ImageVerifierCode 换一换
格式:PDF , 页数:10 ,大小:55.60KB ,
资源ID:735613      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-735613.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TR 102 021-7-2010 Terrestrial Trunked Radio (TETRA) User Requirement Specification TETRA Release 2 1 Part 7 Security (V1 3 1)《陆地集群无线电(TETRA) TETRA的用户需求规范第2 1次发布 第7部分 安全性(版本1 3.pdf)为本站会员(eventdump275)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TR 102 021-7-2010 Terrestrial Trunked Radio (TETRA) User Requirement Specification TETRA Release 2 1 Part 7 Security (V1 3 1)《陆地集群无线电(TETRA) TETRA的用户需求规范第2 1次发布 第7部分 安全性(版本1 3.pdf

1、 ETSI TR 102 021-7 V1.3.1 (2010-12)Technical Report Terrestrial Trunked Radio (TETRA);User Requirement Specification TETRA Release 2.1;Part 7: SecurityETSI ETSI TR 102 021-7 V1.3.1 (2010-12)2Reference RTR/TETRA-01196 Keywords security, TETRA, user ETSI 650 Route des Lucioles F-06921 Sophia Antipolis

2、 Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present do

3、cument may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of th

4、e PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/s

5、tatus.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction ex

6、tend to reproduction in all media. European Telecommunications Standards Institute 2010. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM, TIPHONTM, the TIPHON logo and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the

7、benefit of its Members and of the 3GPP Organizational Partners. LTE is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 102 021-7 V1.3

8、.1 (2010-12)3Contents Intellectual Property Rights 4g3Foreword . 4g3Introduction 4g31 Scope 6g32 References 6g32.1 Normative references . 6g32.2 Informative references 6g33 Definitions and abbreviations . 6g33.1 Definitions 6g33.2 Abbreviations . 7g34 User Requirement Specification . 7g34.1 User Req

9、uirements from questionnaire 7g34.2 User Requirements derived from work on TETRA Release 1 . 7g34.3 Core requirements 7g34.4 Work required 9g34.5 Testing requirements 9g34.6 Timescales 9g3History 10g3ETSI ETSI TR 102 021-7 V1.3.1 (2010-12)4Intellectual Property Rights IPRs essential or potentially e

10、ssential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs no

11、tified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee

12、can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been produced by ETSI Technical Committee Terrestrial Trunked Radio

13、 (TETRA). The present document is part 7 of a multi-part deliverable covering the User Requirement Specifications (URSs) for TETRA Release 2 and Release 2.1, as identified below: Part 1: “General overview“ (Release 2.1); Part 2: “High Speed Data“ (Release 2.1); Part 3: “Codec“ (Release 2); Part 4: “

14、Air Interface Enhancements“ (Release 2.1); Part 5: “Interworking and Roaming“ (Release 2.1); Part 6: “Subscriber Identity Module (SIM)“ (Release 2.1); Part 7: “Security“ (Release 2.1); Part 8: “Air - Ground - Air services“ (Release 2); Part 9 “Peripheral Equipment Interface“ (Release 2.1); Part 10:

15、“Local Mode Broadband“ (Release 2.1); Part 11: “Over The Air Management“ (Release 2.1); Part 12: “Direct Mode Operation“ (Release 2.1). Introduction The Terms of Reference for TC TETRA approved at ETSI Board meeting #69, November 2008 are to produce ETSI deliverables (and maintenance thereafter) in

16、accordance with the following requirements: The provision of user driven services, facilities and functionality as required by traditional Professional Mobile Radio (PMR) user organizations such as the Emergency Services, Government, Military, Transportation, Utility and Industrial organizations as

17、well as Public Access Mobile Radio (PAMR) Operators. The evolution and enhancement of TETRA as required by the market with the provision of new services, facilities and functionality made possible by new technology innovations and standards. Further enhancements of the TETRA standard in order to pro

18、vide increased benefits and optimization in terms of spectrum efficiency, network capacity, system performance, quality of service, security and other relevant parameters. ETSI ETSI TR 102 021-7 V1.3.1 (2010-12)5 The backward compatibility and integration of the new services, facilities and function

19、ality with existing TETRA standards in order to future-proof the existing and future investments of TETRA users. Technical Objective TETRA is one of a number of digital wireless communication technologies standardized by ETSI. ETSI TC TETRA produces standards and/or adapts existing standards for eff

20、icient digital PMR and PAMR voice and data services, including broadband evolution. The present document provides the User Requirement Specifications for Security. The URS is required by TC TETRA to guide the enhancement of the current TETRA standard, mainly the evolution of the HSD standard part to

21、wards broadband. ETSI ETSI TR 102 021-7 V1.3.1 (2010-12)61 Scope The present document contains the User Requirements Specifications (URS) which are described in non-technical terms. Although high level requirements are proposed by the present document, it is considered restrictive to mandate particu

22、lar security implementations at this point, until a revised threat analysis has been undertaken. The present document is applicable to the specification of TETRA Release 2.1 equipment. 2 References References are either specific (identified by date of publication and/or edition number or version num

23、ber) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at ht

24、tp:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. 2.1 Normative references The following referenced documents are necessary for the application of the present document. Not applicabl

25、e. 2.2 Informative references The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. i.1 ETSI ES 202 109: “Terrestrial Trunked Radio (TETRA); Security; Synchronization mechanism for end-to-en

26、d encryption“. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: TETRA Release 2: Work Programme with new terms of reference within ETSI Project TETRA to enhance the services and facilities of TETRA in order to meet n

27、ew user requirements, utilize new technology and increase the longevity of TETRA within the traditional market domains of PMR and PAMR TETRA Release 2.1: Work Programme within TC TETRA to enhance the services and facilities of TETRA in order to meet new user requirements, utilize new technology and

28、increase the longevity of TETRA within the traditional market domains of PMR and PAMR ETSI ETSI TR 102 021-7 V1.3.1 (2010-12)73.2 Abbreviations For the purposes of the present document the following abbreviations apply: GCK-N Group Cipher Key Number GCK-VN Group Cipher Key Version Number HSD High Sp

29、eed Data ITSI Individual TETRA Subscriber Identity K authentication KeyME Mobile Equipment OTAK Over The Air Keying OTAR Over The Air Re-keying PAMR Public Access Mobile Radio PMR Private Mobile Radio SIM Subscriber Identity Module TEAx TETRA Encryption Algorithm x TEDS TETRA Enhanced Data Service U

30、RS User Requirement Specification 4 User Requirement Specification 4.1 User Requirements from questionnaire Due to the specialist nature of security requirements and also due in some part to the sensitivity of users to discuss in open forum threats to any current standard, it was not considered appr

31、opriate to collect security requirements as part of the wider TETRA Release 2 user questionnaire sent out in 2001. 4.2 User Requirements derived from work on TETRA Release 1 TETRA Release 1, TETRA Release 2, and TETRA Release 2.1 should be maintained at an equal level of security. If further enhance

32、ments to the security of TETRA Release 2.1 are required, they should be applicable to all TETRA Releases up to Release 2.1. This is considered fundamental to Public Safety users as current and future systems are required to be implemented such that security accreditation can be achieved. This also a

33、pplies to possible “stand-alone“ developments such as HSD through direct access TEDS. High speed data solutions including evolution towards broadband require further consideration of security aspects. It should be noted that security requirements apply to the standard as a whole, and individual requ

34、irements may not need satisfying with explicit security requirements, e.g. integrity can be checked with non-cryptographic integrity checking error correction schemes when used in conjunction with encryption schemes which may in themselves not provide integrity checks. NOTE: TETRA is not required to

35、 support security protocols derived from other domains (e.g. GSM). 4.3 Core requirements Although system requirements should be derived from the new threat analysis, it is considered probable that as a minimum the following core requirements will need to be supported by TETRA Release 2.1: 1) The TET

36、RA Release 2.1 security standard should be able to provide authentication of the terminal and the infrastructure or the Smart Card and the infrastructure and should use, as far as possible, the mechanisms used in TETRA Release 1. In addition the standard should provide for authentication of the end

37、user using, as far as possible, mechanisms provided in TETRA Release 1. NOTE 1: An application level user authentication method is outside the scope of the air interface security standards. 2) The TETRA Release 2.1 security standard should be able to provide confidentiality protection for user plane

38、 information over the air interface. ETSI ETSI TR 102 021-7 V1.3.1 (2010-12)83) The TETRA Release 2.1 security standard should be able to provide confidentiality and integrity protection of control plane information over the air interface. The integrity mechanism should not use strong cryptographic

39、methods but should rely upon the mechanisms inherent in the use of a stream cipher and non-cryptographic checksums (e.g. LLC and L2-CRC) as per TETRA Release 1. 4) The TETRA Release 2.1 security standard should be able to provide confidentiality and integrity protection of all over-the-air managemen

40、t messages over the air interface. 5) The TETRA Release 2.1 security standard should be able to provide replay protection for both user plane and control plane information over the air interface for a sufficient period to meet international Public Safety and commercial markets. The keystream repeat

41、length of the algorithms should remain unchanged at 23 days (approx) to avoid needing different key management principles for TETRA Release 2.1. Any change to the timeslot frequency, or to the use of fixed timeslots, may require fundamental redesign to the TEAx series of algorithms. Therefore in ord

42、er to maintain the use of the TEAx series with as much backward compatibility as possible the same timeslot frequency should be maintained. 6) The structure of TETRA Release 2.1 keys should be identical to TETRA Release 1 keys. (By “structure“ we mean the length of the key, the length of the key num

43、ber (e.g. GCK-N) and the length of the key version number (e.g. GCK-VN).) TETRA Release 2.1 should use the same encryption algorithms as TETRA Release 1. 7) The authentication and OTAR mechanisms used in TETRA Release 2.1 should be the same as the TETRA Release 1 authentication and OTAR mechanisms.

44、Where TEDS carriers are a part of a TETRA Release 1 network, registration and authentication will be based on an ITSI/K pair which are known on the Release 1 network, and authentication will take place according to TETRA Release 1 standards on the TETRA Release 1 network before TEDS services can be

45、used. In networks where HSD carriers are not part of a TETRA Release 1 network, registration and authentication should be based on a similar ITSI/K pair known to the TETRA Release 2.1 network using same or similar authentication mechanisms as in TETRA Release 1 network. NOTE 2: The authentication an

46、d OTAR protocols will operate on both TETRA Release 1 and TETRA Release 2.1 carriers. 8) The remote enable and disable functions of TETRA Release 1 should apply to TETRA Release 2.1 systems and mobile stations. 9) Where TETRA Release 2.1 systems and mobile stations support TETRA Release 1 circuit-mo

47、de calls, it should be possible to provide additional protection for user plane information by means of end-to-end encryption according to ES 202 109 i.1. If circuit-mode calls are to be supported in TETRA Release 2.1, it should be possible to provide them with end-to-end encryption according to ES

48、202 109 i.1. If a TETRA Release 2.1 codec is required to operate in a TETRA Release 1 air interface environment, then either the bit rate should be less than the TETRA Release 1 codec air interface and bits allocated for end to end encryption synchronization, or frame stealing should be supported to

49、 allow the TETRA Release 1 encryption synchronization mechanisms to be maintained. Where frame stealing is the supported synchronization method the codec should be able to sustain a frame stealing rate compatible with TETRA Release 1 standards requiring a stealing rate of between 1 and 4 stolen frames per second. 10) The system should be able to support a mechanism whereby information held on a removable personalization module (e.g. Smart Card) is protected from unauthorized access. A Smart Card may contain the ITSI/K pair and the authentication algorithms. 11) A

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1