ImageVerifierCode 换一换
格式:PDF , 页数:6 ,大小:301.23KB ,
资源ID:733477      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-733477.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI GSM 02 09-1993 European Digital Cellular Telecommunication System (Phase 2) Security Aspects (ETS 300 506 Version 4 3 0)《欧洲数字蜂窝通信系统(第2阶段) 安全方面(ETS 300 506 版本4 3 0)》.pdf)为本站会员(roleaisle130)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI GSM 02 09-1993 European Digital Cellular Telecommunication System (Phase 2) Security Aspects (ETS 300 506 Version 4 3 0)《欧洲数字蜂窝通信系统(第2阶段) 安全方面(ETS 300 506 版本4 3 0)》.pdf

1、H 3404583 0077963 735 Released: July 1, 1993 GSM 02.09 Version: 4.2.1 Date: 7 June, 1993 Work Item No: Key words: European digital cellular telecommunication system (phase 2); SECURITY ASPECTS ETS I European Telecommunications Standards Institute ETSI Secretarlat: Route des Lucioles, F-O6921 Sophia

2、Antipolis Cedex . France Tp. + 33 92 94 42 O0 TF. + 33 93 65 47 16 Tx. 47 00 40 F This is an unpublished work the copyright in which vests in the European Telecommunications Standards Institute. All rights reserved. The information contained herein is the property of ETSI and no part may be reproduc

3、ed or used except as authorised by contract or other written permission. The copyright and the foregoing restriction on reproduction and use extend to all media in which the information may be embodied. 3404583 0077964 671 W Page 3 GSM 02.09 . verilon 4.2.1 : June 1993 CONTENTS 1 . SCOPE . 5 2 . GEN

4、ERAL . 5 3.3. 3.4. 3.5. 3 . SECURITY FEATURES PROVIDED IN A GSM PLMN 5 3.1. Subscriber Identity Confidentiality . 6 3.1.1. Definition . 6 3.1.2. Purpose . 6 3.1.3. Functional requirements . 6 Subscriber Identity Authentication . 6 3.2.1. Definition . 6 3.2.2. Purpose . 6 3.2.3. Functional requiremen

5、ts . 6 3.2.4. Authentication during a malfunction of the network . 7 User Data Confidentiality On Physical Connections (Voice and Non-voice) . 7 3.3.1. Definition . 7 3.3.2. Purpose . 7 3.3.3. Functional requirements . 7 Connectionless User Data Confidentiality 8 3.4.1. Definition . 8 3.4.2. Purpose

6、 . 8 3.4.3. Functional requirements . 8 Signalling Information Element Confidentiality . 8 3.5.1. Definition . 8 3.5.2. Purpose . 8 3.5.3. Functional requirements . 8 3.2. Previous page is blank 3404583 0077b5 508 Page 5 GSM 02.09 - version 4.2.1 : June 1993 1. SCOPE Bearer and Teleservices, as resp

7、ectively defined in GSM TS 02.02 and 02.03, are the objects which the GSM PLMN operators offer to their customers. Besides these basic telecommunications services, features which aim at up-grading these basic cervices need also to be offered. Due to the use of radiocommunications in a PLMN, which ar

8、e of a special nature compared to classical distribution transmission techniques used in the fixed networks, such a category of features is related to security aspects. In a GSM PLMN, both the users and the network operator have to be protected against undesirable intrusion of third parties. However

9、, measures should be provided for in order to insure maximum protection of the rights of the individuals concerns. As a consequence, a security feature is either a supplementary service to Tele or Bearer services, which can be selected by the subscriber, or a network function involved in the provisi

10、on of one or several telecommunication services. The purpose of this Specification is to define the security features which are to be available in a GSM PLMN, together with the associated levels of protection. This Specification is only concerned with those security features which aim at the up-grad

11、ing of the security in a GSM PLMN. In particular, end-to-end security is outside the scope of this Specification. The implementation aspects of security features are described in GSM TS 03.20. 2. GENERAL The use of radiocommunications for transmission to the mobile subscribers makes PLMNs particular

12、y sensitive to: - misuse of their resources by unauthorized persons using manipulated Mobile Stations, who try to impersonate authorized Subscribers; and - eavesdropping of the various informations which are exchanged on the radiopath. It can be seen that PLMNs intrinsically do not provide the same

13、level of protection to their operators and subscribers as the traditional telecommunication networks provide. This fact leads to the need to implement security features in a GSM PLMN in order to protect: i) the access to the mobile services; ii) any relevant item from being disclosed at the radiopat

14、h, mainly in order to ensure the privacy of user- related information. Two levels of protection are therefore assumed : - where security features are provided, as defined in Section 3, the level of protection at the radiopath of the corresponding items is as good as the level of protection provided

15、in the f xed networks: - where no special provision is made , the level of protection at the radiopath is null. All items which are not dealt with in Section 3 are therefore considered to need no protection. 3. SECURITY FEATURES PROVIDED IN A GSM PLMN The following security features are considered :

16、 - subscriber identity (IMSI) confidentiality; - subscriber identity (IMSI) authentication; - user data confidentiality on physical connections; Previous page is blank 3Y04583 007bb 444 Page 6 GSM 02.09 - version 4.2.1 : June 1993 I - connectionless user data confidentiality; - signalling informatio

17、n element confidentiality. The implementation of these five security features is mandatory on both the fixed infrastructure side and the MS side. This means that all GSM PLMNs and all MSs shall be able to support every security feature. Use of these five security features is at the discretion of the

18、 operator for its own subscribers while on the HPLMN. For roaming subscribers, use of these five security features is mandatory unless otherwise agreed by all the affected PLMN operators. (See also 3.3.3). 3.1. Subscriber identity Confldentiallty 3.1.1. Definition The subscriber identity confidentia

19、lity feature is the property that the IMSI is not made available or disclosed to unauthorized individuals, entities or processes. 3.1.2. Purpose This feature provides for the privacy of the identities of the subscribers who are using GSM PLMN resources (e.g. a traffic channel or any signalling means

20、). It allows for the improvement of all other security features (e.g. user data confidentiality) and provides for the protection against tracing the location of a mobile subscriber by listening to the signalling exchanges on the radio path. 3.1.3. Functional requirements This feature necessitates th

21、e confidentiality of the subscriber identity (IMSI) when it is transferred in signalling messages (see Section 3.5) together with specific measures to preclude the possibility to derive it indirectly from listening to specific informations, such as addresses, at the radiopath. The means used to iden

22、tify a mobile subscriber on the radiopath consists of a local number called TMSI (Temporary Mobile Subscriber identity), described in GSM TS 03.20. When used, the subscriber identity confidentiality feature shall apply for all signalling sequences on the radiopath. 1 However, in the case of location

23、 register failure, or in case the MS has no TMSI available, open identification is allowed on the radiopath. 3.2. Subscriber Identity Authentication 3.2.1. Definition Subscriber identity (IMSI) authentication is the corroboration by the land-based part of the system that the subscriber identity (IMS

24、I or TMSI), transferred by the mobile subscriber within the identification procedure at the radiopath,is the one claimed. 3.2.2. Purpose The purpose of this authentication security feature is to protect the network against unauthorized use. It enables also the protection of the GSM PLMN subscribers

25、by denying the possibility for intruders to impersonate authorized users. 3.2.3. Functional requirements The authentication of the GSM PLMN subscriber identity may be triggered by the network when the subscriber applies for: - a change of subscriber-related information element in the VLR or HLR (inc

26、luding some or all of: location up-dating involving change of VLR. registration or erasure of a 3404583 0077967 380 Page 7 GSM 02.09 - verslon 4.2.1 : June 1993 supplementary service), or - an access to a service (including some or all of: Set-up of mobile originating or terminated calls, activation

27、 or deactivation of a supplementary service), or - first network access after restart of MSCNLR, or in the event of cipher key sequence number mismatch. Physical security means must be provided to preclude the possibility to obtain sufficient information to impersonate or duplicate a subscriber in a

28、 GSM PLMN, in particular by deriving sensitive information from the mobile station equipment. If, on an access request to the GSM PLMN, the subscriber identity authentication procedure fails and this failure is not due to network malfunction, then the access to the GSM PLMN shall be denied to the re

29、questing party. 3.2.4. Authentlcatlon durlng a malfunction of the network If an MS is registered and has been succesfully authenticated, whether active or not active on a call, calls are permitted (including continuation and handover). If an MS has already been registered (and therefore been already

30、 authenticated) and can not be successfully reauthenticated due to the network malfunction (e.g. the HPLMN was not able to provide authentication pairs RAND, SRES), calls are permitted. If an MS attempts to register and can not be successfully authenticated due to the network malfunction, calls are

31、not permitted. If the MS is not registered, or ceases to be registered, a new registration need to be performed, and the preceding cases apply. 3.3. User Data Confidentiality On Physical Connections (Voice and Non-voice) 3.3.1. Definltlon The user data confidentiality feature on physical connections

32、 is the property that the user information exchanged on traffic channels is not made available or disclosed to unauthorized individuals, entities or processes. 3.3.2. Purpose The purpose of this feature is to ensure the privacy of the user information on traffic channels. 3.3.3. Functionat requireme

33、nts Encryption will normally be applied to all voice and non-voice communications. Although a standard algorithm will normally be employed, it is permissible for the mobile station and/or PLMN infrastructure to support more than one algorithm. In this case, the infrastructure is responsible for deci

34、ding which algorithm to use (including the possibility not to use encryption, in which case confidentiality is not applied). When necessary, the MS shall signal to the network indicating which of up to seven encryption, plus one transparent. algorithms it supports. (Note: The effect of the “transpar

35、ent algorithm“ being selected is the same as not being encrypted.) The serving network then selects one of these that it can support (based on an order of priority preset in the network), and signals this to the MS. The selected algorithm is then used by the MS and network. m 3404583 0077b8 217 m I

36、* Page 8 GSM 02.09 - version 4.2.1 : June 1993 3.4. Connectionless User Data Confidentlality 3.4.1. Definition The connectionless user data confidentiality feature is the property that the user information which is transferred in a connectionless packet mode over a signalling channel is not made ava

37、ilable or disclosed to unauthorized individuals, entities or processes. 3.4.2. Purpose The purpose of this feature is to ensure the privacy of the user information on signalling channels (e.g. short messages). 3.4.3. Functlonal requirements Note1 : Protection of connectionless user data is not appli

38、cable to SMS Cell Broadcast. 3.5. Slgnalllng Information Element Confidentiality 3.5.1. Deflnltion The signalling information element confidentiality feature is the property that a given piece of signalling information which is exchanged between mobile stations and base stations is not made availabl

39、e or disclosed to unauthorized individuals, entities or processes. 3.5.2. Purpose The purpose of this feature is to ensure the privacy of users related signalling elements. 3.5.3. Functional requirements When used, this feature applies on selected fields of signalling messages which are exchanged be

40、tween mobile stations an? tase stations. The signalling information eements included in the message used to establish the connection (protocol discriminator, connection reference, message type and mobile station identity (IMSI, TMSI or IMEI according to the circumstance) are not protected. The follo

41、wing signalling information elements related to the user are protected whenver used after connection establishment: - - - - International Mobile Equipment Identity (IMEI) International Mobile Subscriber Identity (IMSI); Calling subscriber directory number (mobile terminating calls) ; Called subscriber directory number (mobile originated calls). 1 The IMEI requires physical protection against being removed, replaced or its contents being changed by unauthoriced individuals. The IMSI is stored securely within the SIM.

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1