24
Sept 2005 Rick Roberts, Harris Corporation Slide 1 IEEE 15-05-0511-00-wgn0 Submiss ion Project: IEEE P802.15 Working Group for Wireless Personal Area Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs) Networks (WPANs) Submission Title: [Security via Spread Spectrum] Date Submitted: [Sept 2005] Source: [Rick Roberts] Company [Harris Corporation] Address [Melbourne, Fl] Voice:[321-729-3018], FAX: [], E-Mail:[[email protected]] Re: [] Abstract: [] Purpose: [] Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15.

IEEE 15-05-0511-00-wgn0 Submission Sept 2005 Rick Roberts, Harris CorporationSlide 1 Project: IEEE P802.15 Working Group for Wireless Personal Area Networks

Embed Size (px)

Citation preview

Sept 2005

Rick Roberts, Harris CorporationSlide 1

IEEE 15-05-0511-00-wgn0

Submission

Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)Project: IEEE P802.15 Working Group for Wireless Personal Area Networks (WPANs)

Submission Title: [Security via Spread Spectrum]Date Submitted: [Sept 2005]Source: [Rick Roberts] Company [Harris Corporation]Address [Melbourne, Fl]Voice:[321-729-3018], FAX: [], E-Mail:[[email protected]]

Re: []

Abstract: []

Purpose: []

Notice: This document has been prepared to assist the IEEE P802.15. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein.Release: The contributor acknowledges and accepts that this contribution becomes the property of IEEE and may be made publicly available by P802.15.

Sept 2005

Rick Roberts, Harris CorporationSlide 2

IEEE 15-05-0511-00-wgn0

Submission

Wireless Next Generation – an open forum for the presentation and

discussion of next generation ideas.

Sept 2005

Rick Roberts, Harris CorporationSlide 3

IEEE 15-05-0511-00-wgn0

Submission

Security via Spread Spectrum(Lowering the Probability of Detection)

Sept 2005

Rick Roberts, Harris CorporationSlide 4

IEEE 15-05-0511-00-wgn0

Submission

Introduction

With the activity in 802.15.4a, we are starting to see the emergence of a spread spectrum waveform with significant processing gain.

802.11 802.15.1 802.15.3a 802.15.4a

Spreading Ratio

20:1 79:1 4:1 5000:1

Processing Gain

13 dB 19 dB 6 dB 37 dB

This paper suggests that perhaps we can use this excess processing gain to start applying security at the PHY level in the form of lowering the probability of detection.

Sept 2005

Rick Roberts, Harris CorporationSlide 5

IEEE 15-05-0511-00-wgn0

Submission

Need for Security

How important is the security issue to potential markets?

• 802.11 – WEP failed to satisfy market needs and a task group was formed to address security issues

• Bluetooth/802.15.1 – Security continues to be an on-going concern

• 802.15.4b – Security is being addressed

• others …

Any successful market deployment will eventually have to address security concerns. Historically this has been the case.

The question is “can processing gain be leveraged to enact another security layer and is there a market need for PHY layer security”? I believe the answer is “yes” to both questions.

Sept 2005

Rick Roberts, Harris CorporationSlide 6

IEEE 15-05-0511-00-wgn0

Submission

Review of 802.15.4a CFA

I believe the market need for PHY layer security can be established by reviewing the history of applications and contributions presented to 802.15.4a

From document 15-03-0537-00-004a (presented September 2003) …

Sept 2005

Rick Roberts, Harris CorporationSlide 7

IEEE 15-05-0511-00-wgn0

Submission

Track Firefighter Status

Houghton- Aetherwire

Sept 2005

Rick Roberts, Harris CorporationSlide 8

IEEE 15-05-0511-00-wgn0

Submission

Security

• Workstation locks when user goes out of range

• Automobile unlocks when driver comes within range- supports cars of the future

• Authentication based on precise location– Point of sale– Wireless Ethernet users

Ellis- General Atomics

Sept 2005

Rick Roberts, Harris CorporationSlide 9

IEEE 15-05-0511-00-wgn0

Submission

Opportunity to Establish a Technological Foundation for Wireless Child Localization

IEEE 802.15.4High

PrecisionLocalization

Other Enabling Technologies

IEEE 802.15.4 High Precision Localization

• Availability of Location Data to Upper Layers• Adaptable Physical Layer• Extend to Business Environment

Standardized Child Tracking Can Be Extended to Wider Area Coverage Incorporating Interoperability and Compatibility

Near - TermNear - Term Future - TermFuture - Term

Brooks- LB&A Consulting

Sept 2005

Rick Roberts, Harris CorporationSlide 10

IEEE 15-05-0511-00-wgn0

Submission

Location Aware Application

Application Loc. finding importance

Few bits comm. importance

True comm. importance

Comments

Healthcare inventory tracking

Critical Important Nice to have  

Healthcare – people tracking

Critical Important Nice to have  

Workforce - people tracking

Critical Important Not important  

Kareev- Pulsicom

Sept 2005

Rick Roberts, Harris CorporationSlide 11

IEEE 15-05-0511-00-wgn0

Submission

Distance-aware Application

• The feature that low-cost UWB devices can precisely measure the distance between the two communication parties can promote the following example applications:– To prevent children from walking away from parents;– Shutdown TVs when kids move too close to the them;– To prevent the lost of key chains, wallets or other luxury

accessories;– Automatically turn on/off the light or other devices when

people enter/leave the room, garage and etc.– Wireless Tape Measure: measuring distance using UWB

devices (convenient and saves man power)!

Kwon- Samsung/CUNY

Sept 2005

Rick Roberts, Harris CorporationSlide 12

IEEE 15-05-0511-00-wgn0

Submission

Application 3 Requirement• Locate and identify devices/people within an area• Communicate sensor information• Over time (autonomy must last for months, devices can

be re-energized)• A device (com. +loc.+energy) is some $, can be much

more with certain kinds of sensorsExample: 1. For tracking and safety purposes in large communities

environments such as schools and hospitals (large range, medium or large population)

2. For preventive medicine , health monitoring and health therapy purposes. Typically Body Area Networks

Rouzet- STMicroelectronics

Sept 2005

Rick Roberts, Harris CorporationSlide 13

IEEE 15-05-0511-00-wgn0

Submission

Package Tracking• Currently, mostly bar-codes are used, requiring visual

contact with the tracked item, creating not only an accessibility issue but also consumes time.

• Solving these issues is worth the added cost of a wireless-label (assuming a very low cost solution, e.g. sub $2).

• UWB based identification could offer the advantages of:– Shorter reading time (a whole truck could be read in seconds)– No need for line of sight within a reasonable range – Automatic warning provided by the tracking system whenever

a package is being loaded on a truck/container heading towards the wrong destination, or when a package is mistakenly offloaded

– Locating a package within the truck/container/warehouse

Eliezer- InfoRange

Sept 2005

Rick Roberts, Harris CorporationSlide 14

IEEE 15-05-0511-00-wgn0

Submission

Real Time Location Systems (RTLS)CORE RTLS Applications Range Accuracy

High value inventory items (warehouses, ports, motor pools, manufacturing plants)

100-300 m 30-300 cm

Sports tracking (NASCAR, horse races, soccer) 100-300 m 10-30 cm

Cargo tracking at large depots to including port facilities

300 m 300 cm

Vehicles for large automobile dealerships and heavy equipment rental establishments

100-300 m 300 cm

Key personnel in office / plant facility 100-300 m 15 cm

Children in large amusement parks 300 m 300 cm

Pet/cattle/wild life tracking 300 m 15-150 cm

Siwiak- TimeDerivative

Sept 2005

Rick Roberts, Harris CorporationSlide 15

IEEE 15-05-0511-00-wgn0

Submission

Security Applications• Enhancing CCTV coverage

– Activity-based video stream selection

• Daytime intruder detection– Correlate data from active tracking and passive

(IR, weight, radar) sensors

• Visitor management– Enforcing restricted zones and escort policies

• Asset tracking

• Automatic ‘man-down’ detection

Demand now: Defense contractors, gemstone processing facilities

Batty- Ubisense

Sept 2005

Rick Roberts, Harris CorporationSlide 16

IEEE 15-05-0511-00-wgn0

Submission

Nowakowski- Chicago

OEMC receives signal, queries Building database and retrieves floor plan

OEMC transmits digital floor plan back to Motorola XTS 5000 and/or Hand Held Device

Police Officers UWB Enabled Portable/Hand Held Device

Location Technology

Sept 2005

Rick Roberts, Harris CorporationSlide 17

IEEE 15-05-0511-00-wgn0

Submission

A View of the 802.15.4a CFA

What is a common theme in these presentations? Ans. Location!

New paradigm emerging …

• Prior Art … data was the “precious information” that needed security protection

• Today’s Location Enabled Devices … location is the “precious information” that needs security protection

Sept 2005

Rick Roberts, Harris CorporationSlide 18

IEEE 15-05-0511-00-wgn0

Submission

Previous Contributions

Previous contributions have suggested the need for some level of PHY level security …

• 15-03-0430-00-004a (Harris)

• 15-04-0300-00-004a (Harris)

Recently this topic came up again during several 802.15.4a sub-committee conference calls.

Sept 2005

Rick Roberts, Harris CorporationSlide 19

IEEE 15-05-0511-00-wgn0

Submission

From 15-04-0300-00-004a

Reduced RF Signature for Security Applications

The Electronic Fence using MESH networking

Bad guy smashes middle sensor breaking MESH network and opening a gap in the electronic fence.

FFD Controller

Sept 2005

Rick Roberts, Harris CorporationSlide 20

IEEE 15-05-0511-00-wgn0

Submission

Want to reduce the RF signature (i.e. detectability) of the sensors once they form a net to avoid detection

Can do this by having all the sensors change some physical aspect of the waveform in a coordinated manner … an example is periodically changing the spreading sequence.

The FFD (net controller) periodically beacons with a 802.15.4a standard prescribed waveform to invite other devices to the join the network (based upon passing authentication) … detection of the controller is not an issue since it is physically secure

Also need a waveform that can not be easily detected by simple nonlinear processing … example of a waveform that is not easily detected via a non-linearity is time hopping … an example of an easily detected waveform, via a non-linearity, is BPSK.

BPSK Spectrum

Squared BPSK Spectrum

From 15-04-0300-00-004a (cont.)

Sept 2005

Rick Roberts, Harris CorporationSlide 21

IEEE 15-05-0511-00-wgn0

Submission

data

LO

dB

Hz

dB

Hz

• Angle of Arrival Estimation+

• Range Estimate based on r^2 loss=

• Estimation of Location

TX

RX

BPSK, a noise like waveform, collapses to an AM modulated carrier when processed through a squaring non-linearity.

From 15-03-0430-00-004a

Sept 2005

Rick Roberts, Harris CorporationSlide 22

IEEE 15-05-0511-00-wgn0

Submission

Cross-Layer Design

Localization Cuts Across Multiple Protocol Layers

MACPHY

HOST

Range Processing

Arrival Epoch

PHY: Generates Time of Arrival Epoch (accurate < 1nS)MAC: Generates Ranging Commands & Packet ExchangeHOST: Executes Ranging Mathematical Algorithms

The actual localization algorithms are considered beyond the scope of the standard

The standard should address MMLE, PMLE and MAC command packets to initiate and support the localization function

Sept 2005

Rick Roberts, Harris CorporationSlide 23

IEEE 15-05-0511-00-wgn0

Submission

Summary Opinion

• I think security at the PHY layer is possible, desirable and will be in demand

• Takes advantage of the large processing gain available in low rate UWB

• It is believed this provides the best security for location position information

• Requires that the hooks be included in an appropriate future standard … most likely some 802.15.4a follow-on (or perhaps in 802.15.4a itself?).

Looking for comments and discussion from WNG before pursuing this farther.

Sept 2005

Rick Roberts, Harris CorporationSlide 24

IEEE 15-05-0511-00-wgn0

Submission

• Is lowering the probability of detection an effective security measure?

• Is it necessary – or - are there other equivalent techniques already available?

• Is the use of spread spectrum for security ethical?

• Other discussion points?

WNG Discussion Points