Presentation is loading. Please wait.

Presentation is loading. Please wait.

IEEE P Wireless RANs Date:

Similar presentations


Presentation on theme: "IEEE P Wireless RANs Date:"— Presentation transcript:

1 IEEE P802.22 Wireless RANs Date: 2009-06-22
Month Year doc.: IEEE yy/xxxxr0 June 2009 TV Whitespace Database Architecture, Interface with and Security Mechanisms IEEE P Wireless RANs Date: Authors: Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair Carl R. Stevenson as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE Working Group. If you have questions, contact the IEEE Patent Committee Administrator at Apurva N. Mody, BAE Systems John Doe, Some Company

2 Abstract This presentation focuses on interface to the database,
Month Year doc.: IEEE yy/xxxxr0 June 2009 Abstract This presentation focuses on interface to the database, database overall architecture and security mechanisms between IEEE system and the database. Apurva N. Mody, BAE Systems John Doe, Some Company

3 TV Whitespace Database Architecture
Month Year doc.: IEEE yy/xxxxr0 June 2009 TV Whitespace Database Architecture Station Data Power, protected contour Access to data - information about protected database + un-protected devices Controls the registration of devices Identification info – FCC ID – given by FCC when it passes certification Pre-calculated giant grid = operable channels Repository = Policy Engine???? FCC Database Repository Policy Engine NCMS to PE - Latitude X1 – X2, Longitude Y1 – Y2 PE to NCMS – Available Channels and Coverage TVBD NCMS TVBD NCMS Regulatory Domain ID, location, power, Type of Device, Channel Information BS (Spectrum Manager) CPEs Apurva N. Mody, BAE Systems John Doe, Some Company

4 References June 2009 Month Year doc.: IEEE 802.22-yy/xxxxr0
WRAN Protocol Reference Model – Contribution _WRAN_PRM.ppt A. Mody, R. Reddy, T. Kiernan, M. Sherman, “Protocol Reference Model Enhancements in ”. Security Enhancement for e - A SDD Proposal for m A. Mody, R. Reddy, T. Kiernan and M. Sherman - Recommended Text for Section 7 on Security in  - A. Mody, R. Reddy, T. Kiernan and M. Sherman - Table of Contents for Section 7. A. Mody, R. Reddy, T. Kiernan and M. Sherman - Scope and the Workplan for the Security Ad-Hoc Group –  A. Mody, R. Reddy, T. Kiernan and M. Sherman - PRM and Security Enhancements in – Threat Analysis M. Barbeau, “WiMAX Threat Analysis”, Proceedings of the ACM, Q2SWinet’05, October 13, 2005, Montreal, Quebec, Canada. S. Xu, M. Matthews, “Security Issues in Privacy and Key Management Protocols of ,” Proceedings of the ACM SE’06, March 10-12, 2006, Melbourne, Florida, USA D. Johnston and J. Walker, “Overview of IEEE Security,” IEEE Security and Privacy, Magazine Published by the IEEE Computer Society, 2004 Y. Xiao, X. Shen and D. Du, Wireless Network Security, Springer Series on Signals and Communications Technology, 2006 Qusay H. Mahmoud, Cognitive Networks, Towards Self Aware Networks, Wiley, Sept – Chapter 11, Security Issues in Cognitive Radio Networks Amita Sethi, Potential Denial of Service Threat Assessment for Cognitive Radios, MS Thesis, University of Colorado at Boulder, 2008. Apurva N. Mody, BAE Systems John Doe, Some Company


Download ppt "IEEE P Wireless RANs Date:"

Similar presentations


Ads by Google