Download presentation
Presentation is loading. Please wait.
1
doc.: IEEE 802.15-<doc#>
<month year> doc.: IEEE <doc#> March, 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [High Confidence Wireless Personal Area Networks] Date Submitted: [14 March, 2010] Source: [Cao Zhen, Liu Dapeng] Company [China Mobile Communications Corporation] Address [28 Xuanwumenxi Ave. Beijing , China] Voice:[ ], FAX: [ ], Abstract: [Requirement for High Confidence WPANs] Purpose: [Request the setting up of an interest group which will study the prospects of security and privacy of MAC and PHY] Notice: This document has been prepared to assist the IEEE P It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P <author>, <company>
2
doc.: IEEE 802.15-<doc#>
<month year> doc.: IEEE <doc#> March, 2010 High Confidence WPANs Zhen Cao, Dapeng Liu March 14, 2010 <author>, <company>
3
Scenarios and Requirements
<month year> doc.: IEEE <doc#> March, 2010 Scenarios and Requirements Application scenarios require highly secure and private network environment Privacy-sensitive application: healthcare, monitoring Lawful enforcement applications: anti-terrorism, sensitive field monitoring Requirements: Both MAC and PHY should be enhanced to accommodate the security aspects <author>, <company>
4
Background: Known Issues
<month year> doc.: IEEE <doc#> March, 2010 Background: Known Issues PHY Layer Attacks Signal jamming MAC Layer Attacks Backoff manipulation: attacks to CSMA Replay attack Evasdropping attack PANId conflict attack GTS attack …… Most of those attacks cannot be solved by crypto methodology, or higher layer mechanisms <author>, <company>
5
Background: Known Issues
<month year> doc.: IEEE <doc#> March, 2010 Background: Known Issues On the IEEE MAC Layer Attacks: GTS Attack The adversary can learn the GTS slot times through extracting the GTS descriptor(s) from the beacon frame. Reference: Radosveta Sokullu, “On the IEEE MAC Layer Attacks: GTS Attack”, The Second International Conference on Sensor Technologies and Applications, IEEE SENSORCOMM.2008 <author>, <company>
6
Background: CSMA Misbehavior
<month year> doc.: IEEE <doc#> March, 2010 Background: CSMA Misbehavior CSMA-CA misbehavior test: 8 nodes sending packets to one receiver By selecting backoff values from range [0,CW/4 ], the throughput of the other 7 nodes is degraded by as much as 50%. Reference: Pradeep Kyasanur, Nitin H. Vaidya, “Detection and Handling of MAC Layer Misbehavior in Wireless Networks”, IEEE DSN 2002 <author>, <company>
7
doc.: IEEE 802.15-<doc#>
<month year> doc.: IEEE <doc#> March, 2010 Why a 15.4 amendment 15.4 defines the MAC and PHY Security is in its scope <author>, <company>
8
What the amendment may contain
<month year> doc.: IEEE <doc#> March, 2010 What the amendment may contain CSMA security enhancement GTS security enhancement Jamming attacks avoidance Etc… <author>, <company>
9
doc.: IEEE 802.15-<doc#>
<month year> doc.: IEEE <doc#> March, 2010 Summary We need High Confidence WPANs need to study security aspects of its MAC and PHY sophisticatedly <author>, <company>
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.