What is claimed is:1. A computer-implemented method, comprising:sending, while in a first power mode, encrypted data to a remote device, the encrypted data corresponding to maintenance of a link between the first device and the remote device;determining, by a processor included in a first device, to enter a second power mode, the second power mode clock gating the processor and consuming less power than the first power mode;sending, by the processor via a wireless transceiver of the first device, first data to the remote device indicating that the processor is entering the second power mode and that the first device will send unencrypted data during the second power mode, the unencrypted data corresponding to maintenance of the link between the first device and the remote device;determining, by the processor, network parameters associated with the remote device, the network parameters including a first source address corresponding to the remote device and a first destination address corresponding to the first device;sending, by the processor, the network parameters to the wireless transceiver;sending, by the processor, an instruction to the wireless transceiver to trigger a wakeup event upon the wireless transceiver receiving, from the remote device, data that includes the network parameters;entering, by the processor, the second power mode;sending, while in the second power mode, the unencrypted data including a payload from the encrypted data;receiving, by the wireless transceiver, second data from the remote device, the second data including a second source address and a second destination address;determining that the second source address matches the first source address;determining that the second destination address matches the first destination address;generating, by the wireless transceiver, a first interrupt to the processor, the first interrupt instructing the processor to enter the first power mode; andentering, by the processor, the first power mode.2. The computer-implemented method of claim 1, further comprising:entering, by the processor, the second power mode;receiving, by the wireless transceiver, third data from a second remote device, the third data including the second source address; andgenerating, by the wireless transceiver based at least in part on the third data, a second interrupt to the processor, the second interrupt instructing the processor to enter the first power mode.3. The computer-implemented method of claim 1, further comprising:sending, while in the first power mode, by the processor via the wireless transceiver, the encrypted data to the remote device using a first time interval;sending, by the first processor via the wireless transceiver, the first data to the remote device, the first data indicating that the first device will send the encrypted data using a second time interval during the second power mode, the second time interval longer than the first time interval;determining, by the processor, a period of time associated with the second time interval;setting, using clock circuitry on the first device, a timer corresponding to the period of time;entering, by the processor, the second power mode;determining, by the clock circuitry, that the period of time has elapsed;entering, by the processor, a connection maintenance mode;sending, by the processor via the wireless transceiver, the encrypted data;resetting, using the clock circuitry, the timer; andentering, by the processor, the second power mode.4. A computer-implemented method, comprising:sending, while in a first power mode, encrypted data to a remote device using a first time interval, the encrypted data corresponding to maintenance of a link between the first device and the remote device;determining, by a processor included in a first device, to enter a second power mode;sending, by the processor via a wireless transceiver of the first device, first data to the remote device indicating that the processor is entering the second power mode and that the first device will send the encrypted data using a second time interval during the second power mode;determining, by the processor, network parameters associated with the remote device;sending, by the processor, the network parameters to the wireless transceiver;sending, by the processor, an instruction to the wireless transceiver to trigger a wakeup event upon the wireless transceiver receiving, from the remote device, data that includes the network parameters;entering, by the processor, the second power mode, the second power mode consuming less power than the first power mode; andsending, while in the second power mode, the encrypted data to the remote device using the second time interval.5. The computer-implemented method of claim 4, wherein the network parameters include:a first source address corresponding to the remote device;a first destination address corresponding to the first device;a first source port; anda first destination port.6. The computer-implemented method of claim 5, further comprising:receiving, by the wireless transceiver, second data from the remote device, the second data including a second source address, a second destination address, a second source port and a second destination port;determining that the second source address matches the first source address;determining that the second destination address matches the first destination address;determining that the second port matches the first source port;determining that the second destination port matches the first destination port;generating, by the wireless transceiver, a first interrupt to the processor, the first interrupt instructing the processor to enter the first power mode; andentering, by the processor, the first power mode.7. The computer-implemented method of claim 6, further comprising:receiving, by the wireless transceiver, third data from a second remote device, the third data including the second source address; andgenerating, by the wireless transceiver based at least in part on the third data, a second interrupt to the processor, the second interrupt instructing the processor to enter the first power mode.8. The computer-implemented method of claim 4, further comprising:entering, by the processor, the second power mode;determining, by the processor, a period of time associated with the second time interval;setting, using clock circuitry on the first device, a timer corresponding to the period of time;determining, by the clock circuitry, that the period of time has elapsed;entering, by the processor, a connection maintenance mode;sending, by the processor via the wireless transceiver, the encrypted data to the remote device;resetting, using the clock circuitry, the timer; andentering, by the processor, the second power mode.9. The computer-implemented method of claim 4, wherein the first data indicates that the first device will also send unencrypted data during the second power mode, the unencrypted data corresponding to maintenance of the link between the first device and the remote device, and the method further comprises:sending, by the wireless transceiver, the unencrypted data to the remote device using the first time interval while in the second power mode, the unencrypted data including a payload from the encrypted data.10. The computer-implemented method of claim 4, further comprising:receiving, by the wireless transceiver, second data from the remote device, the second data indicating that the first device will be disconnected from the remote device;generating, by the wireless transceiver, a first interrupt to the processor, the first interrupt instructing the processor to enter a connection maintenance mode;entering, by the processor, the connection maintenance mode;reconnecting, by the processor via the wireless transceiver, to the remote device; andentering, by the processor, the second power mode.11. A first device, comprising:at least one processor;a wireless transceiver; andmemory including first instructions operable to be executed by the at least one processor to cause the first device to:send, while in a first power mode, encrypted data to a remote device, the encrypted data corresponding to maintenance of a link between the first device and the remote device;determine, by the at least one processor, to enter a second power mode;send, by the at least one processor via the wireless transceiver, first data to the remote device indicating that the processor is entering the second power mode and that the first device will send unencrypted data during the second power mode, the unencrypted data corresponding to maintenance of the link between the first device and the remote device;determine, by the at least one processor, network parameters associated with the remote device;send, by the at least one processor, the network parameters to the wireless transceiver;send, by the at least one processor, an instruction to the wireless transceiver to trigger a wakeup event upon the wireless transceiver receiving, from the remote device, data that includes the network parameters;enter, by the at least one processor, the second power mode; andsend, while in the second power mode, unencrypted data to the remote device, the unencrypted data including a payload from the encrypted data.12. The first device of claim 11, wherein the network parameters include:a first source address corresponding to the remote device;a first destination address corresponding to the first device;a first source port; anda first destination port.13. The first device of claim 12, wherein the memory further comprises second instructions operable to be executed by the wireless transceiver to cause the first device to:receive, by the wireless transceiver, second data from the remote device, the second data including a second source address, a second destination address, a second source port and a second destination port;determine, by the wireless transceiver, that the second source address matches the first source address;determine, by the wireless transceiver, that the second destination address matches the first destination address;determine, by the wireless transceiver, that the second port matches the first source port;determine, by the wireless transceiver, that the second destination port matches the first destination port; andgenerate, by the wireless transceiver, a first interrupt to the at least one processor, the first interrupt instructing the at least one processor to enter the first power mode.14. The first device of claim 13, wherein the second instructions, when executed by the wireless transceiver, further cause the first device to:receive, by the wireless transceiver, third data from a second remote device, the third data including the second source address; andgenerate, by the wireless transceiver based at least in part on the third data, a second interrupt to the at least one processor, the second interrupt instructing the at least one processor to enter the first power mode.15. The first device of claim 11, wherein the first instructions, when executed by the at least one processor, further cause the first device to:send, while in the first power mode, by the at least one processor via the wireless transceiver, the encrypted data to the remote device using a first time interval; andsend, while in the second power mode, by the at least one processor via the wireless transceiver, the encrypted data to the remote device using a second time interval.16. The first device of claim 15, wherein the first instructions, when executed by the at least one processor, further cause the first device to:determine, by the at least one processor, a period of time associated with the second time interval;set, by the at least one processor using clock circuitry on the first device, a timer corresponding to the period of time;determine, by the clock circuitry, that the period of time has elapsed;enter, by the at least one processor, a connection maintenance mode;send, by the at least one processor via the wireless transceiver, the encrypted data to the remote device;reset, by the at least one processor using the clock circuitry, the timer; andenter, by the at least one processor, the second power mode.17. The first device of claim 11, wherein the second instructions, when executed by the wireless transceiver, further cause the first device to:receive, by the wireless transceiver, second data from the remote device, the second data indicating that the first device will be disconnected from the remote device;generate, by the wireless transceiver, a first interrupt to the at least one processor, the first interrupt instructing the at least one processor to enter a connection maintenance mode, and the first instructions further configure the first device to:enter, by the at least one processor, the connection maintenance mode;reconnect, by the at least one processor via the wireless transceiver, to the remote device; andenter, by the at least one processor, the second power mode.18. A computer-implemented method, comprising:determining, by a processor included in a first device, to enter a first power mode;sending, by the processor via a wireless transceiver of the first device, first data to a remote device indicating that the processor is entering the first power mode;determining, by the processor, network parameters associated with the remote device;sending, by the processor, the network parameters to the wireless transceiver;sending, by the processor, an instruction to the wireless transceiver to trigger a wakeup event upon the wireless transceiver receiving, from the remote device, data that includes the network parameters;entering, by the processor, the first power mode;receiving, by the wireless transceiver, second data from the remote device, the second data indicating that the first device will be disconnected from the remote device;generating, by the wireless transceiver, a first interrupt to the processor, the first interrupt instructing the processor to enter a second power mode corresponding to connection maintenance;entering, by the processor, the second power mode;reconnecting, by the processor via the wireless transceiver, to the remote device; andentering, by the processor, the first power mode.