Radio Resource Management (802.11k) and BSS Transition Management (802.11v)

The two amendments that turn the AP into a coordinator: it tells STAs about neighbour BSSes, asks them to measure RF, and politely requests they roam. Together with 802.11r, the “K-V-R triad” of fast-roaming Wi-Fi.

Status: drafting Related: Action frames, Fast BSS Transition, WNM and ANQP


802.11k — Radio Resource Management

A STA decides which BSS to associate with using mostly-local RSSI. 11k lets the AP supply richer information.

Neighbor Report

The STA sends an Action frame RM Neighbor Report Request; the AP replies with a list of nearby BSSes in the same ESS:

Field per neighbourMeaning
BSSIDThe neighbour AP MAC.
Operating Class + ChannelWhere to find it.
BSSID InformationRM-capable, security match, mobility domain match, FT support.
(PHY type, etc.)Capabilities

The STA can then directly probe the neighbour’s channel and pre-authenticate / FT-roam without scanning every channel. Massive scan-time savings.

Beacon Reporting

The AP sends RM Beacon Request asking the STA to measure beacons on a channel for a duration. The STA returns Beacon Report listing observed BSSIDs, RSSIs, channel utilisation. APs use this to crowdsource RF environment.

Privacy / surveillance angle. The AP can ask any associated STA to measure any channel, returning a fingerprint of the STA’s surroundings. In dense environments, repeated queries reveal motion, presence, and (with multi-AP triangulation) location. Policy-wise this is rarely surfaced to users.

Other measurement requests

  • Channel Load Request / Response — channel busy fraction.
  • Noise Histogram — RSSI distribution.
  • Frame Report — per-MAC frame counts.
  • STA Statistics — TX retry counters.
  • Location Configuration — request location info from the STA (rarely deployed).

802.11v — Wireless Network Management

A grab-bag of management features. The two that matter:

BSS Transition Management (BTM)

The AP sends a BSS Transition Management Request (Action frame) suggesting the STA roam to a different BSS. Reasons:

  • Load balancing.
  • Better candidate (RSSI / band).
  • AP shutting down.

The request includes a candidate list and a disassociation imminent flag. Compliant clients (modern iOS, Android, Windows, macOS) honour it and roam quickly without scanning. Non-compliant clients ignore it.

Forced-roaming attack. An attacker forging a BTM Request with the disassociation-imminent flag and a candidate list pointing at the attacker’s AP can convince a STA to roam to attacker-controlled infrastructure. BTM is a Robust Action frame so MFP protects it once PTK is installed — but pre-association BTM (sent during the brief window before MFP is active) and BTM from a legitimate-looking AP that’s actually a clone are open surfaces.

WNM-Sleep

A long-sleep mode where the AP buffers frames for the STA. Notably, on wake, the AP delivers a fresh GTK so the STA hasn’t missed a key rotation.

AirSnitch’s GTK-injection attack chain abuses WNM-Sleep Response — forging one (using a Passpoint flaw allowing IGTK reuse) installs an attacker-chosen GTK on the victim. See Passpoint flaws.

BSS Max Idle

Negotiated in Association Response. After this many seconds without traffic, the AP disassociates the STA. WNM-Sleep extends the limit.

Other 11v features

  • Directed Multicast Service (DMS) — STA requests specific multicast streams as unicast.
  • TIM Broadcast — broadcast TIM updates between beacons.
  • Triggered STA Statistics — AP requests stats on demand.

The K-V-R triad

Together, 802.11k+v+r enable enterprise-grade roaming:

StepAmendmentWhat happens
1802.11kSTA learns neighbour BSSes.
2802.11vAP nudges STA to roam (BTM Request).
3802.11rSTA roams in <50 ms via FT.

A network that supports all three can move a VoIP-active client between APs without dropping a syllable.

Detection / observation

  • Beacon’s RM Enabled Capabilities IE (tag 70) and Extended Capabilities IE indicate 802.11k support.
  • Beacon’s BSS Transition and WNM-Sleep bits in Extended Capabilities IE indicate 802.11v support.
  • BTM Request decode in Wireshark — Action category 10, action 7.

See also

References

  • IEEE 802.11-2020 §11.10 (Radio Measurement) and §11.11 (WNM).
  • Cisco — 802.11k, 802.11v, and 802.11r — operator-side coverage.