<as individual>
Where do you see this assumption in the threat model?

I took a quick look and didn't spot it.  It would be "database information 
leaked to bad guys" or something like it, right?

I don't think that is a threat, and I don't think we need to protect anyone 
from that threat.

I would say, however, that if you could know the content of the database, and 
you can observe a responses over a period of time, you may be able to infer the 
location of the querier.

Brian


On Feb 3, 2012, at 2:51 PM, Joel M. Halpern wrote:

> Can we please include in this document some articulation of the 
> confidentiality assumption we are making with regard to the whitespace 
> data itself?  I am not trying to object to the threats.  (And the 
> personal information collection issues are enough to jsutify include 
> confidentiality mechanisms in the solutions.)
> But I am still trying to get my head around this.  There are going to be 
> hoards of whitespace devices.  They will be getting the data, and either 
> using it themselves or retransmitting it.  The resulting data one 
> whitespace availability will be visible to people and or devices which 
> are not completely controlled by the regulatory agencies.
> As such, what is the role of confidentiality with regard to this 
> information?
> 
> Yours,
> Joel
> 
> On 2/3/2012 2:34 PM, [email protected] wrote:
>> 
>> Below is Rev 3 of the threat model based on feedback from Stephen, Nancy
>> and Gabor (Thanks).
>> 
>> -Raj
>> 
>> 
>> Rev 3 (3/2/12)
>> 
>> Threat model for the PAWS protocol
>> ----------------------------------
>> 
>> Assumptions:
>> ............
>> 
>> o It is assumed that an attacker has full access to the network medium
>>   between the master device and the white space database. The attacker
>>   may be able to eavesdrop on any communications between these
>>   entities. The link between the master device and the white space
>>   database can be wired or wireless and provides IP connectivity.
>> 
>> o It is assumed that the master device or the white space database
>>   have NOT been compromised from a security standpoint.
>> 
>> Threat 1: User modifies a device to masquerade as another valid
>>        certified device
>> 
>>        The master device needs to authenticate itself with the white
>>        space database prior to requesting channel information. The
>>        attacker may try to get access to the secrets of the master
>>        device which can be used maliciously. The effect of such an
>>        attack being successful would result in a malicious client
>>        replaying the stolen authentication/authorization secrets to a
>>        white space database.
>> 
>> Threat 2: Spoofed white space database
>> 
>>        A master device discovers a white space database(s) thru which
>>        it can query for channel information. The master device needs
>>        to ensure that the white space database with which it
>>        communicates with is an authentic entity. The white space
>>        database needs to provide its identity to the master device
>>        which can confirm the validity/authenticty of the database. An
>>        attacker may attempt to spoof a white space database and
>>        provide responses to a master device which are malicious and
>>        result in the master device causing interference to the primary
>>        user of the spectrum.
>> 
>> Threat 3: Modifying a query request
>> 
>>        An attacker may modify the query request sent by a master
>>        device to a white space database. The attacker may change the
>>        location of the device or the capabilities in terms of its
>>        transmit power or antenna height etc. which could result in the
>>        database responding with incorrect information about available
>>        channels or max transmit power allowed. The result of such an
>>        attack is that the master device would cause intereference to
>>        the primary user of the spectrum. It could also result in a
>>        denial of service to the master device by indicating that no
>>        channels are available.
>> 
>> Threat 4: Modifying a query response
>> 
>>        An attacker could modify the query response sent by the white
>>        space database to a master device. The channel information or
>>        transmit power allowed type of parameters carried in the
>>        response could be modified by the attacker resulting in the
>>        master device using channels that are not available at a
>>        location or transmitting at a greater power level than allowed
>>        resulting in interference to the primary user of that
>>        spectrum. Alternatively the attacker may indicate no channel
>>        availability at a location resulting in a denial of service to
>>        the master device.
>> 
>> Threat 5: Unauthorized use of channels by an uncertified device
>> 
>>        An attacker may be a master device which is not certified for
>>        use by the relevant regulatory body. The attacker may listen to
>>        the communication between a valid master device and white space
>>        database and utilize the information about available channels
>>        in the response message by utilizing those channels. The result
>>        of such an attack is unauthorized use of channels by a master
>>        device which is not certified to operate.
>>        The master device querying the white space database may be
>>        operated by a law-enforcement agency and the communications
>>        between the device and the database are intended to be kept
>>        private. A malicious device should not be able to eavesdrop on
>>        such communications.
>> 
>> Threat 6: Third party tracking of white space device location and identity
>> 
>>        A white space database may require a master device to provide
>>        its identity in addition to its location in the query request.
>>        Such location/identity information can be gleaned by an
>>        eavesdropper. A master device may prefer to keep the
>>        location/identity information secret. Hence the protocol should
>>        provide a means to protect the location and identity
>>        information of the master device and prevent tracking of
>>        locations associated with a white space database. If
>>        regulations do not require the identity of the master device to
>>        be provided to the white space database, the master is not
>>        required to include its identity in the query.
>> 
>> 
>> Threat 7: Termination of device service for reasons other than
>>        incumbent protection
>> 
>>        A white space database may include a mechanism by which service
>>        and channels allocated to a master device can be revoked. A
>>        malicious node can send a revoke message to a master
>>        device. This results in denial of service to the master
>>        device.
>> 
>> 
>> _______________________________________________
>> paws mailing list
>> [email protected]
>> https://www.ietf.org/mailman/listinfo/paws
>> 
> _______________________________________________
> paws mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/paws

_______________________________________________
paws mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/paws

Reply via email to