WFM On Feb 3, 2012, at 3:31 PM, <[email protected]> wrote: > > How about the following revised text for Threat 1: > > Threat 1: User modifies a device to masquerade as another valid > certified device > > Regulatory environments require that devices be certified and > register in ways that accurately reflect their certification. > Without suitable protection mechanisms, devices could simply > listen to registration exchanges, and later registering > claiming to be those other devices. Such replays would allow > fasle registration, violating regulatory regimes. > A white space database may be operated by a commercial entity > which restricts access to authorized users. A master device > needs to identify itself to the database and be authorized to > obtain information about available channels. > > > >
_______________________________________________ paws mailing list [email protected] https://www.ietf.org/mailman/listinfo/paws
