Security Ad-Hoc Report Draft

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1421r0 Submission November 2012 Rich Kennedy, Research In MotionSlide 1 TGaf Response to CA Comments Date: Authors:
Advertisements

Geolocation databases for spectrum sharing : ECC findings and studies EC DG CONNECT Workshop, 20 March 2015 Bruno Espinosa, Deputy Director, ECO.
Sg-whitespace-09/0023r01 Submission February2009 Alex Reznik, InterDigitalSlide 1 Security Straw Poll Results Date: Authors:
Doc.: IEEE /0104r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide 1 Channel Selection Support in TVWS Date: Authors:
Sg-whitespace-09/0026r04 Submission January 2009 Slide 1 Security Ad-Hoc Report Draft Date: Authors: Alex Reznik, InterDigital; Ranga Reddy,
Sg-whitespace-09/0026r05 Submission February 2009 Slide 1 Security Ad-Hoc Report Draft Date: Authors: Alex Reznik, InterDigital; Ranga Reddy,
PAWS Protocol to Access White Space DB IETF 81 Gabor Bajko, Brian Rosen.
March 2009 Richard Paine, SelfSlide 1 sg-whitespace Secure-Datastore-Architecture-Concepts Submission Project IEEE 802 Executive Committee.
Doc.: IEEE /1220r0 Submission November 2009 Jon Rosdahl, CSRSlide 1 WG11 Comments on PARs submitted Nov 2009 Date: Authors:
Doc.: IEEE /0074r2 Submission May 2010 Tuncer Baykas, NICTSlide TG1 Introduction and Status Notice: This document has been prepared to.
Doc.:802.19/0027r0 Submission May 2009 Presentation Summarizing Contribution on TV Whitespace Coexistence Matrix and Use Cases Date: Authors:
Doc.: IEEE /1393r1 Submission November 2011 Slide 1 OFCOM ECC TR 159 TVWS Terminology Date: Authors: Peter Ecclesine, Cisco.
Doc.: IEEE /0037r0 Submission February 2010 Joe Kwak (InterDigital)Slide 1 TVWS Architecture for SDD Date: Authors: Notice: This document.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
Doc.: /0005r0 SubmissionSlide 1 16/03/2016 Slide 1 IEEE White Space Radio Introduction from PAR and 5C Notice: This document has been prepared.
March 2009 Richard Paine, SelfSlide 1 doc.: /0337r0 Submission Project IEEE 802 Executive Committee Study Group on TV White Spaces – End-to-End.
Doc.: IEEE /0162r0 Submission November 2010 Jihyun Lee, LG ElectronicsSlide 1 TVWS Coexistence Procedures and Protocols Notice: This document.
August, 2012 MBANS FCC Rules Summary Information document for SRD/MG on the FCC adopted MBAN rules under part 95 MedRadio service on 24 May 2012.
PAWS Framework draft-lei-paws-framework-datamodel-00
802.11u and Emergency Services
Device Security in Cognitive Radio
Proposed SFD Text for ai Link Setup Procedure
TV Whitespace Common Functions across IEEE Tutorial
PAWS: Problem statement
November 2005 Liaison Report from P1901
Proposed response to 3GPP ED request
On the Objectives and Scope of the WS Coexistence PAR
Date: ; Teleconference
TG1 Tutorial Review Date: Authors: May 2010 May 2010
Media Independent Coexistence
Working Spread Sheets for Assignment and Schedule
doc.: IEEE <doc#>
Maryna Komarova (ENST)
Possible TV White Space Coexistence Tasks
Cryptography and Network Security
PAR Comments Date: Authors: July 2010 May 2010
IEEE P Wireless RANs Date:
May 2007 doc.: IEEE /0010r0 May 2009 Presentation Summarizing Contribution on TV Whitespace Coexistence Matrix and Use Cases Date:
Enabling Procedure of Communication in TVWS under FCC rules
Functional Requirements for EHT Specification Framework
Security and the Protocol Reference Model Enhancements in IEEE
TG1 Tutorial Review Date: Authors: May 2010 May 2010
Overview of Database Security
Media Independent Coexistence for Devices in TV White Spaces
Security Tutorial Material
EC Update on TV Whitespace ECSG
Security Tutorial Material
Identification Signal for Fixed devices
Matthew Sherman, BAE Systems
TG1 and System Design Document
Media Independent Coexistence for Devices in TV White Spaces
Examples of deployment scenarios
Media Independent Coexistence for Devices in TV White Spaces
IEEE P Wireless RANs Date:
Requirements Date: Authors: March 2010 Month Year
Security Ad-Hoc Report Draft
11af architecture Date: Authors: May 2011 Month Year
Security in SDR & cognitive radio
Month Year doc.: IEEE yy/xxxxr0 May 2012
Media Independent Coexistence
Media Independent Coexistence
Security Ad-Hoc Report Draft
Media Independent Coexistence
Cryptography and Network Security
Discussion on 6 GHz Band Support
Functional Requirements for EHT Specification Framework
Media Independent Coexistence
802E Privacy Report Date: Authors: January 2016
TV Whitespace Common Functions across IEEE Tutorial
Wireless Architectural Thoughts
Presentation transcript:

Security Ad-Hoc Report Draft Month Year doc.: IEEE 802.11-yy/xxxxr0 January 2009 Security Ad-Hoc Report Draft Date: 2009-02-04 Authors: Alex Reznik, InterDigital John Doe, Some Company

January 2009 Abstract This presentation summarizes the recommendations of the security ad-hoc group. Currently a draft. Aimed to become part of a recommendation to the EC as well as provide starting point for the tutorial Abstract to be removed/modified as needed. Alex Reznik, InterDigital

Security Goals and General Approach January 2009 Security Goals and General Approach Within the context of white spaces, security design needs to focus on two goals: Primary goal: Protection of incumbents Secondary goal: Protection of secondary users The number of issues and technologies is larger than with protection of incumbents Requires a comprehensive approach General Approach to Security This bullet is subject to addition of information on the end-to-end slides and approval by the group The ad-hoc recommends that an end-to-end security design approach be used in developing security aspects of white space technologies Within 802 this means a focus on the following The interfaces required for support of higher-level security technologies, such as data/application security, secure identity protocols, device security, etc. Support of security technologies as discussed below Alex Reznik, InterDigital

Threat Analysis (1/4) High Level Threats January 2009 Threat Analysis (1/4) High Level Threats Illegal Use of Spectrum Causing harmful interference to incumbents Denial of Service between Secondary Users Threats to coexistence protocols between secondary devices e.g. Stealing/hogging spectrum Unauthorized disclosure or modification of “sensitive user/location” information Disclosure of user location Modification of database info “sensitive user/location” information is not correct Registered incumbent or secondary user location Database info poisoning Sensitive user/location information includes User location information User identity Database registration/authentication paramenters Sensor measurements reported to the database by user Interference report from the database Alex Reznik, InterDigital

Threat Analysis 2/4 Mapping Use Cases to Threats – Master Devices January 2009 Threat Analysis 2/4 Mapping Use Cases to Threats – Master Devices Use Cases/Threats 4W Fixed 4W-4W fed by 100mW 4W-100 mW 100 mW (Registered Master) (Un -registered Master) 50 mW (Sensing Only) ≤ 40 mW Illegal Use of Spectrum X DoS between Secondary Users Disclosure/ Modification of “Relevant“ Info “Relevant” Info Not correct Alex Reznik, InterDigital

Threat Analysis 3/4 Mapping Use Cases to Threats – Client Devices January 2009 Threat Analysis 3/4 Mapping Use Cases to Threats – Client Devices Use Cases/Threats 4W Fixed 4W-4W fed by 100mW 4W-100 mW 100 mW (Registered Master) (Un -registered Master) 50 mW (Sensing Only) ≤ 40 mW Illegal Use of Spectrum X DoS between Secondary Users Disclosure/ Modification of “Relevant“ Info “Relevant” Info Not correct Alex Reznik, InterDigital

Threat Analysis 3/4 - Caveats January 2009 Threat Analysis 3/4 - Caveats For the “50mW (Sensing Only)” and “≤ 40mW” the Disclosure/Modification of Relevant Info & Relevant Info Not Correct threats, are not applicable as those devices will not make use of the database. The “≤ 40mW” use case is not affected by the Illegal Use of Spectrum threat due to low power. Devices can operate in adjacent channels. Client devices cannot pose the Illegal Use of Spectrum threat in some use cases because the master chooses the spectrum, polls the database, and bears the responsibility for violation. The exception is when the master device is unregistered. Given that registration for the lower power devices is not required. This also may be applicable for lower power networks operating in a mesh or peer to peer topology, where every device would be considered a master. Alex Reznik, InterDigital

General Recommendations January 2009 General Recommendations Device Security Key requirement for protection of incumbents Ensures that devices cannot be modified to “break the rules” Potentially required to pass FCC certification Generally, not in scope for 802. However 802 may need to provide support of proper device security operation: Measurement and signaling required to verify that the device is operating according to applicable specifications and policies Ability to affect device operations (e.g. disable transmissions) should device be found to be in violation of such policies See TNC in the end-to-end architecture slides for an example. Low-Layer Security Support of low-layer techniques by 802 is recommended to address the following Incumbent classification / identification identification of malicious and negligent impersonators Protection of coexistence signaling It is recommended that the WGs coordinate their efforts in this area Sensor and location measurement security Support by 802 of techniques that secure and attest sensing and location measurements is recommended Protection of database information Protection of database information on the device and its transmission over the air interface links is recommended and appropriate techniques should be supported by 802 Alex Reznik, InterDigital

Location Privacy: and End-to-End Service Example ? January 2009 Location Privacy: and End-to-End Service Example ? Potential end-to-end requirements Support of mechanisms to prevent tracking of changes in location of a mobile device based on information sent in database queries. Support of mechanisms to prevent long term tracking of a mobile device’s location based on it's transmissions. Mapping this to existing mechanisms within 802 Mapping this to recommended additional mechanisms Alex Reznik, InterDigital; Ranga Reddy, US Army; Michael Williams, Nokia

January 2009 End-to-End Security 1/2 Alex Reznik, InterDigital

January 2009 End-to-End Security 2/2 Alex Reznik, InterDigital