Download presentation
Presentation is loading. Please wait.
Published byMatilda Cole Modified over 6 years ago
1
Security and the Protocol Reference Model Enhancements in IEEE 802.22
Month Year doc.: IEEE yy/xxxxr0 August 2008 Security and the Protocol Reference Model Enhancements in IEEE IEEE P Wireless RANs Date: Authors: Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair Carl R. Stevenson as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE Working Group. If you have questions, contact the IEEE Patent Committee Administrator at Apurva N. Mody, BAE Systems John Doe, Some Company
2
Month Year doc.: IEEE yy/xxxxr0 August 2008 Abstract This presentation focuses on Protocol Reference Model (PRM) and Security enhancements in PRM Enhancements - The Spectrum Manager in the current PRM (802.22_Draftv1.0) resides in the MLME. MLME will eventually be replaced by the Management Information Base (MIB). The current draft does not specify where the Security Sublayers reside and what their functions should be. No security mechanisms are provided for functions such as spectrum availability, authentication, authorization, identification, confidentiality and privacy. IEEE based networks are susceptible to enhanced security threats since they are likely to operate in un-licensed bands with cognitive radio techniques. Remote CPE management is not possible using the current PRM architecture. Hence, in order to overcome the shortfalls mentioned above, we propose a Modification to the PRM which separates the Cognitive Plane from the Data, Control and Management planes, allowing functionality specific attributes to be defined for each plane. The Data/ Control and Management Plane functionality remains unchanged. The Cognitive Plane consists of the Spectrum Sensing Function, the Geolocation function and the Spectrum Manager / Spectrum Automaton with its own security features. Security Enhancements - Threat model is laid out for the data / control and management functions as well as the cognitive functions of The threat analysis is carried out based on the criteria of likelihood, impact and risk Various remediation measures for the identified threats will be proposed in the near future. Apurva N. Mody, BAE Systems John Doe, Some Company
3
The IEEE 802.11 (1999) Protocol Reference Model (PRM)
August 2008 The IEEE (1999) Protocol Reference Model (PRM) The current PRM is based on the IEEE Standard This figure shows the IEEE PRM. This standard was published in 1999. Apurva N. Mody, BAE Systems
4
The IEEE 802.16 (2008) Protocol Reference Model (PRM)
August 2008 The IEEE (2008) Protocol Reference Model (PRM) This figure shows the IEEE PRM which is as shown It makes sense that the IEEE PRM be similar to the IEEE PRM due to their closeness in functional attributes IEEE g document defines the Management Information Base (MIB) and the Management Plane procedures for IEEE Following the model will allow to borrow the functions, definitions, primitives and descriptions of the MIBs which are already defined in the g Document, thus accelerating the standard development process. Apurva N. Mody, BAE Systems
5
August 2008 Shortfalls of the Current BS/ CPE Protocol Reference Model (PRM) In the current PRM, (802.22_Draftv1.0) Spectrum Manager resides in the MLME. MLME would be eventually replaced by the MIB. Spectrum Manager is a live entity whereas MIB is not. Information from the SSF and Geolocation is not provided to the SM directly. Remote CPE Management is not possible – System interface to manage the MLME / PLME are not defined. No security functionalities are specified for data / control, management and cognitive functions Security functions include availability, authentication, authorization, integrity, confidentiality and privacy, non-repudiation Apurva N. Mody, BAE Systems
6
August 2008 Proposed Cognitive Radio PRMs for (Outcome from the Security Ad-Hoc Meetings) PRM (BS) PRM (CPE) Apurva N. Mody, BAE Systems
7
Features of the Proposed Cognitive Radio PRM for 802.22
August 2008 Features of the Proposed Cognitive Radio PRM for Separates the Cognitive Plane from the Data, Control and Management planes, allowing functionality specific attributes to be defined for each plane. The Data/ Control and Management Plane functionality remains unchanged. The Cognitive Plane consists of the Spectrum Sensing Function, the Geolocation function and the Spectrum Manager / Spectrum Automaton. Spectrum Manager resides in the Cognitive Plane at the same layer as the MAC in the Data/ Control Plane. Spectrum manager interfaces directly with the Spectrum Sensing and the Geolocation functions. Modular security features may be added to incorporate availability, authentication, authorization, identification, confidentiality and privacy. Remote CPE management is possible through the Network Control and Management System (NCMS). The proposed PRM defines the Management Information Base (MIB) which makes a more complete and comprehensive standard. M-SAP (Management SAP) and C-SAP (Control-SAP) are the formal interfaces between NCMS and entity. The functions, definitions, primitives and descriptions of these SAPs can be directly obtained from the IEEE g Standard (Some modifications may be needed for ) Apurva N. Mody, BAE Systems
8
August 2008 Proposed Cognitive Radio PRMs for – PRM for the BS (Outcome from the Security Ad-Hoc Meetings) Additional Features of the proposed PRM - BS Connection B2 is used for configuration of the Spectrum Manager at the BS as well as to convey and report the environment monitoring information via the MIBs Connection B1 is used to Send commands and information to the CPEs (e. g. candidate and back-up channel sets, channels to be sensed etc.) Receive information from various CPEs (e. g. local sensing information.) Apurva N. Mody, BAE Systems
9
August 2008 Proposed Cognitive Radio PRMs for (Outcome from the Security Ad-Hoc Meetings) Additional Features of the proposed PRM - BS Connection C2 is used to convey the environment monitoring information via the MIBs to the user. C2 can not be used for configuration of the Spectrum Automaton (SA). SA can only be configured by a BS command using the Connection C1. C1 is also used to transmit the local environment information such as sensing and geolocation to the BS. MIB at the CPE will be a subset of MIB at the BS Apurva N. Mody, BAE Systems
10
The Concept of Managed CPEs Once MIBs have been Defined
August 2008 The Concept of Managed CPEs Once MIBs have been Defined Apurva N. Mody, BAE Systems
11
Cognitive Radio PRM with Security Sub-Layer Modularization
August 2008 Cognitive Radio PRM with Security Sub-Layer Modularization A cognitive communications device must include security and authentication features for the Cognitive Plane, in addition to the Data and Control / Management Planes A Cognitive Plane consists of the Spectrum Sensing Function, the Geolocation Function and the Spectrum Manager The proposed PRM creates Two Security Sub-layers with dedicated and modular security functionality. The detailed functionality of each of the layers needs to be defined (Security Ad-Hoc) Apurva N. Mody, BAE Systems
12
August 2008 Functions of the Security Sublayers for Data / Control and the Management Planes The security sublayers for the Data / Control and the Management Planes provide Data integrity Ensures integrity of the data Identification Association of a valid identity to the user / device Authentication Assurance that the communicating entity is who it claims to be Authorization Who can use the network resources Confidentiality / Privacy Protection of data from eavesdropping Non-repudiation Prevention of sender / receiver from denying that the message was transmitted. Apurva N. Mody, BAE Systems
13
M. Barbeau, “WiMAX Threat Analysis,” Q2SWinet, 2005
August 2008 – Data. Control and Management Plane Threat Definition Attack Likelihood, Impact and Risk M. Barbeau, “WiMAX Threat Analysis,” Q2SWinet, 2005 Apurva N. Mody, BAE Systems
14
802.22 – Data. Control and Management Plane Threat Definition
August 2008 – Data. Control and Management Plane Threat Definition M. Barbeau, “WiMAX Threat Analysis,” Q2SWinet, 2005 Apurva N. Mody, BAE Systems
15
802.22 – Data. Control and Management Threat Remediation
August 2008 – Data. Control and Management Threat Remediation CPE M. Barbeau, “WiMAX Threat Analysis,” Q2SWinet, 2005 Apurva N. Mody, BAE Systems
16
Chapter 11, Security Issues in Cognitive Radio Networks
August 2008 Functions of the Security Sublayers for Cognitive Plane and the Co-Existence Information The security sublayers for the Cognitive Plane provide Authentication and Availability Ensures availability of the spectrum for the primary (incumbents) and the secondary (WRAN) users – detects and avoids DoS Assurance that the communicating entity is who it claims to be Authentication of the incumbent signals and the TG1 beacons Authentication of the geolocation information Authentication of the co-existence information Authentication of a WRAN system Detection and reporting of spurious transmissions from other CPEs Authorization - Only the authorized parties are allowed to configure the spectrum manager / spectrum automaton Configuration information is identified with a valid user. Confidentiality / Privacy Protection of competitive spectrum availability information from eavesdropping Qusay H. Mahmoud, Cognitive Networks, Towards Self Aware Networks, Wiley, Sept – Chapter 11, Security Issues in Cognitive Radio Networks Apurva N. Mody, BAE Systems
17
802.22 – Cognitive Plane and Co-Existence Threat Definition
August 2008 – Cognitive Plane and Co-Existence Threat Definition Apurva N. Mody, BAE Systems
18
August 2008 Security Sublayer3 - Suggested Security and Authentication Features for Spectrum Sensing – Authenticating the TV Signals NTSC, ATSC DTV and DVB-T signals must be authenticated to avoid unwanted Denial of Service (DoS) attacks Authentication of the NTSC, ATSC DTV and DVB-T signals may be carried out using Multiple sources for confirmation such as sensing and the incumbent database, and / or Sensing using multiple cognitive devices and / or Sensing for a long continuous period of time to ensure that the signal is indeed originating from a valid source. Apurva N. Mody, BAE Systems
19
August 2008 Security Sublayer1, 3 - Suggested Security and Authentication Features for Spectrum Sensing – Authenticating Wireless Microphones and TG1 Beacons Signals originating Wireless Microphones and TG1 Beacons must be authenticated to avoid unwanted Denial of Service (DoS) attacks Authentication of the SPDs such as wireless microphone signals may be carried out At the Security Sub-layer in the Cognitive Plane using the security features embedded in the TG1 beaconing signal Multiple sources such as beacon sensing and the incumbent database, and / or Beacon sensing using multiple cognitive devices and / or Control information handshake between the cognitive device and the PPD / SPD / NPD. Apurva N. Mody, BAE Systems
20
August 2008 Security Sublayer3 - Suggested Security and Authentication Features for Spectrum Sensing – Authenticating WRAN Discovery WRAN discovery must be authenticated using Capture of a valid Superframe Control Header (SCH) Three-way confirmation handshake with the WRAN that is currently occupying the current channel Authentication of a CBP Periodic updates and refresh to ensure continued usage Local (country dependent) database Apurva N. Mody, BAE Systems
21
August 2008 Security Sublayer3 - Suggested Security and Authentication Features for Geolocation – Authenticating Geolocation Info. The geolocation information must be authenticated for its validity. The geolocation authentication may be device and / or algorithm dependent The underlying signals used as a reference for geolocation must be authenticated. Authentication features for both the Global Positioning System (GPS) based geolocation as well as other terrestrial based geolocation should be clearly defined in the standard. An example of a GPS jammer powered using a car charger – available on the market Apurva N. Mody, BAE Systems
22
August 2008 Security Sublayer4 - Suggested Security and Authentication Features between the Spectrum Manager – MAC Common Part Sublayer Interface The interface diagram shows a modular format with the data / control plane and the cognitive plane. The Spectrum Manager is susceptible to mis-configuration though the SME, if no security mechanisms (Security Sublayer 4) are provided. Hence, the SM configuration information coming through the SME needs to be authenticated. The information provided to the SM from the incumbent database must be authenticated The information provided by the spectrum manager to the MAC Common Part Sublayer must be authenticated and protected through various security and privacy features. The sensing and geolocation information transmitted to various other devices in the network must be encrypted. Apurva N. Mody, BAE Systems
23
August 2008 Security Sublayers1,2 - Other Security, Authentication and Privacy Features Recommended for Management message protection (encryption and integrity protection) MAC header protection (encryption and integrity protection) Key management enhancement with secure and efficient key establishments and distribution Certificate revocation enhancement Mitigations of network attacks including authentication attacks (BS and SS impersonations and passive eaves dropping attack), replay attacks (key reuse attack), denial of service (packet forgery), weak key attack, and man-in-the-middle-attack Apurva N. Mody, BAE Systems
24
Additional Security at Various Stages of the Network Entry in 802.22
August 2008 Additional Security at Various Stages of the Network Entry in Authentication, security association, enabling the MAC management message transmission, and establishment of traffic encryption keys (PKM-REQ/PKM-RSP) The SS searches the preamble; once found, it decodes the Frame Control Header (FCH) Once the DL is synchronized, the SS decodes MAP/DCD and MAP/UCD to learn the timing of the UL initial ranging (contention) slot and the DL/UL transmission parameters. DL/UL-MAP goes in every frame to inform and schedule SSs. (REG-REQ/REG-RSP) The SS acquires an IP address. The establishment of IP connectivity shall be performed on the SS's Secondary Management Connection (SMC). Ranging (RNG-REQ/RNG-RSP) is to obtain correct frequency offset, timing and power adjustments The SS negotiates the following capabilities (SBC-REQ/SBC-RSP) with the BS: Max. transmit power, modulation/coding schemes, H-ARQ using management connections. Set up transport connections that will carry e.g. IP traffic (DSA-REQ/DSA-RSP/DSA-RVD) MAP contains allocation for both initial ranging and periodic ranging. SBC: SS Basic Capability DCD: DL channel descriptor UCD: UL channel descriptor Apurva N. Mody, BAE Systems
25
Security at Various Stages of the Network Entry in 802.22
August 2008 Security at Various Stages of the Network Entry in MAP and FCH can be protected This is optional Use the pre-shared key (via vendor or user certificate) Once the pre-shared key is installed, the user is able to scan the DL If you do not do this step initially, follow default. No need to protect RNG-REQ - Signatures may be used to protect malicious flooding attack Need to protect RNG-RSP since the basic CID and primary management uniquely identify the station No need to protect SBC-REQ - Signatures may be used to protect malicious flooding attack Need to protect SBC-RSP since it carries basic CID No change for authentication since the contents of PKM are protected No change for registration since the contents of REG are protected DSA messages are required for path set up and admission control DSA messages can be protected The MAC header has only CRC – MAC headers need to be protected Periodic ranging needs to be protected in the same manner as the initial ranging Apurva N. Mody, BAE Systems
26
Month Year doc.: IEEE yy/xxxxr0 August 2008 Conclusions This presentation focused on Protocol Reference Model (PRM) and Security enhancements in The new proposed PRM - Separates the Cognitive Plane from the Data, Control and Management planes, allowing functionality specific attributes to be defined for each plane. The Data/ Control and Management Plane functionality remains unchanged. The Cognitive Plane consists of the Spectrum Sensing Function, the Geolocation function and the Spectrum Manager / Spectrum Automaton. Spectrum Manager resides in the Cognitive Plane at the same layer as the MAC in the Data/ Control Plane. Spectrum manager interfaces directly with the Spectrum Sensing and the Geolocation functions. Modular security features may be added to incorporate availability, authentication, authorization, identification, confidentiality and privacy. Remote CPE management is possible through the Network Control and Management System (NCMS) Management Information Base (MIB) is added to make a more complete and comprehensive standard. Security Enhancements - Threat model is laid out for the data / control and management functions as well as the cognitive functions of The threat analysis is carried out based on the criteria of likelihood, impact and risk Various remediation measures for the identified threats will be proposed in the near future. Apurva N. Mody, BAE Systems John Doe, Some Company
27
August 2008 References WRAN Protocol Reference Model – Contribution _WRAN_PRM.ppt A. Mody, R. Reddy, T. Kiernan, M. Sherman, “Protocol Reference Model Enhancements in ”. Security Enhancement for e - A SDD Proposal for m A. Mody, R. Reddy, T. Kiernan and M. Sherman - Recommended Text for Section 7 on Security in - A. Mody, R. Reddy, T. Kiernan and M. Sherman - Table of Contents for Section 7. A. Mody, R. Reddy, T. Kiernan and M. Sherman - Scope and the Workplan for the Security Ad-Hoc Group – A. Mody, R. Reddy, T. Kiernan and M. Sherman - PRM and Security Enhancements in – Threat Analysis M. Barbeau, “WiMAX Threat Analysis”, Proceedings of the ACM, Q2SWinet’05, October 13, 2005, Montreal, Quebec, Canada. S. Xu, M. Matthews, “Security Issues in Privacy and Key Management Protocols of ,” Proceedings of the ACM SE’06, March 10-12, 2006, Melbourne, Florida, USA D. Johnston and J. Walker, “Overview of IEEE Security,” IEEE Security and Privacy, Magazine Published by the IEEE Computer Society, 2004 Y. Xiao, X. Shen and D. Du, Wireless Network Security, Springer Series on Signals and Communications Technology, 2006 Qusay H. Mahmoud, Cognitive Networks, Towards Self Aware Networks, Wiley, Sept – Chapter 11, Security Issues in Cognitive Radio Networks Amita Sethi, Potential Denial of Service Threat Assessment for Cognitive Radios, MS Thesis, University of Colorado at Boulder, 2008. Apurva N. Mody, BAE Systems
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.