Presentation is loading. Please wait.

Presentation is loading. Please wait.

Doc.: IEEE 802.15-xxxxx Submission doc. : IEEE 802. 15-13-0010-00-0008 Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P802.15.

Similar presentations


Presentation on theme: "Doc.: IEEE 802.15-xxxxx Submission doc. : IEEE 802. 15-13-0010-00-0008 Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P802.15."— Presentation transcript:

1 doc.: IEEE 802.15-xxxxx Submission doc. : IEEE 802. 15-13-0010-00-0008 Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Suggested Changes to TGD Security Section] Date Submitted: [Jan, 2013] Source: [Junbeom Hur, Sungrae Cho] Company [Chung-Ang University, Korea] E-Mail:[jbhur@cau.ac.kr, srcho@cau.ac.kr] Re: [Technical Guidance for 802.15.8 Proposals] Abstract:[This documents presents some clarifications and elements that are missing from the TGD] Purpose:[To expedite completion of the TGD] Notice:This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release:The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15. Jan 2013

2 doc.: IEEE 802.15-xxxxx Submission doc. : IEEE 802. 15-13-0010-00-0008 Purpose Suggestion to add some comments to TGD (802.15-12-0568-01-0008) Security Section 6.13 Jan 2013 Slide 2 Junbeom Hur and Sungrae Cho, Chung-Ang University

3 doc.: IEEE 802.15-xxxxx Submission doc. : IEEE 802. 15-13-0010-00-0008 Suggested comments The IEEE 802.15.8 shall include security functions that provide necessary means to achieve authentication, authorization, and encryption against passive and active attacks. a key management protocol that provides efficient means to derive secret keys by a user, or establish private keys or group keys among the devices. multiple levels of security modes depending on security requirements of services. necessary means for users to choose specific security algorithms on the basis of the security and efficiency requirements of the services. Junbeom Hur and Sungrae Cho, Chung-Ang University Slide 3 Jan 2013


Download ppt "Doc.: IEEE 802.15-xxxxx Submission doc. : IEEE 802. 15-13-0010-00-0008 Slide 1 Junbeom Hur and Sungrae Cho, Chung-Ang University Project: IEEE P802.15."

Similar presentations


Ads by Google