Date post: | 25-Dec-2015 |
Category: |
Documents |
Upload: | gladys-rogers |
View: | 213 times |
Download: | 0 times |
Sept 2005
Rick Roberts, Harris CorporationSlide 1
IEEE 15-05-0511-00-wgn0
Submission
Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)
Submission Title: [Security via Spread Spectrum]Date Submitted: [Sept 2005]Source: [Rick Roberts] Company [Harris Corporation]Address [Melbourne, Fl]Voice:[321-729-3018], FAX: [], E-Mail:[[email protected]]
Re: []
Abstract: []
Purpose: []
Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein.Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15.
Sept 2005
Rick Roberts, Harris CorporationSlide 2
IEEE 15-05-0511-00-wgn0
Submission
Wireless Next Generation – an open forum for the presentation and
discussion of next generation ideas.
Sept 2005
Rick Roberts, Harris CorporationSlide 3
IEEE 15-05-0511-00-wgn0
Submission
Security via Spread Spectrum(Lowering the Probability of Detection)
Sept 2005
Rick Roberts, Harris CorporationSlide 4
IEEE 15-05-0511-00-wgn0
Submission
Introduction
With the activity in 802.15.4a, we are starting to see the emergence of a spread spectrum waveform with significant processing gain.
802.11 802.15.1 802.15.3a 802.15.4a
Spreading Ratio
20:1 79:1 4:1 5000:1
Processing Gain
13 dB 19 dB 6 dB 37 dB
This paper suggests that perhaps we can use this excess processing gain to start applying security at the PHY level in the form of lowering the probability of detection.
Sept 2005
Rick Roberts, Harris CorporationSlide 5
IEEE 15-05-0511-00-wgn0
Submission
Need for Security
How important is the security issue to potential markets?
• 802.11 – WEP failed to satisfy market needs and a task group was formed to address security issues
• Bluetooth/802.15.1 – Security continues to be an on-going concern
• 802.15.4b – Security is being addressed
• others …
Any successful market deployment will eventually have to address security concerns. Historically this has been the case.
The question is “can processing gain be leveraged to enact another security layer and is there a market need for PHY layer security”? I believe the answer is “yes” to both questions.
Sept 2005
Rick Roberts, Harris CorporationSlide 6
IEEE 15-05-0511-00-wgn0
Submission
Review of 802.15.4a CFA
I believe the market need for PHY layer security can be established by reviewing the history of applications and contributions presented to 802.15.4a
From document 15-03-0537-00-004a (presented September 2003) …
Sept 2005
Rick Roberts, Harris CorporationSlide 7
IEEE 15-05-0511-00-wgn0
Submission
Track Firefighter Status
Houghton- Aetherwire
Sept 2005
Rick Roberts, Harris CorporationSlide 8
IEEE 15-05-0511-00-wgn0
Submission
Security
• Workstation locks when user goes out of range
• Automobile unlocks when driver comes within range- supports cars of the future
• Authentication based on precise location– Point of sale– Wireless Ethernet users
Ellis- General Atomics
Sept 2005
Rick Roberts, Harris CorporationSlide 9
IEEE 15-05-0511-00-wgn0
Submission
Opportunity to Establish a Technological Foundation for Wireless Child Localization
IEEE 802.15.4High
PrecisionLocalization
Other Enabling Technologies
IEEE 802.15.4 High Precision Localization
• Availability of Location Data to Upper Layers• Adaptable Physical Layer• Extend to Business Environment
Standardized Child Tracking Can Be Extended to Wider Area Coverage Incorporating Interoperability and Compatibility
Near - TermNear - Term Future - TermFuture - Term
Brooks- LB&A Consulting
Sept 2005
Rick Roberts, Harris CorporationSlide 10
IEEE 15-05-0511-00-wgn0
Submission
Location Aware Application
Application Loc. finding importance
Few bits comm. importance
True comm. importance
Comments
Healthcare inventory tracking
Critical Important Nice to have
Healthcare – people tracking
Critical Important Nice to have
Workforce - people tracking
Critical Important Not important
Kareev- Pulsicom
Sept 2005
Rick Roberts, Harris CorporationSlide 11
IEEE 15-05-0511-00-wgn0
Submission
Distance-aware Application
• The feature that low-cost UWB devices can precisely measure the distance between the two communication parties can promote the following example applications:– To prevent children from walking away from parents;– Shutdown TVs when kids move too close to the them;– To prevent the lost of key chains, wallets or other luxury
accessories;– Automatically turn on/off the light or other devices when
people enter/leave the room, garage and etc.– Wireless Tape Measure: measuring distance using UWB
devices (convenient and saves man power)!
Kwon- Samsung/CUNY
Sept 2005
Rick Roberts, Harris CorporationSlide 12
IEEE 15-05-0511-00-wgn0
Submission
Application 3 Requirement• Locate and identify devices/people within an area• Communicate sensor information• Over time (autonomy must last for months, devices can
be re-energized)• A device (com. +loc.+energy) is some $, can be much
more with certain kinds of sensorsExample: 1. For tracking and safety purposes in large communities
environments such as schools and hospitals (large range, medium or large population)
2. For preventive medicine , health monitoring and health therapy purposes. Typically Body Area Networks
Rouzet- STMicroelectronics
Sept 2005
Rick Roberts, Harris CorporationSlide 13
IEEE 15-05-0511-00-wgn0
Submission
Package Tracking• Currently, mostly bar-codes are used, requiring visual
contact with the tracked item, creating not only an accessibility issue but also consumes time.
• Solving these issues is worth the added cost of a wireless-label (assuming a very low cost solution, e.g. sub $2).
• UWB based identification could offer the advantages of:– Shorter reading time (a whole truck could be read in seconds)– No need for line of sight within a reasonable range – Automatic warning provided by the tracking system whenever
a package is being loaded on a truck/container heading towards the wrong destination, or when a package is mistakenly offloaded
– Locating a package within the truck/container/warehouse
Eliezer- InfoRange
Sept 2005
Rick Roberts, Harris CorporationSlide 14
IEEE 15-05-0511-00-wgn0
Submission
Real Time Location Systems (RTLS)CORE RTLS Applications Range Accuracy
High value inventory items (warehouses, ports, motor pools, manufacturing plants)
100-300 m 30-300 cm
Sports tracking (NASCAR, horse races, soccer) 100-300 m 10-30 cm
Cargo tracking at large depots to including port facilities
300 m 300 cm
Vehicles for large automobile dealerships and heavy equipment rental establishments
100-300 m 300 cm
Key personnel in office / plant facility 100-300 m 15 cm
Children in large amusement parks 300 m 300 cm
Pet/cattle/wild life tracking 300 m 15-150 cm
Siwiak- TimeDerivative
Sept 2005
Rick Roberts, Harris CorporationSlide 15
IEEE 15-05-0511-00-wgn0
Submission
Security Applications• Enhancing CCTV coverage
– Activity-based video stream selection
• Daytime intruder detection– Correlate data from active tracking and passive
(IR, weight, radar) sensors
• Visitor management– Enforcing restricted zones and escort policies
• Asset tracking
• Automatic ‘man-down’ detection
Demand now: Defense contractors, gemstone processing facilities
Batty- Ubisense
Sept 2005
Rick Roberts, Harris CorporationSlide 16
IEEE 15-05-0511-00-wgn0
Submission
Nowakowski- Chicago
OEMC receives signal, queries Building database and retrieves floor plan
OEMC transmits digital floor plan back to Motorola XTS 5000 and/or Hand Held Device
Police Officers UWB Enabled Portable/Hand Held Device
Location Technology
Sept 2005
Rick Roberts, Harris CorporationSlide 17
IEEE 15-05-0511-00-wgn0
Submission
A View of the 802.15.4a CFA
What is a common theme in these presentations? Ans. Location!
New paradigm emerging …
• Prior Art … data was the “precious information” that needed security protection
• Today’s Location Enabled Devices … location is the “precious information” that needs security protection
Sept 2005
Rick Roberts, Harris CorporationSlide 18
IEEE 15-05-0511-00-wgn0
Submission
Previous Contributions
Previous contributions have suggested the need for some level of PHY level security …
• 15-03-0430-00-004a (Harris)
• 15-04-0300-00-004a (Harris)
Recently this topic came up again during several 802.15.4a sub-committee conference calls.
Sept 2005
Rick Roberts, Harris CorporationSlide 19
IEEE 15-05-0511-00-wgn0
Submission
From 15-04-0300-00-004a
Reduced RF Signature for Security Applications
The Electronic Fence using MESH networking
Bad guy smashes middle sensor breaking MESH network and opening a gap in the electronic fence.
FFD Controller
Sept 2005
Rick Roberts, Harris CorporationSlide 20
IEEE 15-05-0511-00-wgn0
Submission
Want to reduce the RF signature (i.e. detectability) of the sensors once they form a net to avoid detection
Can do this by having all the sensors change some physical aspect of the waveform in a coordinated manner … an example is periodically changing the spreading sequence.
The FFD (net controller) periodically beacons with a 802.15.4a standard prescribed waveform to invite other devices to the join the network (based upon passing authentication) … detection of the controller is not an issue since it is physically secure
Also need a waveform that can not be easily detected by simple nonlinear processing … example of a waveform that is not easily detected via a non-linearity is time hopping … an example of an easily detected waveform, via a non-linearity, is BPSK.
BPSK Spectrum
Squared BPSK Spectrum
From 15-04-0300-00-004a (cont.)
Sept 2005
Rick Roberts, Harris CorporationSlide 21
IEEE 15-05-0511-00-wgn0
Submission
data
LO
dB
Hz
dB
Hz
• Angle of Arrival Estimation+
• Range Estimate based on r^2 loss=
• Estimation of Location
TX
RX
BPSK, a noise like waveform, collapses to an AM modulated carrier when processed through a squaring non-linearity.
From 15-03-0430-00-004a
Sept 2005
Rick Roberts, Harris CorporationSlide 22
IEEE 15-05-0511-00-wgn0
Submission
Cross-Layer Design
Localization Cuts Across Multiple Protocol Layers
MACPHY
HOST
Range Processing
Arrival Epoch
PHY: Generates Time of Arrival Epoch (accurate < 1nS)MAC: Generates Ranging Commands & Packet ExchangeHOST: Executes Ranging Mathematical Algorithms
The actual localization algorithms are considered beyond the scope of the standard
The standard should address MMLE, PMLE and MAC command packets to initiate and support the localization function
Sept 2005
Rick Roberts, Harris CorporationSlide 23
IEEE 15-05-0511-00-wgn0
Submission
Summary Opinion
• I think security at the PHY layer is possible, desirable and will be in demand
• Takes advantage of the large processing gain available in low rate UWB
• It is believed this provides the best security for location position information
• Requires that the hooks be included in an appropriate future standard … most likely some 802.15.4a follow-on (or perhaps in 802.15.4a itself?).
Looking for comments and discussion from WNG before pursuing this farther.
Sept 2005
Rick Roberts, Harris CorporationSlide 24
IEEE 15-05-0511-00-wgn0
Submission
• Is lowering the probability of detection an effective security measure?
• Is it necessary – or - are there other equivalent techniques already available?
• Is the use of spread spectrum for security ethical?
• Other discussion points?
WNG Discussion Points