IEEE Std 802.22-2011
IEEE Standard for Wireless Regional Area Networks Part 22: Cognitive Wireless RAN Medium Access Control (MAC)
and Physical Layer (PHY) specifications: Policies and procedures for operation in the TV Bands
3
Copyright © 2011 IEEE. All rights reserved.
2. Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. At the time of publication, the editions indicated were valid. All
standards and specifications are subject to revision, and parties to agreements based on this standard are
encouraged to investigate the possibility of applying the most recent editions of the references listed below.
ANSI X9.62-2005, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve
Digital Signature Algorithm (ECDSA), November 2005.
1
ANSI X9.63-2001, Public Key Cryptography for the Financial Services Industry: Key Agreement and Key
Transport Using Elliptic Curve Cryptography, November 2001.
IEEE Std 802
®
-2001, IEEE Standard for Local and Metropolitan Area Networks: Overview and
Architecture.
2, 3
IEEE Std 802.16™-2009, IEEE Standard for Local and Metropolitan Area Networks—Part 16: Air
Interface for Broadband Wireless Access Systems.
IEEE Std 802.22.1™-2010, IEEE Standard for Local and metropolitan area networks—Part 22.1: Methods
to Enhance Protection of Low-Power, Licensed Device Operation in the TV Broadcast Bands from
Harmful Interference from License-Exempt Devices Operating in those Bands.
FIPS 180-3, Secure Hash Standard (SHS), October 2008.
4
FIPS 186-3, Digital Signature Standard (DSS), June 2009.
FIPS 197, Advanced Encryption Standard, November 2001.
IETF RFC 2437, PKCS #1: RSA Cryptography Specification Version 2.0, October 1998.
5
IETF RFC 2578, “Structure of Management Information Version 2 (SMIv2),” K. McCloghrie, D. Perkins,
J. Schoenwaelder, J. Case, M. Rose, S. Waldbusser, April 1999.
IETF RFC 2758, “Definitions of Managed Objects for Service Level Agreements Performance
Monitoring,” K. White, February 2000.
IETF RFC 3279, Algorithms and Identifiers for the Internet X.509 Public Key Infrastructure Certificate and
Certificate Revocation List (CRL) Profile, April 2002.
IETF RFC 4492, Elliptic Curve Crytopgraphy (ECC) for Transport Layer Security (TLS), May 2006.
IETF RFC 5216, The EAP-TLS Authentical Protocol, March 2008.
IETF RFC 5246, The Transport Layer Security (TLS) Protocol Version 1.2, August 2008.
1
ANSI publications are available from the Sales Department, American National Standards Institute, 25 West 43rd Street, 4th Floor,
New York, NY 10036, USA (http://www.ansi.org/).
2
IEEE publications are available from the Institute of Electrical and Electronics Engineers, Inc., 445 Hoes Lane, Piscataway, NJ
08854, USA (http://standards.ieee.org/).
3
The IEEE standards or products referred to in this clause are trademarks of the Institute of Electrical and Electronics Engineers, Inc.
4
FIPS publications are available from the National Technical Information Service (NTIS), U. S. Dept. of Commerce, 5285 Port Royal
Rd., Springfield, VA 22161 (http://www.ntis.org/).
5
Internet Requests for Comments (RFCs) are available on the World Wide Web at the following ftp site: venera.isi.edu; logon:
anony¬mous; password: user’s e-mail address; directory: in-inotes.