1 / 7

Security Topics for SG

Security Topics for SG. Authors:. Date: 2009-01-19. Abstract. This presentations outlines security topics which were agreed on last teleconference as relevant white spaces Straw polls concerning 2 of the 3 topics are included in this package Further comments on device security is requested.

lee
Download Presentation

Security Topics for SG

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Topics for SG Authors: Date: 2009-01-19 Alex Reznik, InterDigital

  2. Abstract • This presentations outlines security topics which were agreed on last teleconference as relevant white spaces • Straw polls concerning 2 of the 3 topics are included in this package • Further comments on device security is requested Alex Reznik, InterDigital

  3. Device Security • We agreed that device security is highly relevant for cognitive radio in general and white spaces in particular • In particular, device security is seen as essential to the primary task – protection of incumbents • However, there was not an agreement on what if any device security topics might be in scope for 802. • Comments and what aspects of device security may be relevant to 802 are requested. Alex Reznik, InterDigital

  4. Low-Layer Security • Low-Layer (MAC and PHY) Security was noted as important, especially in protection against DoS attacks • In particular, methods to identify and classify existing signals into valid incumbents, malicious impersonators and non-incumbent technologies.  • There was not an agreement as to whether it is necessary and/or desirable for 802 technologies to support techniques which identify/classify valid incumbents, malicious impersonators and non-incumbent technologies.  • There was also a proposal that the WGs coordinate efforts on low-layer security, in particular that the WGs look at the work done by 802.1 (802.1AE, 802.1AF) and build on it. Alex Reznik, InterDigital

  5. Protection of Location Information • Protection of Location Information was identified as critical • Some aspects of this were noted to fall under device security • However securing the sensing and location measurements and attestation of these was noted as within scope of 802 Alex Reznik, InterDigital

  6. Straw Polls • Straw Polls are listed on the next page • Comments on straw polls are requested by EOB Thu. Jan. 22 • Voting to commence thereafter • Please e-mail these directly to alex.reznik@interdigital.com Alex Reznik, InterDigital

  7. Straw Poll Questions • Should the SG propose support of techniques which identify/classify valid incumbents, malicious impersonators and non-incumbent technologies for White Space technologies? • Should the SG develop a list of specific techniques to identify/classify valid incumbents, malicious impersonators and non-incumbent technologies that 802 should consider? • Should the SG recommend that the WGs coordinate their efforts on low-layer security? • Should the SG examine the work done in 802.1 and develop more specific recommendations for the WGs based on this work? • Should the SG propose support of techniques that secure and attest the sensing and location measurements? • Should the SG develop a list of specific techniques that secure and attest the sensing and location measurements? • Should the SG recommend that the WGs coordinate their efforts on sending and location measurements? Steve Shellhammer, Qualcomm

More Related