70 likes | 281 Views
Security Topics for SG. Authors:. Date: 2009-01-19. Abstract. This presentations outlines security topics which were agreed on last teleconference as relevant white spaces Straw polls concerning 2 of the 3 topics are included in this package Further comments on device security is requested.
E N D
Security Topics for SG Authors: Date: 2009-01-19 Alex Reznik, InterDigital
Abstract • This presentations outlines security topics which were agreed on last teleconference as relevant white spaces • Straw polls concerning 2 of the 3 topics are included in this package • Further comments on device security is requested Alex Reznik, InterDigital
Device Security • We agreed that device security is highly relevant for cognitive radio in general and white spaces in particular • In particular, device security is seen as essential to the primary task – protection of incumbents • However, there was not an agreement on what if any device security topics might be in scope for 802. • Comments and what aspects of device security may be relevant to 802 are requested. Alex Reznik, InterDigital
Low-Layer Security • Low-Layer (MAC and PHY) Security was noted as important, especially in protection against DoS attacks • In particular, methods to identify and classify existing signals into valid incumbents, malicious impersonators and non-incumbent technologies. • There was not an agreement as to whether it is necessary and/or desirable for 802 technologies to support techniques which identify/classify valid incumbents, malicious impersonators and non-incumbent technologies. • There was also a proposal that the WGs coordinate efforts on low-layer security, in particular that the WGs look at the work done by 802.1 (802.1AE, 802.1AF) and build on it. Alex Reznik, InterDigital
Protection of Location Information • Protection of Location Information was identified as critical • Some aspects of this were noted to fall under device security • However securing the sensing and location measurements and attestation of these was noted as within scope of 802 Alex Reznik, InterDigital
Straw Polls • Straw Polls are listed on the next page • Comments on straw polls are requested by EOB Thu. Jan. 22 • Voting to commence thereafter • Please e-mail these directly to alex.reznik@interdigital.com Alex Reznik, InterDigital
Straw Poll Questions • Should the SG propose support of techniques which identify/classify valid incumbents, malicious impersonators and non-incumbent technologies for White Space technologies? • Should the SG develop a list of specific techniques to identify/classify valid incumbents, malicious impersonators and non-incumbent technologies that 802 should consider? • Should the SG recommend that the WGs coordinate their efforts on low-layer security? • Should the SG examine the work done in 802.1 and develop more specific recommendations for the WGs based on this work? • Should the SG propose support of techniques that secure and attest the sensing and location measurements? • Should the SG develop a list of specific techniques that secure and attest the sensing and location measurements? • Should the SG recommend that the WGs coordinate their efforts on sending and location measurements? Steve Shellhammer, Qualcomm