the time for the wireless transceiver of the terminal to enter the sleep state, so that the out-of-step risk is reduced. When the wireless transceiver of the terminal wants to enter the sleep mode, the wireless transceiver sends a second trigger signal to the WUR to wake up the WUR, and the AP and the terminal synchronously update corresponding WUR identification information. The communication of the current round is completed.
Optionally, if the terminal has the second data information to transmit to the AP, the first acknowledgement message and the second acknowledgement message may further include the second data information.
The steps in the method realize that the wireless receiver of the terminal is the first indication information awakened by the WUR in the awakening confirmation frame sent to the AP after the wireless receiver of the terminal is awakened by the WUR, so that the AP judges whether the WUR is attacked or not according to whether the WUR is sent before or not, and determines whether the WUR ID is updated or not, thereby effectively reducing the energy waste of an interception channel when the terminal is idle, and simultaneously ensuring the communication safety of the terminal by updating the WUR ID.
Further, after receiving the wakeup confirm frame sent by the terminal, the AP determines the current protection mode of the terminal according to the wakeup confirm frame. The wakeup confirm frame may include attribute information of the terminal, such as address information of the terminal.
Optionally, the AP may obtain the current protection mode of the terminal from the protection mode table of the terminal according to the address information of the terminal, that is, the current terminal operates in the first protection mode or in the second protection mode.
In one example, the AP identifies a duration for which the terminal has been operating in the current protection mode and a number of times it has been attacked within the duration. That is to say, the AP identifies whether the duration of the WUR of the terminal operating in the first protection mode that is not continuously attacked exceeds the first duration; or the AP identifies whether the number of times of attack on the WUR of the terminal working in the second protection mode in the second time length exceeds a first integer. And the AP switches the current protection mode of the terminal between at least two protection modes according to the identification result, wherein the at least two protection modes comprise a first protection mode and a second protection mode.
When the terminal is in the first protection mode and the duration of the continuous non-attack of the WUR of the terminal exceeds the first duration, the AP switches the current protection mode of the terminal from the first protection mode to the second protection mode so as to avoid the situation that the terminal is in the first protection mode for a long time and more extra expenses and risks are generated. The subsequent communication will operate in the first protection mode. And finishing the communication in the current round after all the message interaction is finished.
When the terminal is in the first protection mode and the duration of the WUR of the terminal not being attacked continuously does not exceed the first duration, the AP updates the first identification information of the WUR in the terminal after receiving the wakeup confirm frame each time, that is, after the terminal is awakened. And finishing the communication in the current round after all the message interaction is finished. The process of updating the first identification information by the AP can adopt that when the AP is associated with the terminal, the AP sends a key to a wireless transceiver of the terminal, the AP and the terminal use the same algorithm, new FAC information used by the AP and the WUR for next communication is calculated through key and current information (such as FAC or FCS used by the WUR for communication at this time), and after the AP and the wireless transceiver successfully finish communication at this time, the AP and the terminal synchronously update the FAC information in the WUR; the AP may also transmit the encrypted second message to the terminal in step 320.
And when the terminal is in a second protection mode and the number of times that the WUR of the terminal is attacked in a second time length at least reaches a first integer, the AP changes the first identification information of the WUR and switches the current protection mode of the terminal from the second protection mode to the first protection mode. That is, the subsequent communication of the terminal will operate in the first protection mode in which the AP updates the WUR identification information each time the WUR successfully wakes up the wireless transceiver of the terminal. And ending the communication of the current round and waiting for the next round of communication. It should be noted that, the probability of false wake-up occurring continuously or repeatedly in the second duration is very small, so if the situation that the AP has not sent the WUP but the wireless transceiver of the terminal is woken up by the WUR of the terminal occurs once or multiple times in the second duration, the AP considers that the WUR of the terminal is continuously attacked, and the AP switches the current protection mode of the terminal from the second protection mode to the first protection mode.
When the terminal is in the second protection mode, the AP determines that the awakening frame is not sent to the terminal within the preset time, and the number of times that the WUR of the terminal is attacked within the second time does not reach the first integer, the AP judges that the WUR of the terminal is attacked, updates the identification information of the WUR, and does not change the protection mode of the terminal. Where the first integer is a positive integer.
It should be noted that the AP determines that the current protection mode of the terminal is not switched from the second protection mode to the first protection mode immediately after the WUR is attacked, so as to avoid false wake-up with a small probability. That is, if the terminal is accidentally awakened within a period of time (the criterion is that the wireless transceiver of the terminal is attacked less than the first integer times within the second period of time), the AP will not switch the protection mode to avoid the accidental awakening.
When the terminal is in the second protection mode and the AP determines that the AP has sent the wakeup frame to the WUR of the terminal within the preset time, the AP sends a first message to the terminal, where the first message may include first data information, so as to implement normal communication between the terminal and the AP.
In another example, the AP identifies the operating state of the timer in the current protection mode. That is, the AP identifies the operating state of the first timer in the first protection mode; or the AP identifies the operating state of the second timer in the second protection mode. And the AP switches the current protection mode of the terminal according to the identification result of the timing state of the timer.
When the terminal is in the first protection mode and the working state of the first timer is in the stop state, the AP switches the current protection mode of the terminal from the first protection mode to the second protection mode to avoid generating more overhead and risks due to long-time stay in the first protection mode. The subsequent communication will operate in the first protection mode. And finishing the communication in the current round after all the message interaction is finished.
When the terminal is in the first protection mode and the working state of the first timer is the timing state, the AP updates the first identification information of the WUR in the terminal every time the AP receives the wakeup confirm frame, that is, after the wireless transceiver of the terminal is awakened. And finishing the communication in the current round after all the message interaction is finished. The process of updating the first identification information may be that when the AP associates with the terminal, the AP sends a key (key) to a wireless transceiver of the terminal, the AP and the terminal use the same algorithm, and calculate new FAC information used by the AP and the WUR for the next communication through the key and current information (such as FAC or FCS used by the current WUR communication), and after the current communication between the AP and the wireless transceiver is successfully completed, the AP and the terminal synchronously update the FAC information in the WUR; it is also possible to send the encrypted second message to the terminal in step 320.
When the terminal is in the second protection mode, the AP determines that the wake-up frame is not sent to the terminal within the preset time, and the working state of the second timer is the timing state, the AP switches the current protection mode of the terminal from the second protection mode to the first protection mode, namely the AP closes the second timer, starts the first timer and sets the duration of the timing state. That is, subsequent communications will operate in the first protected mode, with the AP updating the WUR identification information each time the WUR successfully wakes up the wireless transceiver before the first timer expires. And ending the communication of the current round and waiting for the next round of communication.
It should be noted that, since the probability of false wake-up occurring continuously or multiple times in the clocked state of the second timer is extremely small, if the AP does not transmit a WUP but the wireless transceiver of the terminal is woken up by the WUR of the terminal again in this period of time, the AP considers that the terminal is under a persistent attack, and the AP switches the current protection mode of the terminal to the first protection mode. The first timer may set a longer time period of the timing state, so as to hope that the attacker AP1 will leave in the timing state of the first timer, and avoid switching the current protection mode of the terminal back to the second protection mode in a short time.
When the terminal is in the second protection mode, the AP determines that the awakening frame is not sent to the terminal within the preset time, and the working state of the second timer is the stop state, the AP starts the second timer and sets the duration of the timing state to complete the communication of all messages and wait for the next round of communication.
It should be noted that the AP determines that the current protection mode of the terminal is not switched to the first protection mode immediately after the WUR is attacked, so as to avoid false triggering with a small probability. That is, if the terminal is attacked for the first time (the judgment criterion is that there is no counting second timer), the AP will not switch the current protection mode of the terminal, so as to avoid false triggering.
When the terminal is in the second protection mode and the AP determines that the wakeup frame has been sent to the terminal within the preset time, the AP sends a first message to the terminal, where the first message may include first data information, so as to implement normal communication between the terminal and the AP.
Fig. 10 is a flowchart of a communication method according to an embodiment of the present invention. As shown in fig. 10, the method includes:
step 1001, the AP or the attacker AP1 sends a wake-up frame to the terminal to successfully wake up the terminal.
The AP or attacker AP1 sends a wake-up frame to the WUR of the terminal and successfully wakes up the wireless transceiver of the terminal.
Step 1002, the AP receives a wakeup confirm frame sent by the terminal.
And the AP receives the awakening confirmation frame sent by the wireless transceiver of the terminal.
Step 1003, the AP determines the current protection mode of the terminal according to the wakeup confirm frame.
If the AP determines that the current protection mode of the terminal is the first protection mode, then step 1004 is executed;
if the AP determines that the current protection mode of the terminal is the second protection mode, step 1006 is executed.
Step 1004, the current protection mode of the terminal is the first protection mode, the AP updates the identification information of the terminal WUR, and then step 1005 is executed.
Optionally, during the step 1004, data transmission may be performed between the AP and the terminal.
Step 1005, ending the communication of the round, waiting for the next time the AP or the attacker AP1 to send the wakeup frame to the WUR of the terminal and successfully waking up the terminal, and returning to step 1001.
Step 1006, the current protection mode of the terminal is the second protection mode, and the AP determines whether the WUR of the terminal is attacked.
If the AP determines that the WUR of the terminal is attacked, step 1008 is executed;
if the AP determines that the WUR of the terminal is not under attack, step 1007 is performed.
Step 1007, the AP performs data transmission with the terminal, and then step 1005 is performed.
Step 1008, the AP updates the identification information of the terminal WUR, and then step 1005 is executed.
Optionally, during the step 1007, data transmission may be performed between the AP and the terminal.
Fig. 11 is a flowchart illustrating state switching of a protection mode according to an embodiment of the present invention. As shown in fig. 11, the method includes:
step 1101, the terminal is in a first protection mode.
Step 1102, when the terminal is not woken up by mistake or the duration of not being attacked exceeds the first duration, the AP switches the current protection mode of the terminal from the first protection mode to the second protection mode, and then the step 1103 is entered.
Step 1103, the terminal is in the second protection mode.
Step 1104, when the terminal is attacked or mistakenly awakened by at least the first integer times within the second duration, the AP switches the current protection mode of the terminal from the second protection mode to the first protection mode, and then the process goes to step 1101.
Fig. 12 is a flowchart of another communication method according to an embodiment of the present invention. As shown in fig. 12, the method includes:
step 1201, the AP or attacker AP1 sends a wake-up frame to the WUR of the terminal.
Step 1202, the AP receives a wakeup confirm frame sent by the wireless transceiver of the terminal, and determines the current protection mode of the terminal.
Step 1203, when the current protection mode of the terminal is the first protection mode, the AP determines the working state of the first timer at this time.
Step 1204, if the first timer is in the stop state, the AP switches the current protection mode of the terminal from the first protection mode to the second protection mode, and then performs step 1205.
Step 1205, ending the current round of communication, the AP waits for the wakeup confirm frame sent by the terminal to be received again, and returns to step 1201 after receiving a new wakeup confirm frame.
In step 1206, if the first timer is in the timed state, the AP updates the WUR identification information and then executes step 1205.
Step 1207, when the current protection mode of the terminal is the second protection mode, the AP determines whether the terminal is attacked at this time.
Step 1208, if the AP determines that the terminal is not awoken by mistake or attacked, the AP executes step 1205.
Step 1209, if the AP determines that the terminal is attacked, the AP updates the identification information of the WUR and then executes step 1010.
In step 1210, the AP determines the operating state of the second timer at this time.
Step 1211, if the second timer is in the stop state, the AP restarts the second timer, and then performs step 1205.
Step 1212, if the second timer is in the time counting state, the AP switches the current protection mode of the terminal from the second protection mode to the first protection mode, and then executes step 1205.
According to the communication method provided by the embodiment of the invention, the AP receives the awakening confirmation frame which is sent by the terminal and comprises the first indication information, so as to indicate that the terminal is awakened by the awakening receiver of the terminal. And when the AP determines that the awakening frame is not sent to the terminal within the preset time according to the first indication information, the AP sends a second message including second identification information for awakening the receiver, namely the updated identification information, to the terminal. The AP receives a second confirmation message which is sent by the terminal and comprises the identity authentication information of the terminal, and then the AP determines the attribute information of the terminal according to the identity authentication information; and the AP communicates with the terminal according to the attribute information of the terminal. And simultaneously, switching the current protection mode according to whether the WUR of the terminal is attacked or not. To avoid sustained attack by the attacker AP 1. The method improves the condition that the AP can flexibly adopt a switching strategy under different protection modes to reduce the extra energy consumption of the terminal and reduce the signaling overhead when the WUR in the terminal is not attacked.
Corresponding to the method, the embodiment of the invention provides network equipment.
Fig. 13 is a network device according to an embodiment of the present invention, and as shown in fig. 13, the network device, for example, an access point AP, may include: a receiving unit 1301, a transmitting unit 1302 and a processing unit 1303.
The receiving unit 1301 is configured to receive a wakeup acknowledgement frame sent by a wireless transceiver of the terminal, where the wakeup acknowledgement frame includes wakeup indication information, and the wakeup indication information is used to indicate that the wireless transceiver of the terminal is to be wakened by the wakeup transceiver of the terminal after receiving the wakeup frame, and the wakeup frame includes first identifier information of the wakeup transceiver, where the first identifier information is identifier information currently used by the wakeup transceiver.
And the processing unit 1303 is configured to determine that a wakeup frame has been sent to the terminal within a preset time period according to the wakeup indication information.
A sending unit 1302, configured to send a first message to the terminal when the processing unit 1303 determines that the wakeup frame has been sent to the terminal within a preset time period, where the first message is a message that the access point has determined to send to the terminal when sending the wakeup frame, such as data information, for communicating with the terminal; alternatively, the first and second electrodes may be,
the processing unit 1303 is further configured to determine, according to the wakeup indication information, that no wakeup frame is sent to the terminal within a preset time period.
The sending unit 1302 is further configured to send a second message to the terminal when the processing unit 1303 determines that the wake-up frame is not sent to the terminal within the preset time period. The second message includes second identification information of the wakeup receiving unit of the terminal or indication information of the second identification information, so that the terminal updates the identification information currently used by the wakeup receiving unit according to the second identification information or the indication information of the second identification information.
Optionally, before the sending unit 1302 sends the second message to the terminal, the processing unit 1303 is further configured to perform encryption processing on the second message.
Alternatively, after the transmitting unit 1302 transmits the second message to the terminal,
the receiving unit 1301 is further configured to receive a confirmation message for the second message sent by the terminal, where the confirmation message for the second message is sent by the terminal after the terminal updates and wakes up the identification information currently used by the receiving unit according to the second identification information or the indication information of the second identification information, and the confirmation message for the second message includes the authentication information of the terminal.
The processing unit 1303 is further configured to determine attribute information of the terminal according to the identity authentication information of the terminal; and communicating with the AP according to the attribute information of the terminal.
Optionally, the wakeup confirm frame may further include attribute information of the terminal;
after the receiving unit 1301 receives the wakeup confirm frame transmitted by the radio unit of the terminal,
the processing unit 1303 is further configured to determine a current protection mode of the terminal according to the attribute information of the terminal.
Identifying the duration of the terminal working in the current protection mode, and switching the current protection mode of the terminal between at least two protection modes according to the identification result, wherein the at least two protection modes comprise a first protection mode and a second protection mode.
Alternatively, the current protection mode of the terminal may be the first protection mode or the second protection mode.
The processing unit 1303 is specifically configured to identify a first time period when the terminal operates in the first protection mode. Or identifying the second time length and the attack times of the terminal working in the second protection mode.
The attack of the terminal means that the receiving unit 1301 receives the wakeup confirm message sent by the access point, but the sending unit does not send the wakeup frame to the access point within the preset time period.
After the processing unit 1303 determines that the wakeup frame has been sent to the terminal within the preset time period according to the wakeup indication information,
when the processing unit 1303 identifies that the time that the terminal operates in the first protection mode exceeds a first duration and the second device is not attacked within the first duration, the processing unit 1303 switches the current protection mode of the terminal from the first protection mode to the second protection mode; alternatively, the first and second electrodes may be,
when the processing unit 1303 recognizes that the time that the terminal operates in the second protection mode does not exceed the second duration and the number of times that the terminal is attacked is not less than the attack number threshold, the processing unit 1303 switches the current protection mode of the terminal from the second protection mode to the first protection mode.
The functions of the functional modules of the access point in the embodiments of the present invention may be implemented by the method steps provided in fig. 3, and therefore, detailed working processes and beneficial effects of the access point provided by the present invention are not described herein again.
Corresponding to the method, the embodiment of the invention provides a terminal.
Fig. 14 is a terminal according to an embodiment of the present invention, and as shown in fig. 14, the terminal may include: a wake-up receiving unit 1401, a processing unit 1402 and a radio transceiver unit 1403,
a wake-up receiving unit 1401, configured to receive a wake-up frame.
The processing unit 1402 is configured to wake up the wireless transceiver unit 1403 after receiving the wake-up frame, where the wake-up frame includes the first identification information of the wake-up receiver unit 1401, and the first identification information is identification information currently used by the wake-up receiver unit 1401.
A wireless transceiver unit 1403, configured to send a wake-up acknowledgement frame to the AP, where the wake-up acknowledgement frame includes wake-up indication information, and the wake-up indication information is used to indicate that the wireless transceiver unit 1403 is woken up by the wake-up receiving unit 1401 of the terminal after receiving the wake-up frame.
The wireless transceiver 1403 is further configured to receive a first message sent by the AP, where the first message is sent after the AP determines that the AP sends a wakeup frame to the wakeup receiver 1401 within a preset time period after receiving the wakeup indication information, and the first message is a message that the AP has determined to send to the wireless transceiver 1403 when sending the wakeup frame. Alternatively, the first and second electrodes may be,
and receiving a second message sent by the AP, where the second message is sent after the AP determines that the AP does not send a wakeup frame to the wakeup receiving unit 1401 within a preset time period after receiving the wakeup indication information, and the second message includes second identification information of the wakeup receiving unit 1401 or indication information of the second identification information.
The processing unit 1402 is further configured to update the identifier currently used by the wakeup receiving unit 1401 according to the second identifier information or the indication information of the second identifier information.
Optionally, the second message is sent after the AP is encrypted.
Optionally, after the processing unit 1402 updates the identification information currently used by the wakeup receiving unit 1401 according to the second identification information or the indication information of the second identification information,
the wireless transceiver 1403 is further configured to send a confirmation message of the second message to the AP, where the confirmation message includes the authentication information of the terminal, so that the AP communicates with the AP after determining the attribute information of the terminal according to the authentication information.
Optionally, the wakeup confirmation frame further includes attribute information of the terminal, so that the AP determines a current protection mode of the terminal according to the attribute information of the terminal, identifies a duration of the terminal operating in the current protection mode, and switches the current protection mode between at least two protection modes according to an identification result, where the at least two protection modes include a first protection mode and a second protection mode.
It is understood that the radio transceiver unit 1403 may include a receiving unit and a transmitting unit.
The functions of the functional modules of the terminal according to the embodiment of the present invention can be implemented by the method steps provided in fig. 3, and therefore, detailed working processes and beneficial effects of the terminal provided by the present invention are not repeated herein.
Corresponding to the method, the embodiment of the invention also provides another network device.
Fig. 15 shows another network device according to an embodiment of the present invention, as shown in fig. 15, the network device, such as an access point, may include a wireless transceiver 1510 (e.g., an 802.11 main transceiver module), a processor 1520, a memory 1530 and a transceiver antenna 1540, and the wireless transceiver 1510 has functions of a receiver and a transmitter. The transceiving antenna 1540 may also be considered as part of the wireless transceiver 1510, in which case the transceiving antenna 1540 may not be depicted in fig. 15.
The processor 1520 stores the command message and the data message to be transmitted through the wireless transceiver 1510 in the memory 1530, the processor 1520 sends a notification to the wireless transceiver 1510 after the command or data to be transmitted is prepared, so as to indicate that the data to be transmitted is prepared, and finally the wireless transceiver 1510 acquires the command or data to be transmitted from the memory 1530 and transmits the command or data to be transmitted through the transceiving antenna 1540. The wireless transceiver 1510 needs to modulate the content of the message to be transmitted into an electrical signal and transmit the electrical signal from the transceiving antenna 1540 in the form of electromagnetic waves, and the wireless transceiver 1510 needs to receive the electromagnetic wave signal through the transceiving antenna 1540 and analyze the electromagnetic wave signal to obtain the message sent by other devices to itself.
The processor 1520 may be a Central Processing Unit (CPU), or a combination of a CPU and a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a field-programmable gate array (FPGA), a General Array Logic (GAL), or any combination thereof.
The memory 1530 may include a volatile memory (volatile) such as a random-access memory (RAM); the memory 1530 may also include a non-volatile memory (non-volatile memory), such as a read-only memory (ROM), a flash memory (flash memory), a Hard Disk Drive (HDD), or a solid-state drive (SSD). The memory 1530 may also include a combination of memories of the sort described above.
In connection with the method shown in fig. 3, the operation process of each functional device of the access point may include:
the wireless transceiver 1510 (which can implement the functions of the receiver and the transmitter described above) is configured to receive a wake-up confirm frame sent by the wireless transceiver of the terminal, where the wake-up confirm frame includes wake-up indication information. The wake-up indication information is used for indicating that the wireless transceiver of the terminal is woken up by a wake-up receiver of the terminal after receiving a wake-up frame, the wake-up frame contains first identification information of the wake-up receiver, and the first identification information is identification information currently used by the wake-up receiver.
And a processor 1520, configured to determine that a wakeup frame has been sent to the terminal within a preset time period according to the wakeup indication information.
The wireless transceiver 1510 is further configured to, when the processor determines that the wake-up frame has been sent to the terminal within the preset time period, send a first message to the terminal, where the first message is a message that the network device has determined to send to the terminal when sending the wake-up frame.
The processor 1520, further configured to determine that no wake-up frame is sent to the terminal within a preset time period according to the wake-up indication information.
The wireless transceiver 1510 is further configured to send a second message to the terminal when the processor 1520 determines that the wake-up frame is not sent to the terminal within the preset time period, where the second message includes second identification information for waking up the receiver or indication information of the second identification information, so that the terminal updates the identification information currently used by the wake-up receiver according to the second identification information or the indication information of the second identification information.
Optionally, the access point may also include a transmitter WUR 1550 (not shown in fig. 15) dedicated to transmitting WUPs. The WUR 1550 is triggered to transmit a WUP by the wireless transceiver 1510 or the processor 1520 when there is data to transmit. The WUP is transmitted by a transmit-receive antenna 1540. The transceiver 1510 and the WUR 1550 may operate in the same frequency band, and the transceiving antenna 1540 may include the same antenna. The wireless transceiver 1510 and the WUR 1550 can also operate in different frequency bands, and the transceiving antenna 1540 includes multiple antennas suitable for different frequency bands, i.e., the antennas used by the wireless transceiver 1510 and the WUR 1550 are different.
It should be noted that, since the implementation manner and the advantageous effects of each component of the network device in the foregoing embodiments may be similar to the implementation manner and the advantageous effects of the method related to fig. 3, detailed descriptions thereof are omitted here.
Fig. 16 shows another terminal according to an embodiment of the present invention, as shown in fig. 16, the terminal includes at least a wake-up receiver 1610, a processor 1620, a wireless transceiver 1630 (e.g., 802.11 primary transceiver module), a memory 1640, and a transceiver antenna 1650.
The wireless transceiver 1630 retrieves the command message or data message received by the wireless transceiver 1630 from the memory 1640 and processes the message to obtain the command or data. Wake-up receiver 1610 receives a wake-up frame transmitted by another device via transceiver antenna 1650, and when wake-up receiver 1610 receives the wake-up frame addressed to itself, sends a trigger signal to processor 1620, causing processor 1620 to trigger wireless transceiver 1630 to wake-up wireless transceiver 1630. The wireless transceiver 1630 needs to modulate the content of the message to be transmitted into an electrical signal for transmission from the transceiving antenna 1650 in the form of electromagnetic waves, and the wireless transceiver 1630 needs to receive the electromagnetic wave signal through the transceiving antenna 1650 and analyze the electromagnetic wave signal to obtain the message sent to itself by other devices.
The processor 1620 may be a CPU, or a combination of a CPU and a hardware chip. The hardware chip may be an ASIC, PLD, or a combination thereof. The PLD may be a CPLD, an FPGA, a GAL, or any combination thereof.
Memory 1640 may include volatile memory, such as random access memory; the memory 1640 may also comprise non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk. The memory 1640 may also comprise a combination of memories of the kind described above.
In conjunction with the method shown in fig. 3, the working process of each functional device of the terminal may include:
a wake-up receiver 1610 configured to receive a wake-up frame.
The processor 1620 is configured to wake up the wireless transceiver 1630 of the terminal after receiving the wake-up frame, where the wake-up frame includes first identification information for waking up the receiver, and the first identification information is identification information currently used by the wake-up receiver.
A wireless transceiver 1630 configured to send a wake-up confirm frame to the AP, where the wake-up confirm frame includes wake-up indication information indicating that the wireless transceiver 1630 is woken up by the wake-up receiver 1610 upon receiving the wake-up frame.
The wireless transceiver 1630 is further configured to receive a first message sent by the AP, where the first message is sent after the AP determines that the AP sends a wakeup frame to the wakeup receiver 1610 within a preset time period after receiving the wakeup indication information, and the first message is a message that the AP determines to send to the wireless transceiver 1630 when sending the wakeup frame; alternatively, the first and second electrodes may be,
the wireless transceiver 1630 is further configured to receive a second message sent by the AP, where the second message is sent after the AP determines that the AP does not send a wakeup frame to the wakeup receiver 1610 within a preset time period after receiving the wakeup indication information, and the second message includes second identification information of the wakeup receiver 1610 or indication information of the second identification information, and the second identification information or indication information of the second identification information;
the processor 1620 updates the identifier currently used by the wake-up receiver 1610 according to the second identification information or the second identification information indication information.
It should be noted that the transceiver 1630 and the wake-up receiver 1610 can operate in the same frequency band, and the transceiver antenna 1650 includes one antenna. The transceiver 1630 and the wake-up receiver 1610 may also operate in different frequency bands, and the transceiver antenna 1650 may include multiple antennas suitable for different frequency bands, with the transceiver 1630 and the wake-up receiver 1610 using different antennas.
Since the embodiments and the advantageous effects of the devices of the terminal in the above embodiments can refer to the method embodiments and the advantageous effects related to fig. 3, detailed descriptions thereof are omitted here.
The relevant parts among the method embodiments of the invention can be mutually referred; the apparatus provided in the respective apparatus embodiments is adapted to perform the method provided in the respective method embodiments, so that the respective apparatus embodiments may be understood with reference to the relevant parts in the relevant method embodiments.
The names of the message/frame/indication information, the module or the unit, etc. provided in the embodiments of the present invention are only examples, and other names may be used as long as the roles of the message/frame/indication information, the module or the unit, etc. are the same.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It will be understood by those skilled in the art that all or part of the steps in the method for implementing the above embodiments may be implemented by a program, and the program may be stored in a computer-readable storage medium, where the storage medium is a non-transitory medium, such as a random access memory, a read only memory, a flash memory, a hard disk, a solid state disk, a magnetic tape (magnetic tape), a floppy disk (floppy disk), an optical disk (optical disk), and any combination thereof.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (11)

1. A method of communication, the method comprising:
the method comprises the steps that a first device receives a wakeup confirmation frame sent by a wireless transceiver of a second device, wherein the wakeup confirmation frame comprises wakeup indication information, the wakeup indication information is used for indicating that the wireless transceiver of the second device is awakened by a wakeup receiver of the second device after the wakeup frame is received, the wakeup frame comprises first identification information of the wakeup receiver of the second device, and the first identification information is identification information currently used by the wakeup receiver of the second device;
when the first device determines that the wakeup frame is sent to the second device within a preset time period according to the wakeup indication information, the first device sends a first message to the second device, wherein the first message is a message which is determined to be sent to the second device when the first device sends the wakeup frame;
when the first device determines that the wakeup frame is not sent to the second device within a preset time period according to the wakeup indication information, the first device sends a second message to the second device, where the second message includes second identification information of a wakeup receiver of the second device or indication information of the second identification information, so that the second device updates identification information currently used by the wakeup receiver of the second device according to the second identification information or the indication information of the second identification information.
2. The method of claim 1, wherein after the first device sends the second message to the second device, the method further comprises:
the first device receives a confirmation message of the second message sent by the second device, where the confirmation message of the second message is sent by the second device after the second device updates the identification information currently used by the wake-up receiver according to the second identification information or the indication information of the second identification information, and the confirmation message includes the identity authentication information of the second device;
the first equipment determines attribute information of the second equipment according to the identity authentication information of the second equipment;
and the first equipment communicates with the second equipment according to the attribute information of the second equipment.
3. The method according to claim 1 or 2, wherein the wakeup confirm frame further comprises attribute information of the second device;
after the first device receives a wake-up acknowledgement frame sent by a wireless transceiver of a second device, the method further comprises:
the first equipment determines the current protection mode of the second equipment according to the attribute information of the second equipment;
the first equipment identifies the time length of the second equipment working in the current protection mode;
and the first equipment switches the current protection mode between at least two protection modes according to the identification result.
4. The method according to claim 3, wherein the identifying, by the first device, the duration of the second device operating in the current protection mode specifically includes:
after the first device determines that the current protection mode of the second device is a first protection mode, the first protection mode is a mode in which the first device updates the identification information of the wake-up receiver each time the wireless transceiver of the second device is awakened by the wake-up receiver of the second device;
the first equipment identifies whether the second equipment is attacked within a first time length of the first protection mode;
the attack of the second device means that the first device receives the wakeup confirm message sent by the second device, but the first device does not send the wakeup frame to the second device within a preset time period;
after the first device determines, according to the wakeup indication information, that the wakeup frame has been sent to the second device within a preset time period, the first device switches the current protection mode according to an identification result, which specifically includes:
when the first device identifies that the second device works in the first protection mode for more than the first time length and the second device is not attacked within the first time length, the first device switches the current protection mode of the second device from the first protection mode to a second protection mode.
5. The method according to claim 3, wherein the identifying, by the first device, the duration of the second device operating in the current protection mode specifically includes:
after the first device determines that the current protection mode of the second device is a second protection mode, the second protection mode is a mode for updating identification information of a wake-up receiver of the second device when the first device receives a wake-up acknowledgement frame sent by a wireless transceiver of the second device and determines that the first device does not send a wake-up frame to the wake-up receiver of the second device within the preset time period;
the first equipment identifies a second time length and attack times of the second equipment working in the second protection mode;
the attack of the second device means that the first device receives the wakeup confirm message sent by the second device, but the first device does not send the wakeup frame to the second device within a preset time period;
after the first device determines, according to the wakeup indication information, that the wakeup frame is not sent to the second device within a preset time period, the first device switches the current protection mode according to an identification result, which specifically includes:
and when the first device identifies that the time of the second device working in the second protection mode does not exceed the second duration and the attacked times of the second device are not less than the attacked times, the first device switches the current protection mode of the second device from the second protection mode to the first protection mode.
6. The method according to any of claims 1, 2, 4, and 5, wherein the wakeup confirm frame is a PS-Poll frame, and the PS-Poll frame type itself is the wakeup indication information.
7. The method of claim 3, wherein the wakeup confirm frame is a PS-Poll frame, and wherein the PS-Poll frame type itself is the wakeup indication information.
8. A method of communication, the method comprising:
a wake-up receiver of a second device wakes up a wireless transceiver of the second device after receiving a wake-up frame, wherein the wake-up frame comprises first identification information of the wake-up receiver, and the first identification information is identification information currently used by the wake-up receiver;
after being awakened, the wireless transceiver of the second device sends an awakening acknowledgement frame to the first device, wherein the awakening acknowledgement frame comprises awakening indication information which is used for indicating that the wireless transceiver of the second device is awakened by an awakening receiver of the second device after receiving the awakening frame;
the second device receives a first message sent by the first device, wherein the first message is sent after the first device determines that the first device sends the wakeup frame to the second device within a preset time period after receiving the wakeup indication information, and the first message is determined to be sent to the second device when the first device sends the wakeup frame; or the second device receives a second message sent by the first device, where the second message is sent after the first device determines that the first device does not send the wakeup frame to the second device within a preset time period after receiving the wakeup indication information, the second message includes second identification information of the wakeup receiver or indication information of the second identification information, and the second device updates the identification information currently used by the wakeup receiver according to the second identification information or the indication information of the second identification information.
9. The method according to claim 8, wherein after the second device updates the identification information currently used by the wake-up receiver according to the second identification information or the second identification information indication information, the method further comprises:
and the second equipment sends a confirmation message of the second message to the first equipment, wherein the confirmation message comprises the identity authentication information of the second equipment, so that the first equipment is communicated with the second equipment according to the attribute information of the second equipment after determining the attribute information of the second equipment according to the identity authentication information.
10. A network device, characterized in that the network device comprises:
the receiving unit is used for receiving a wakeup confirmation frame sent by a wireless transceiver of a terminal, the wakeup confirmation frame comprises wakeup indication information, the wakeup indication information is used for indicating that the wireless transceiver unit of the terminal is wakened by the wakeup receiving unit of the terminal after receiving the wakeup frame, the wakeup frame comprises first identification information of the wakeup receiving unit, and the first identification information is identification information currently used by the wakeup receiving unit;
the processing unit is used for determining that the awakening frame is sent to the terminal within a preset time period according to the awakening indication information;
a sending unit, configured to send a first message to the terminal when the processing unit determines that the wake-up frame has been sent to the terminal within a preset time period, where the first message is a message that the network device has determined to send to the terminal when sending the wake-up frame; alternatively, the first and second electrodes may be,
the processing unit is further configured to determine, according to the wakeup indication information, that the wakeup frame is not sent to the terminal within a preset time period;
the sending unit is further configured to send, to the terminal, a second message when the processing unit determines that the wakeup frame is not sent to the terminal within a preset time period, where the second message includes second identification information of the wakeup receiving unit or indication information of the second identification information, so that the terminal updates the identification information currently used by the wakeup receiving unit according to the second identification information or the indication information of the second identification information.
11. A terminal, characterized in that the terminal comprises: a wake-up receiving unit, a processing unit and a wireless transceiving unit,
the wake-up receiving unit is used for receiving a wake-up frame;
the processing unit is used for awakening the wireless transceiver unit of the terminal after receiving an awakening frame, wherein the awakening frame comprises first identification information of the awakening receiving unit, and the first identification information is identification information currently used by the awakening receiving unit;
the wireless transceiver unit is configured to send a wakeup confirm frame to a network device, where the wakeup confirm frame includes wakeup indication information, and the wakeup indication information is used to indicate that the wireless transceiver unit is awakened by a wakeup receiving unit of the terminal after receiving the wakeup frame;
the wireless transceiver unit is further configured to receive a first message sent by the network device, where the first message is sent after the network device determines that a wakeup frame is sent to the wakeup receiver unit within a preset time period after receiving the wakeup indication information, and the first message is a message that the network device has determined to send to the wireless transceiver unit when sending the wakeup frame; or receiving a second message sent by the network device, where the second message is sent after the network device determines that the network device does not send a wakeup frame to the wakeup receiving unit within a preset time period after receiving the wakeup indication information, and the second message includes second identification information of the wakeup receiving unit or indication information of the second identification information; and the processing unit updates the identifier currently used by the awakening receiving unit according to the second identifier information or the indication information of the second identifier information.
CN201711052385.6A 2016-10-31 2017-10-30 Communication method, network equipment and terminal Active CN108012315B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
PCT/CN2016/104090 WO2018076356A1 (en) 2016-10-31 2016-10-31 Communication method, network device, and terminal
CNPCT/CN2016/104090 2016-10-31
CN2017101711377 2017-03-21
CN201710171137 2017-03-21

Publications (2)

Publication Number Publication Date
CN108012315A CN108012315A (en) 2018-05-08
CN108012315B true CN108012315B (en) 2021-01-29

Family

ID=62052043

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711052385.6A Active CN108012315B (en) 2016-10-31 2017-10-30 Communication method, network equipment and terminal

Country Status (1)

Country Link
CN (1) CN108012315B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557812B (en) * 2018-06-04 2021-11-16 大唐移动通信设备有限公司 Signal transmission method and device
SG10201805402YA (en) * 2018-06-22 2020-01-30 Panasonic Ip Corp America Communication apparatus and communication method for low power event monitoring

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104105089A (en) * 2013-04-01 2014-10-15 中兴通讯股份有限公司 Data transmission method, device and system
CN104718778A (en) * 2012-10-15 2015-06-17 Lg电子株式会社 Method and apparatus for maintaining association in wireless lan system
CN105393606A (en) * 2014-06-27 2016-03-09 华为技术有限公司 Energy saving method and wake-up method for wireless AP, related device and system
CN105430651A (en) * 2015-11-02 2016-03-23 上海斐讯数据通信技术有限公司 Method and system used for detecting illegal wireless access points

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9363836B2 (en) * 2013-04-01 2016-06-07 Silver Spring Networks, Inc. Secure management of radio transmissions in an endpoint device of a network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104718778A (en) * 2012-10-15 2015-06-17 Lg电子株式会社 Method and apparatus for maintaining association in wireless lan system
CN104105089A (en) * 2013-04-01 2014-10-15 中兴通讯股份有限公司 Data transmission method, device and system
CN105393606A (en) * 2014-06-27 2016-03-09 华为技术有限公司 Energy saving method and wake-up method for wireless AP, related device and system
CN105430651A (en) * 2015-11-02 2016-03-23 上海斐讯数据通信技术有限公司 Method and system used for detecting illegal wireless access points

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
A secure wake-up scheme for low power wireless sensor nodes;Oliver Stecklina;《IEEE》;20140731;全文 *
Low-profile wake-up radio mechanism for resource-constrained wireless devices;Ali Al-Uraiby;《IEEE》;20150126;全文 *
无线入侵检测系统的设计与实现;焦立彬;《中国优秀硕士学位论文全文数据库 信息科技辑》;20130731;全文 *

Also Published As

Publication number Publication date
CN108012315A (en) 2018-05-08

Similar Documents

Publication Publication Date Title
US11343766B2 (en) Method for indicating downlink service data and device
EP3499977B1 (en) Method and device for sending and receiving wur frame
CN107979443B (en) Wake-up method and device
CN108616968B (en) Method and apparatus for transmitting frame
US11770770B2 (en) Wireless communication method and wireless communication terminal using wake-up radio
WO2017143856A1 (en) Communication method and apparatus for wireless local area network
CN107820305B (en) Method and device for transmitting WUR message
CN108012315B (en) Communication method, network equipment and terminal
CN110062447B (en) Method for reducing downlink response time delay of wireless self-organizing network
WO2018076356A1 (en) Communication method, network device, and terminal
WO2018054169A1 (en) Channel switching method and device
US10841875B2 (en) Data transmission method and apparatus
CN109479261B (en) Method for reestablishing connection and wireless local area network device
CN108076476B (en) Method and device for transmitting data
CN109891946B (en) Communication interface awakening method and device, and auxiliary awakening interface identification configuration method and device
CN109845346B (en) Method for awakening wireless device, transmitting device and receiving device
WO2018171576A1 (en) Method for waking up station and station
WO2018149280A1 (en) Data receiving method and device
CN109104756B (en) Wake-up method, access point and station
CN109219154B (en) Communication method, communication device and communication equipment of wireless local area network
CN109121190B (en) Communication method and device of wireless local area network, access point equipment and site equipment
WO2018171591A1 (en) Method and apparatus for waking up device
CN109565783B (en) Method and equipment for sending wake-up frame
CN109121191B (en) Communication method and device of wireless local area network, access point equipment and site equipment
CN117941423A (en) Wireless communication method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant