22090210030000systemlevelissuesandcommentspertinenttosections7and9ofthe80222draf.docx

上传人:b****5 文档编号:11631484 上传时间:2023-03-29 格式:DOCX 页数:15 大小:41.16KB
下载 相关 举报
22090210030000systemlevelissuesandcommentspertinenttosections7and9ofthe80222draf.docx_第1页
第1页 / 共15页
22090210030000systemlevelissuesandcommentspertinenttosections7and9ofthe80222draf.docx_第2页
第2页 / 共15页
22090210030000systemlevelissuesandcommentspertinenttosections7and9ofthe80222draf.docx_第3页
第3页 / 共15页
22090210030000systemlevelissuesandcommentspertinenttosections7and9ofthe80222draf.docx_第4页
第4页 / 共15页
22090210030000systemlevelissuesandcommentspertinenttosections7and9ofthe80222draf.docx_第5页
第5页 / 共15页
点击查看更多>>
下载资源
资源描述

22090210030000systemlevelissuesandcommentspertinenttosections7and9ofthe80222draf.docx

《22090210030000systemlevelissuesandcommentspertinenttosections7and9ofthe80222draf.docx》由会员分享,可在线阅读,更多相关《22090210030000systemlevelissuesandcommentspertinenttosections7and9ofthe80222draf.docx(15页珍藏版)》请在冰豆网上搜索。

22090210030000systemlevelissuesandcommentspertinenttosections7and9ofthe80222draf.docx

22090210030000systemlevelissuesandcommentspertinenttosections7and9ofthe80222draf

IEEEP802.22

WirelessRANs

SystemsLevelIssuesandCommentsPertinenttoSection7andSection9for802.22Draftv2.0

Date:

2009-11-13

Author(s):

Name

Company

Address

Phone

email

ApurvaMody

BAESystems

P.O.Box868,MER15-2350,Nashua,NH03061-0868

603-885-2621

404-819-0314

apurva.mody@,

apurva_mody@

RangaReddy

USArmy(CERDEC)

Ranga.reddy@us.army.mil

GeraldChouinard

CanadianReseachCounvil

Abstract

ThisdocumentoutlinesthesystemslevelissuesandcommentspertinenttoSection7andSection9relatedto802.22Draftv2.0.

Notice:

ThisdocumenthasbeenpreparedtoassistIEEE802.22.Itisofferedasabasisfordiscussionandisnotbindingonthecontributingindividual(s)ororganization(s).Thematerialinthisdocumentissubjecttochangeinformandcontentafterfurtherstudy.Thecontributor(s)reserve(s)therighttoadd,amendorwithdrawmaterialcontainedherein.

Release:

Thecontributorgrantsafree,irrevocablelicensetotheIEEEtoincorporatematerialcontainedinthiscontribution,andanymodificationsthereof,inthecreationofanIEEEStandardspublication;tocopyrightintheIEEE’snameanyIEEEStandardspublicationeventhoughitmayincludeportionsofthiscontribution;andattheIEEE’ssolediscretiontopermitotherstoreproduceinwholeorinparttheresultingIEEEStandardspublication.ThecontributoralsoacknowledgesandacceptsthatthiscontributionmaybemadepublicbyIEEE802.22.

PatentPolicyandProcedures:

ThecontributorisfamiliarwiththeIEEE802PatentPolicyandProcedures

//standards.ieee.org/guides/bylaws/sb-bylaws.pdf>,includingthestatement"IEEEstandardsmayincludetheknownuseofpatent(s),includingpatentapplications,providedtheIEEEreceivesassurancefromthepatentholderorapplicantwithrespecttopatentsessentialforcompliancewithbothmandatoryandoptionalportionsofthestandard."EarlydisclosuretotheWorkingGroupofpatentinformationthatmightberelevanttothestandardisessentialtoreducethepossibilityfordelaysinthedevelopmentprocessandincreasethelikelihoodthatthedraftpublicationwillbeapprovedforpublication.PleasenotifytheChairasearlyaspossible,inwrittenorelectronicform,ifpatentedtechnology(ortechnologyunderpatentapplication)mightbeincorporatedintoadraftstandardbeingdevelopedwithintheIEEE802.22WorkingGroup.Ifyouhavequestions,contacttheIEEEPatentCommitteeAdministratorat.

SystemsIssuesRelatedtoSecurityin802.22

Comments673and674–ApurvaModyandThomasKiernan

Comment:

802.22shouldn'tmandatefactory-installedprivate/publickeypairs.Operatorsshouldbeabletoself-signtheirowncertificatesandinstallthemforCPEauthorization.

SuggestedRemedy:

Fortextline13-18onpg270,replaceallreferencesto"factory-installed"to"pre-installed".Addthefollowingsentencetotheendoftheparagraph:

"Pre-installedcertificatescouldbegenerated/installedbythemanufacturerortheycouldbe(self-signed)certificatescreatedbytheoperator."

Resolution(ascurrentlydiscussed):

ThiswoulddependontheneedforthedatabaseservicetohaveclearcredentialsforeachCPE.ThedatabaseservicemaynotallowmodificationoftheCPEcredentials.

InitialFeedbackfromSecurityAdhoc:

Securityad-hochastoresolvecomment(s)regardingintroductionofEAPasthemeansforauthentication.EAPisaframeworkthatsupportsvariousEAPmethods.SomeEAPmethodsallowtheoperatortospecifytheirowncredential.Inthiscase,ifanoperatorwantedtousetheirowncredential,theycould.However,thedatabaseservicecouldforceuponoperators,theuseofaspecifictypeofcredentialfordatabaseaccess.

DowewanttohavetosupportmultiplecredentialsonaCPE,onefornetworkauthenticationandonefordatabaseaccessauthentication?

Ideally,theanswerwouldbeaNO,becausehavingtosupporttwocredentialsoverlycomplicatesthestandard.

WecouldusethecredentialthedatabaseserviceaccessrequiresforourownBStoCPEandCPEtoBSnetworkauthentication.Thiswouldsaveustheheadacheofhavingtomaintaintwocredentials.

Withrespecttothecomment,we(inthesecurityad-hoc)feelthatchanging“factory-installed”to“pre-installed”doesn’tchangeanythingorputsusintoapositiontoviolatethenewFCCrulingandthedatabaseinterfacerequirements.Theterm“pre”coversthescopeof“factory”,inbothcasesacredential(iecertificate)isinstalledintheCPEpriortooperation.Shouldthingschange,weshouldmarkissueforreviewduringthesponsorballotphase.

FinalResolution

DecidedduringtheNovember2009FacetoFaceMeeting

Securityad-hocrecommendstheparagraphinSection7.1.3.1shouldreadasfollows–

“AllCPEsusingRSAauthorizationshallhavepre-installedRSAprivate/publickeypairsorprovideamechanismtoinstallsuchkeys.PriortoAKexchange,aCPEshallhaveinstalledRSAkeys,asdescribedin7.2.3.2.AllCPEswithpre-installedRSAkeypairsshallalsohavepre-installedX.509certificates.”

 

Comment356,361,473,474,505,506,508,509(ThiswasdiscussedintheMACad-hocandWendongwouldliketobringthistothesystemsgroup)

Comment:

FromCID356:

“TransmittingCPEMACaddressinRNG-REQviolatestheuser'sprivacyandcanallowmaclicioususerstotrack/monitorandindividual'stransmissions.”

SuggestedRemedy:

Adoptrecommenndationsin22-09-0114-00-0000-privacy-concerns.doc

Resolution(ascurrentlydiscussed):

MalicioususeofMACaddressinRNG-REQmessage.

InitialFeedbackfromSecurityAdhoc:

Generallythesecomments(356,361,473,474,505,506,508,509,687,688,710,712)dealwithasystemprivacyissuethathasbeendiscussedinthesecurityad-hoc.Doc#22-09/0114(orlatestrevision)proposestwoapproachesfortheensuringCPEprivacy.Thead-hocreviewedthisdocumentinthecontextofCID’s687,688,710,and712.Thead-hocdecidedthatApproach1in22-09/0114wasthebetterwaytogo.

Implementationofthecommentresolutionrequiresthefollowing:

1.additionofasectiontoClause7todescribeapproach1from22-09/0114

2.modificationofcertificateprofileinSection7.5toreplaceMACaddressincertificatedefinitionwithFCCIDandSerial#

3.ModificationstoIEsforRNG-REQ/RSP

4.Updatingsometextwithregardtonetworkentryprocedure

CommentStatus:

Securityad-hocthatacountertothosecommentsshouldbemadeandallofthemshouldbesupercededbytheresolutiontoeither687/688or710/712.

 

Deferthiscommentanddiscussfurtherinthetelecons.Invitealltheinterestedparties(e.g.IvanReede)

 

Comment298–GeraldChouinard

Comment:

WhyaretheCBPbursttobeprotected.Aren'ttheybroadcastpacketsbydefinitionforinter-cellcoexistenceamongdifferentWRANcells.Ifthesecellsbelongtothesamenetworkthatneedsprotection,everythingcouldbedoneoverthebackhaul.

SuggestedRemedy:

ReconsidertheneedforsecurityontheCBPburstssinceanyWRANoperatorwillneedtoknowhowtodecodeittoactuponitandthereforewillbeabletomesswithitandchangethetextaccordingly.

Resolution(ascurrentlydiscussed):

ProblemisfrommalicioususerscreatingfalseCBPbursts.SinceanyWRANoperatorwillneedtoknowhowtodecodetheseCBPburststoactuponit,theywillthereforebeableto'messwithit'.WhatistheneedforsecuringtheseCBPburststhen?

Also,theburstsgivingidentityaspertheFCCR&Owouldneedtobeintheclear.Assignedtothesecurityad-hocgroupforresolution.

InitialFeedbackfromSecurityAdhoc:

CurrentlytheCBPburstsaretransmittedintheclear.TheycontainasignatureattheendofthemessagetoensurethattheCBPburstisauthentic–thatis,ithasnotbeenmodified.Currently,theCBPburstauthentication(protection)isoptional.

ThedesiretoprotecttheCBPistokeepmalicioususers/operatorsfrompreventinglegitimateusers/operatorsfromusingavailablechannelandengagingincoexistenceoperations.Thecurrentprocedure(insummary)usesapublickeytosigntheCBPburst,thesignatureisthenaddedtotheCBPburstwhentransmitted.Uponreceptionoftheburst,thereceivingBSwouldusethekeyofthetransmittingBStoverifythesignature(e.g.authenticatethesignature).Ifverificationfails,thentheCBPwouldhavetobedropped.

Signingofthedataburstinvolvesprocessingtheburstthroughsomemathematicalfunction,whosebehavioris“modulated”byaninputkey.Theburstdataitselfisnotmodifiedinanyway.So,usingsignaturesdoesn’thidethedata,likeencryptiondoes.ThismeansthattheburstisstillreadablebythereceivingBS.NowifthereceivingBSdoesn’thavethepublickeyofthetransmittingBSordoesn’tsupporttheCBPauthenticationviasignature,itobviouslycannotverifythesignature.Inthiscase,thereceivingBScanchoosetoeitherignorethesignatureandgoontoprocesstheCBP,orpossiblyexecuteacertificateexchangetogetthetransmittingBS’scertificatesoitcanproperlyverifyCBPburstsinthefuture.

Havingdescribedtheprocedurethatiscurrentlyimplemented,letusdescribesomeoftheotherwaysthaterrorscanbedetectedinpackettransmissionsandprovidesomereasoningastowhythesecurityad-hocchoseits’currentapproach:

1.CyclicRedundancyCheck(CRC)isanon-securemethodtocreateanerror-detectioncode,wherebythedataisdividedbyaknownpolynomial,itgeneratesaCRCvaluethatwouldbeappendedtoapacketduringtransmission.Uponreception,thereceivingnodere-calculatestheCRCvalue,andifthere

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 求职职场 > 简历

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1