Regarding security, there was agreement that the security protocol between the master and the DB is going to protect the DB resources and not the radio spectrum. Ie, we are not going to design a protocol to prevent malicious use of the WS spectrum; devices can put energy in the air and cause interference without asking the DB.
Since the Use cases and Requirements document is also going to be soon revised, I would propose that we capture the scope of the security in there too, and get rid of threats 3, 5 and first part of threat 4. Does anybody have any issues with the above? In the solution document, security section, we need input to address the rest of the threats described in the use case and requirements document. Yang Cui volunteered in the f2f to provide some text, hopefully we'll see sg soon. Anybody else interested in this topic is also welcome to contribute. - Gabor
_______________________________________________ paws mailing list [email protected] https://www.ietf.org/mailman/listinfo/paws
