Security Ad-Hoc Report Draft

Slides:



Advertisements
Similar presentations
Sg-whitespace-09/0023r01 Submission February2009 Alex Reznik, InterDigitalSlide 1 Security Straw Poll Results Date: Authors:
Advertisements

Doc.: IEEE /0104r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide 1 Channel Selection Support in TVWS Date: Authors:
Sg-whitespace-09/0026r04 Submission January 2009 Slide 1 Security Ad-Hoc Report Draft Date: Authors: Alex Reznik, InterDigital; Ranga Reddy,
A new challenge – creating a regulatory environment for implementing geo-location databases for White Space Devices (WSD) Andy Gowans Date (26 th January.
Sg-whitespace-09/0026r05 Submission February 2009 Slide 1 Security Ad-Hoc Report Draft Date: Authors: Alex Reznik, InterDigital; Ranga Reddy,
Doc.: IEEE /1220r0 Submission November 2009 Jon Rosdahl, CSRSlide 1 WG11 Comments on PARs submitted Nov 2009 Date: Authors:
Doc.: IEEE /0074r2 Submission May 2010 Tuncer Baykas, NICTSlide TG1 Introduction and Status Notice: This document has been prepared to.
Doc.:802.19/0027r0 Submission May 2009 Presentation Summarizing Contribution on TV Whitespace Coexistence Matrix and Use Cases Date: Authors:
Doc.: IEEE /1393r1 Submission November 2011 Slide 1 OFCOM ECC TR 159 TVWS Terminology Date: Authors: Peter Ecclesine, Cisco.
Doc.: IEEE /0261r0 SubmissionSlide 1 Enabling Procedure of Communication in TVWS under FCC rules Notice: This document has been prepared to assist.
Doc.: IEEE /0037r0 Submission February 2010 Joe Kwak (InterDigital)Slide 1 TVWS Architecture for SDD Date: Authors: Notice: This document.
Doc.: /0005r0 SubmissionSlide 1 16/03/2016 Slide 1 IEEE White Space Radio Introduction from PAR and 5C Notice: This document has been prepared.
Doc.: IEEE /0162r0 Submission November 2010 Jihyun Lee, LG ElectronicsSlide 1 TVWS Coexistence Procedures and Protocols Notice: This document.
August, 2012 MBANS FCC Rules Summary Information document for SRD/MG on the FCC adopted MBAN rules under part 95 MedRadio service on 24 May 2012.
PAWS Framework draft-lei-paws-framework-datamodel-00
Device Security in Cognitive Radio
Comparison Between and af
Proposed SFD Text for ai Link Setup Procedure
TV Whitespace Common Functions across IEEE Tutorial
PAWS: Problem statement
Sept 2004 doc.: IEEE a Nov 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Security Of Wireless Networks: How Low-Layers Security Can Help
On the Objectives and Scope of the WS Coexistence PAR
FCC TVWS Terminology Date: Authors: Month Year Month Year
Date: ; Teleconference
TG1 Tutorial Review Date: Authors: May 2010 May 2010
Media Independent Coexistence
doc.: IEEE <doc#>
Possible TV White Space Coexistence Tasks
Security Ad-Hoc Report Draft
PAR Comments Date: Authors: July 2010 May 2010
IEEE P Wireless RANs Date:
May 2007 doc.: IEEE /0010r0 May 2009 Presentation Summarizing Contribution on TV Whitespace Coexistence Matrix and Use Cases Date:
Enabling Procedure of Communication in TVWS under FCC rules
Functional Requirements for EHT Specification Framework
Security and the Protocol Reference Model Enhancements in IEEE
TG1 Tutorial Review Date: Authors: May 2010 May 2010
Interference Analysis for Channel Selection
IEEE White Space Radio Draft Development Process
TVBD Common Functions across IEEE 802 Draft tutorial
Security Tutorial Material
Security Tutorial Material
Identification Signal for Fixed devices
Matthew Sherman, BAE Systems
Examples of deployment scenarios
IEEE P Wireless RANs Date:
Requirements Date: Authors: March 2010 Month Year
Security Ad-Hoc Report Draft
11af architecture Date: Authors: May 2011 Month Year
Security in SDR & cognitive radio
IEEE MEDIA INDEPENDENT HANDOVER
Sept 2004 doc.: IEEE a Nov 2004 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:
Month Year doc.: IEEE yy/xxxxr0 May 2012
TGah Coexistence Assurance
TVBD Common Functions across IEEE 802 Draft tutorial
Media Independent Coexistence
Media Independent Coexistence
IEEE White Space Radio Status Report
Media Independent Coexistence
IEEE White Space Radio Status Report
Discussion on 6 GHz Band Support
Functional Requirements for EHT Specification Framework
Media Independent Coexistence
Discussion on 6 GHz Band Support
TV Whitespace Common Functions across IEEE Tutorial
Geo-location in USA Date: Authors: January 2010
September 2011 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Proposal in Response to Task Group j.
Enabling Procedure of Communication in TVWS under FCC rules
Coexistence Tutorial Material
Wireless Architectural Thoughts
Presentation transcript:

Security Ad-Hoc Report Draft Month Year doc.: IEEE 802.11-yy/xxxxr0 January 2009 Security Ad-Hoc Report Draft Date: 2009-02-04 Authors: Alex Reznik, InterDigital John Doe, Some Company

January 2009 Abstract This presentation summarizes the recommendations of the security ad-hoc group. Currently a draft. Abstract to be removed once this becomes part of the tutorial Alex Reznik, InterDigital

Security Goals and General Approach January 2009 Security Goals and General Approach Within the context of white spaces, security design needs to focus on two goals: Primary goal: Protection of Incumbents This requires support of device security as discussed below Secondary goal: Protection of Cognitive Radios While secondary, this is a much larger problem them protection of incumbents Requires a much more comprehensive approach General Approach to Security The ad-hoc recommends that an end-to-end security design approach be used in developing security aspects of white space technologies Within 802 this means a focus on the following The interfaces required for support of higher-level security technologies, such as data/application security, secure identity protocols, device security, etc. Support of certain low-level security technologies as discussed below Alex Reznik, InterDigital

Risk Analysis (1/4) High Level Threats January 2009 Risk Analysis (1/4) High Level Threats Illegal Use of Spectrum Causing harmful interference to incumbents Denial of Service to other Secondary Users Threats to coexistence protocols between secondary devices e.g. Stealing/hogging spectrum, preventing from other Unauthorized disclosure or modification of “relevant” information User location Database Info “Relevant” information is not correct Database info Alex Reznik, InterDigital

Risk Analysis 2/4 Mapping Use Cases to Threats – Master Devices January 2009 Risk Analysis 2/4 Mapping Use Cases to Threats – Master Devices Use Cases/Threats 4W Fixed 4W-4W fed by 100mW 4W-100 mW 100 mW (Registered Master) (Un -registered Master) 50 mW (Sensing Only) ≤ 40 mW Illegal Use of Spectrum X DoS to other Secondary Users Disclosure/Modification of “Relevant“ Info “Relevant” Info Not correct Alex Reznik, InterDigital

Risk Analysis 3/4 Mapping Use Cases to Threats – Client Devices January 2009 Risk Analysis 3/4 Mapping Use Cases to Threats – Client Devices Use Cases/Threats 4W Fixed 4W-4W fed by 100mW 4W-100 mW 100 mW (Registered Master) (Un -registered Master) 50 mW (Sensing Only) ≤ 40 mW Illegal Use of Spectrum X DoS to other Secondary Users Disclosure/Modification of “Relevant“ Info “Relevant” Info Not correct Alex Reznik, InterDigital

Risk Analysis 3/4 - Caveats January 2009 Risk Analysis 3/4 - Caveats For the “50mW (Sensing Only)” and “≤ 40mW” the Disclosure/Modification of Relevant Info & Relevant Info Not Correct threats, are not applicable as those devices will not make use of the database The “≤ 40mW” use case is not affected by the Illegal Use of Spectrum threat, as it is the only use case (due to its’ low power) that can operate in adjacent channels. Illegal Use of Spectrum is not considered a threat, from the client side, for some use cases because it is expected that the master device will poll the database on behalf of the client and that the client will only operate on channels the master tells it to. The exception is when the master device is unregistered. Given that registration for the lower power devices is not required. This also may be applicable for lower power networks operating in a mesh topology, where every device would be considered a master. Alex Reznik, InterDigital

General Recommendations January 2009 General Recommendations Device Security Key requirement for protection of incumbents Ensures that devices cannot be modified to “break the rules” Potentially required to pass FCC certification While generally above MAC (and thus out of scope for 802), 802 should support the following A “device security SAP” which provides key parameters required to make sure that the radio is compliant with required policies in real-time. The policies may include any of the following: FCC regulations, coexistence policies, intra-RAT protocol specification. Low-Layer Security Support of low-layer techniques is recommended to address the following Incumbent classification / identification identification of malicious and negligent impersonators Protection of coexistence signaling It is recommended that the WGs coordinate their efforts in this area Sensor and location measurement security Support of techniques that secure and attest sensing and location measurements of recommended Protection of database information Protection of database information on the device and its transmission over the air interface links is recommended Alex Reznik, InterDigital

January 2009 End-to-End Security 1/2 Alex Reznik, InterDigital

January 2009 End-to-End Security 2/2 Alex Reznik, InterDigital