11.07.2015 Views

802.16.1 Functional Requirements, Rev. 1 - LMSC, LAN/MAN ...

802.16.1 Functional Requirements, Rev. 1 - LMSC, LAN/MAN ...

802.16.1 Functional Requirements, Rev. 1 - LMSC, LAN/MAN ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

123456789101112131415161718192021222324251999-12-17 IEEE 802.16s-99/00r18.2 AuthorizationAuthorization is a security process that determines what services an authenticated subscriber ispermitted to invoke. Each subscriber has a set of credentials that describe what the subscriber is“allowed” to do. The <strong>802.16.1</strong> standard SHALL identify a standard set of credentials and allowfor vendors to extend the defined credentials with non-standard credentials. Some possiblecredentials are:• Permission to access the <strong>802.16.1</strong> system• Permission to request up to a defined QoS profile (bandwidth, delay, etc.)• Permission to operate certain bearer services (ATM, IP, Remote Bridging, DigitalAudio/Video, etc.)Subscriber authorization requests and responses MUST be transacted securely.8.3 PrivacyPrivacy is a security concept that protects transmitted data from being intercepted and understoodby third parties (e.g., an “enemy” subscriber station, base station or passively “listening” radio).Wire-equivalent privacy (WEP) [10] and shared private key [10] privacy have been suggested asminimum required privacy levels for <strong>802.16.1</strong> systems.<strong>802.16.1</strong> standards SHOULD allow a strong cryptographic algorithm to be employed that isinternationally applicable. Facilities SHOULD also be defined in the protocol for the use ofalternate cryptographic algorithms that can be used in certain localities and that can replacealgorithms as they are obsoleted or “legalized” for international use.-20-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!