WFM
On Feb 3, 2012, at 3:31 PM, <[email protected]> wrote:

> 
> How about the following revised text for Threat 1:
> 
> Threat 1: User modifies a device to masquerade as another valid
>       certified device
> 
>       Regulatory environments require that devices be certified and
>       register in ways that accurately reflect their certification.
>       Without suitable protection mechanisms, devices could simply
>       listen to registration exchanges, and later registering
>       claiming to be those other devices. Such replays would allow
>       fasle registration, violating regulatory regimes.
>       A white space database may be operated by a commercial entity
>       which restricts access to authorized users. A master device
>       needs to identify itself to the database and be authorized to
>       obtain information about available channels.
> 
> 
> 
> 

_______________________________________________
paws mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/paws

Reply via email to