22080163220000meetingminutesofthesecurityadhocgroupin80222.docx

上传人:b****6 文档编号:5995155 上传时间:2023-01-02 格式:DOCX 页数:46 大小:37.53KB
下载 相关 举报
22080163220000meetingminutesofthesecurityadhocgroupin80222.docx_第1页
第1页 / 共46页
22080163220000meetingminutesofthesecurityadhocgroupin80222.docx_第2页
第2页 / 共46页
22080163220000meetingminutesofthesecurityadhocgroupin80222.docx_第3页
第3页 / 共46页
22080163220000meetingminutesofthesecurityadhocgroupin80222.docx_第4页
第4页 / 共46页
22080163220000meetingminutesofthesecurityadhocgroupin80222.docx_第5页
第5页 / 共46页
点击查看更多>>
下载资源
资源描述

22080163220000meetingminutesofthesecurityadhocgroupin80222.docx

《22080163220000meetingminutesofthesecurityadhocgroupin80222.docx》由会员分享,可在线阅读,更多相关《22080163220000meetingminutesofthesecurityadhocgroupin80222.docx(46页珍藏版)》请在冰豆网上搜索。

22080163220000meetingminutesofthesecurityadhocgroupin80222.docx

22080163220000meetingminutesofthesecurityadhocgroupin80222

IEEEP802.22

WirelessRANs

MeetingMinutesoftheSecurityAd-HocGroupin802.22

Date:

2009-08-03

Author(s):

Name

Company

Address

Phone

email

ApurvaMody

BAESystems

P.O.Box868,MER15-2350,Nashua,NH03061-0868

603-885-2621

404-819-0314

apurva.mody@,

apurva_mody@

RangaReddy

USArmy(CERDEC)

FtMonmouth,NJ

-

Ranga.reddy@us.army.mil

TomKiernan

USArmy(CERDEC)

FtMonmouth,NJ

-

Thomas.kiernan@us.army.mil

Abstract

ThisdocumentprovidestheminutesoftheSecurityAd-Hocconferencecallsheldon,

Year2008-June6th,June13th,June20th,June27th,July11th,August11th,August18th,August25th,September29th,October6th,October20th,October30th,November3rd,December1st,December8th,December15th

Year2009-February16th,Feb.23rd,April6th,April13thandApril20th,June8th,June15th,June22nd,June29th,July6th.

Notice:

ThisdocumenthasbeenpreparedtoassistIEEE802.22.Itisofferedasabasisfordiscussionandisnotbindingonthecontributingindividual(s)ororganization(s).Thematerialinthisdocumentissubjecttochangeinformandcontentafterfurtherstudy.Thecontributor(s)reserve(s)therighttoadd,amendorwithdrawmaterialcontainedherein.

Release:

Thecontributorgrantsafree,irrevocablelicensetotheIEEEtoincorporatematerialcontainedinthiscontribution,andanymodificationsthereof,inthecreationofanIEEEStandardspublication;tocopyrightintheIEEE’snameanyIEEEStandardspublicationeventhoughitmayincludeportionsofthiscontribution;andattheIEEE’ssolediscretiontopermitotherstoreproduceinwholeorinparttheresultingIEEEStandardspublication.ThecontributoralsoacknowledgesandacceptsthatthiscontributionmaybemadepublicbyIEEE802.22.

PatentPolicyandProcedures:

ThecontributorisfamiliarwiththeIEEE802PatentPolicyandProcedures

//standards.ieee.org/guides/bylaws/sb-bylaws.pdf>,includingthestatement"IEEEstandardsmayincludetheknownuseofpatent(s),includingpatentapplications,providedtheIEEEreceivesassurancefromthepatentholderorapplicantwithrespecttopatentsessentialforcompliancewithbothmandatoryandoptionalportionsofthestandard."EarlydisclosuretotheWorkingGroupofpatentinformationthatmightberelevanttothestandardisessentialtoreducethepossibilityfordelaysinthedevelopmentprocessandincreasethelikelihoodthatthedraftpublicationwillbeapprovedforpublication.PleasenotifytheChairasearlyaspossible,inwrittenorelectronicform,ifpatentedtechnology(ortechnologyunderpatentapplication)mightbeincorporatedintoadraftstandardbeingdevelopedwithintheIEEE802.22WorkingGroup.Ifyouhavequestions,contacttheIEEEPatentCommitteeAdministratorat.

1.June6th2008–SecurityAd-HocConferenceCallMeetingMinutes

1.Attendance

ApurvaMody–BAESystems

GeraldChouinard-CRC

RangaReddy–USArmy

Prof.TimBrown-UnivofColorado,Boulder

BobWalzer–BAESystems

AmitaSethi-UnivofColorado,Boulder

2.1Agenda

∙Attendance

∙ChairaskedifeveryoneattendingwasfamiliarwiththeIEEEpatentpolicy–NooneseemedtobeunfamiliarwiththeIEEEPatentPolicy

ohttp:

//standards.ieee.org/board/pat/pat-slideset.pdf

∙ScopeandtheWorkplanfortheSecurityAd-HocGroup–https:

//mentor.ieee.org/802.22/file/08/22-08-0159-00-0000-scope-agenda-workplan-and-timeline-for-the-security-ad-hoc-in-802-22.doc

∙PresentationonthePRMandSecurityEnhancementsin802.22–802.22ThreatAnalysis

https:

//mentor.ieee.org/802.22/file/08/22-08-0083-03-0000-security-and-prm-enhancements-in-80222-v3.ppt

∙Newbusiness

MinutesandDiscussions

∙TheScopeoftheSecurityAd-Hocin802.22andtheWorkplanascontainedinDocument159-https:

//mentor.ieee.org/802.22/file/08/22-08-0159-00-0000-scope-agenda-workplan-and-timeline-for-the-security-ad-hoc-in-802-22.docwasdiscussed.TheScopeandtheWorkplanwasagreeduponbytheteleconferenceparticipants

Presentationonthe802.22ThreatAnalysiswasmadewhichincludedsuggestedenhancementstotheProtocolReferenceModelaswellastheSecurityin802.22–Thepresentationislocatedat-https:

//mentor.ieee.org/802.22/file/08/22-08-0083-03-0000-security-and-prm-enhancements-in-80222-v3.ppt

∙Thereweremanydiscussionsonthepresentation.Mostpeopleagreedthatduetothespecializedanduniquenatureof802.22systems(Cognitive+LongRange),enhancedsecurityfeaturesareneeded.

∙ThesesecurityfeaturesfortheData/ControlandtheManagementPlanesincludeDataintegrity,Identification,Authentication,Authorization,Confidentiality/Privacy,Non-repudiation,

∙ThesecurityfeaturesfortheCognitivePlaneincludeAuthenticationandAvailability,Authorization,ConfidentialityandPrivacy.

∙ForRegularaswellasCognitiveFunctionality,thethreatmodelwaspresented.

∙Prof.TimBrownsaidthat802.16e-2005standard,whichislikelytobethebaselinestandardfordata/controlandmanagementplaneSecurityfeaturesin802.22isnotenough.Healongwithhisstudentshavecarriedoutextensiveworkonpotentialvulnerabilitiesin802.16e-2005,especiallyduringthestart-upandinitializationprocess.Hesuggestedthatalongwiththeftofinformation,selectivetargetedjammingisamajorconcern.TheChairspointedtothelastsectionofthepresentation(Doc83,Rev3)whichraisedthisissueaswell.GeraldChouinardandWinstonCaldwellsuggestedthatduetotheuniquenatureof802.22weshouldtrytoaddressboththeftofinformationandselectivejammingineithernormativeorinformativetext.ChrisClantonagreed.

∙Thethreatsforcognitivefunctionalitywerepresented.TheyincludedIncumbentre-playattacks,Incumbentghosting,Geolocationfalsification,Co-existence(CBPPacket)falsification,IncumbentDenialofService(DoS),WRANDoS,Spuriousquietperiodtransmission,Spurioustransmissionasaresultofhardwaredefectsandaging,Spectrummanagermisconfigurationortampering.

∙Thegroupagreedthatthesewereindeedveryvalidthreatsandneededtobeaddressed.GeraldChouinardpointedoutthatlikelihoodofIncumbentghostingwashigherthatwhatwasshowninthepresentation

∙Prof.TimBrownpointedtotheMastersThesisworkcarriedoutbyhisstudentonDoSThreatstoCognitiveRadios.Hesaidthatthereweremorethreatspossiblethanwhatwasshowninthepresentation.

∙Prof.TimBrownsaidthatinnewerversionsoftheCDMAsystems,ifadeviceisoutofspec.thenitisaskedtoshutdownbytheBaseStation.Similarapproachcanbefollowedin802.22.TheChairspointedoutthatthisneedstobecarriedoutforspurioustransmissionsinquietperiodsaswellasspurioustransmissionsduetohardwaredefectsoraging.Thismayalsoneedanoptionaluseofaterrestrialgeolocationsystemtotriangulatethemaliciousdevice.

∙TheChairssuggestedthattheywillbeformulatingtheTableofContentsfortheupcomingconferencecallsandseekforcontributions.

2.June13th2008–SecurityAd-HocConferenceCallMeetingMinutes

1.Attendance

ApurvaMody–BAESystems

ShukriWakid–BAESystems

BobWalzer–BAESystems

ChrisClanton–Shure

RangaReddy–USArmy

TimBrown–Univ.ofColorado

GeraldChouinard–CRC

AmitaSethi-

2.1Agenda

∙Attendance

∙ChairaskedifeveryoneattendingwasfamiliarwiththeIEEEpatentpolicy–NooneseemedtobeunfamiliarwiththeIEEEPatentPolicy

ohttp:

//standards.ieee.org/board/pat/pat-slideset.pdf

∙DiscusssiononTableofContentsforSection7.Thereferencedocumentfortheproposedtextcanbefoundat

https:

//mentor.ieee.org/802.22/file/08/22-08-0165-00-0000-table-of-content-for-the-security-section-in-802-22.doc

∙RefereenceDocument-ScopeandtheWorkplanfortheSecurityAd-HocGroup–https:

//mentor.ieee.org/802.22/file/08/22-08-0159-00-0000-scope-agenda-workplan-and-timeline-for-the-security-ad-hoc-in-802-22.doc

∙ReferenceDocument-PresentationonthePRMandSecurityEnhancementsin802.22–802.22ThreatAnalysis

https:

//mentor.ieee.org/802.22/file/08/22-08-0083-04-0000-security-and-prm-enhancements-in-80222-v3.ppt

∙Newbusiness

MinutesandDiscussions

∙RangaReddyandApurvaModypresentedtheproposedtextfortheTableofContentsinSection7ascontainedintheDocumenthttps:

//mentor.ieee.org/802.22/file/08/22-08-0165-00-0000-table-of-content-for-the-security-section-in-802-22.doc

∙GeraldChouinardhadsomequestionsonthearrangementsoftheTableofContent.Thequestionswereclarified.

∙AfterthatthereweresomefurtherdiscussionsontheThreatModelfor802.22aspresentedinDocument

https:

//mentor.ieee.org/802.22/file/08/22-08-0083-04-0000-security-and-prm-enhancements-in-80222-v3.ppt

∙ChrisClantonaskedifthethreatfromincumbentspoofingandreplayattackswasthesameforDTVaswellasMicrophone–ThegeneralfeelingwasthatifTG1beaconwasusedthentheriskfromthisspecificthreatwouldbeloweredduetothesecurityfeaturescontainedinthebeaconingmechanism.

∙GeraldChouinardaskediftheSecuritySublayer3intheproposedPRMascontainedinDocument83,Rev4hadanyotherfunctionbesidesauthenticatingtheTG1beacon.ApurvaModyansweredthatitsfunctionalityandsecuritymechanismsneedtobedefinedbasedondiscussionswithintheSecurityAd-Hocgroup

∙GeraldChouinardhadsomequestionsonhowCPESpursandDTVreplayattackscouldbehandledusingtheSecuritySublayeraswasshowninthePresentationDocument83.HesuggestedthattheintelligenceondecisionmakingshouldresideintheBaseStationonly.ApurvaModysaidthatifCPEsaresemi-autonomousasweares

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 自然科学

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1