ImageVerifierCode 换一换
格式:PDF , 页数:30 ,大小:216.89KB ,
资源ID:739733      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-739733.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TS 102 941-2012 Intelligent Transport Systems (ITS) Security Trust and Privacy Management (V1 1 1)《智能交通系统(ITS) 安全 可信与隐私管理 版本1 1 1》.pdf)为本站会员(dealItalian200)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TS 102 941-2012 Intelligent Transport Systems (ITS) Security Trust and Privacy Management (V1 1 1)《智能交通系统(ITS) 安全 可信与隐私管理 版本1 1 1》.pdf

1、 ETSI TS 102 941 V1.1.1 (2012-06) Intelligent Transport Systems (ITS); Security; Trust and Privacy Management Technical Specification ETSI ETSI TS 102 941 V1.1.1 (2012-06)2Reference DTS/ITS-0050015 Keywords interoperability, ITS, management, security ETSI 650 Route des Lucioles F-06921 Sophia Antipo

2、lis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present

3、 document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of

4、 the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/statu

5、s/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction

6、 extend to reproduction in all media. European Telecommunications Standards Institute 2012. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTETMare Trade Marks of ETSI registered for the benefit of its M

7、embers and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 102 941 V1.1.1 (2012-06)3Contents Intellectual Property Rights 4g3Foreword . 4g31 Scope 5g32 References 5g32.1 Normative references . 5g32.2 Informative refe

8、rences 6g33 Definitions and abbreviations . 6g33.1 Definitions 6g33.2 Abbreviations . 6g34 ITS authority hierarchy 7g34.1 Overview 7g34.2 ITS authorities 7g34.2.1 Enrolment Authority . 7g34.2.2 Authorization Authority 8g34.2.3 Root CA 8g35 Privacy in ITS . 8g36 Trust and privacy management 9g36.1 IT

9、S-S Security Lifecycle 9g36.1.1 Manufacture 9g36.1.2 Enrolment . 10g36.1.3 Authorization 10g36.1.4 Maintenance 10g36.2 Public Key Infrastructure . 10g36.2.1 Assumption and requirements. 10g36.2.2 Message Sequences. 10g36.2.2.1 Introduction . 10g36.2.2.2 Enrolment Request 11g36.2.2.3 Authorization Re

10、quest. 13g37 Security association and key management between ITS Stations 16g37.1 Broadcast SAs 16g37.2 Multicast SAs . 16g37.3 Unicast SAs 17g3Annex A (informative): ITS security messages specified in ASN.1 18g3A.1 ITS trust and privacy messages specified in ASN.1 . 18g3A.2 Enrolment and authorizat

11、ion message structures . 18g3Annex B (informative): Secret-key use cases and application categories 26g3Annex C (informative): Extensions to IEEE 1609.2 to support additional security functions 27g3C.1 Rationale . 27g3C.2 Use of a cryptographic digest of the signer identifier 27g3C.3 Encryption of t

12、he signer identifier in an authorization certificate request . 27g3C.4 Request and transmission of multiple authorization certificates 28g3Annex D (informative): Bibliography . 29g3History 30 ETSI ETSI TS 102 941 V1.1.1 (2012-06)4Intellectual Property Rights IPRs essential or potentially essential t

13、o the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to

14、ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the exi

15、stence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI Technical Committee Intelligent Transport System (ITS). ETSI ETS

16、I TS 102 941 V1.1.1 (2012-06)51 Scope The present document specifies the trust and privacy management for Intelligent Transport System (ITS) communications. Based upon the security services defined in TS 102 731 1 and the security architecture define in TS 102 940 5, it identifies the trust establis

17、hment and privacy management required to support security in an ITS environment and the relationships that exist between the entities themselves and the elements of the ITS reference architecture defined in EN 302 665 2. The present document identifies and specifies security services for the establi

18、shment and maintenance of identities and cryptographic keys in an Intelligent Transport System (ITS). Its purpose is to provide the functions upon which systems of trust and privacy can be built within an ITS. 2 References References are either specific (identified by date of publication and/or edit

19、ion number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected loc

20、ation might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. 2.1 Normative references The following referenced documents are necessary for the application of the prese

21、nt document. 1 ETSI TS 102 731: “Intelligent Transport Systems (ITS); Security; Security Services and Architecture“. 2 ETSI EN 302 665: “Intelligent Transport Systems (ITS); Communications Architecture“. 3 ETSI TS 102 867: “Intelligent Transport Systems (ITS); Security; Stage 3 mapping for IEEE 1609

22、.2“. 4 ETSI TS 102 942: “Intelligent Transport Systems (ITS); Security; Access control“. 5 ETSI TS 102 940: “Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management“. 6 ISO/IEC 8824-1:2008: “Information technology - Abstract Syntax Notation One

23、 (ASN.1): Specification of basic notation“. 7 ISO/IEC 8825-2:2008: “Information technology - ASN.1 encoding rules: Specification of Packed Encoding Rules (PER)“. 8 IEEE P1609.2/D12 (January 2012): “IEEE Draft Standard for Wireless Access in Vehicular Environments - Security Services for Applications

24、 and Management Messages“. NOTE: Available from http:/ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?reload=true Security; Confidentiality services“. ETSI ETSI TS 102 941 V1.1.1 (2012-06)62.2 Informative references The following referenced documents are not necessary for the application of the present

25、document but they assist the user with regard to a particular subject area. i.1 ISO/IEC 15408-2: “Information technology - Security techniques - Evaluation criteria for IT security; Part 2: Security functional components“. i.2 ETSI TR 102 638: “Intelligent Transport Systems (ITS); Vehicular Communic

26、ations; Basic Set of Applications; Definitions“. i.3 IETF RFC 4046: “Multicast Security (MSEC) Group Key Management Architecture“. i.4 IETF RFC 4301: “Security Architecture for the Internet Protocol“. i.5 IETF RFC 4302: “IP Authentication Header“. i.6 IETF RFC 4303: “IP Encapsulating Security Payloa

27、d (ESP)“. i.7 IETF RFC 5246: “The Transport Layer Security (TLS) Protocol Version 1.2“. i.8 IETF RFC 3547: “The Group Domain of Interpretation“. i.9 IETF RFC 3830: “MIKEY: Multimedia Internet KEYing“. i.10 IETF RFC 4535: “GSAKMP: Group Secure Association Key Management Protocol“. 3 Definitions and a

28、bbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: anonymity: ability of a user to use a resource or service without disclosing the users identity authorization authority: authority that provides an ITS-S with permission to invoke ITS ap

29、plications and services canonical identifier: structured identifier that is globally unique enrolment authority: authority that validates that an ITS-S can be trusted to function correctly pseudonymity: ability of a user to use a resource or service without disclosing its user identity while still b

30、eing accountable for that use unlinkability: ability of a user to make multiple uses of resources or services without others being able to link these uses together unobservability: ability of a user to use a resource or service without others, especially third parties, being able to observe that the

31、 resource or service is being used 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: AA Authorization Authority CA Certification AuthorityCAM Cooperative Awareness Message CRL Certificate Revocation List CSR Certificate Signing Request DENM Decentralized

32、Environmental Notification Message EA Enrolment Authority ETSI ETSI TS 102 941 V1.1.1 (2012-06)7ITS Intelligent Transport System ITS-AID ITS Application ID ITS-S ITS Station MSEC Multicast Security PKI Public Key Infrastructure PSID Provider Service Identifier SA Security Association SSP Service Spe

33、cific Permissions TLS Transport Layer Security 4 ITS authority hierarchy 4.1 Overview Trust and privacy management requires secure distribution and maintenance (including revocation when applicable) of trust relationships, which may be enabled by specific security parameters that include 3rdparty ce

34、rtificates of proof of identity or other attributes such as pseudonym certificates. Public key certificates and Public Key Infrastructure (PKI) are used to establish and maintain trust between the ITS-S and other ITS stations and authorities. TS 102 731 1 defines the security management roles taken

35、by: manufacturers: - insert an ITS authoritative identity (canonical identifier) into each ITS-S; Enrolment Authorities (EA): - verify an ITS Station (ITS-S) as a whole; and Authorization Authorities (AA): - authorize an ITS-S to use a particular application, service, or privilege. Separation of enr

36、olment (identification and authentication) and authorization has been shown in TS 102 731 1 as an essential component of privacy management and provides protection against attacks on a users privacy. However, it is possible for the EA role to be delegated to the manufacturer and for the EA and AA ro

37、les to be assumed by a single authority. NOTE: EN 302 665 2 defines an ITS registration authority role to protect against the distribution of malicious ITS applications. Registration authorities are responsible for registering and managing ITS applications exclusively and are not involved in operati

38、onal security management. 4.2 ITS authorities 4.2.1 Enrolment Authority The EA issues a proof of identity authenticating the canonical identifier issued to the ITS-S. The proof of identity does not reveal the canonical identifier to a 3rdparty and may be used by the ITS-S to request authorization of

39、 services from an AA. The functions provided by the EA are as follows: the authentication of the canonical identifier of an ITS-S; the provision of proof of authentication of the ITS-S. ETSI ETSI TS 102 941 V1.1.1 (2012-06)84.2.2 Authorization Authority An ITS-S that has enrolled with, and been auth

40、enticated by, an EA may apply to an AA for specific permissions within the enrolment authoritys domain and the AAs authorization context. These privileges are denoted by means of authorization credentials in the form of IEEE 1609.2 8 authorisation certificates. Each authorization certificate specifi

41、es a particular authorization context which comprises a set of permissions. EXAMPLE 1: An authorization certificate might grant permission to an ITS-S to broadcast messages from a particular message set. Alternatively, it might grant permission to claim certain privileges. The authorization context

42、is specified either by explicitly encoding the permissions granted or by including a reference to a known policy that specifies the context. NOTE: An AA will normally be responsible for a particular set of contexts which may be specified by one or more of the following: square4 application (for exam

43、ple, cooperative awareness applications for personal user vehicles, emergency service vehicles or tolling); square4 time period; square4 geographic region (nation, state, locality); or square4 any other criteria that can be encoded. The authorization system may comprise a hierarchy of authorization

44、authorities with lower-layer authorities authorizing ITS stations and higher-layer authorities authorizing lower-level authorities. EXAMPLE 2: The following three layer structure might be appropriate for official use vehicles: a) ITS global (National) authorization authority; b) ITS regional authori

45、zation authority; and c) ITS local authorization authority. EXAMPLE 3: For personal user vehicles, it might be appropriate to have a single authorization authority (either national or system-wide) for CAMs and DENMs, because short certificate chains reduce the packet size associated with authorizati

46、on data. An AA should be unable to link the proof of authentication to the canonical identifier of an ITS-S without the collusion of the EA that performed the verification of the canonical identifier of the ITS-S. 4.2.3 Root CA Each CA hierarchy (for EA or AA) has at its summit a Root Certificate, w

47、hich is the ultimate root of trust for all certificates within that hierarchy. In order to trust an incoming message, an ITS-S must have access at least to the root certificate at the summit of the hierarchy for the authorization certificate attached to the message. The ITS-S may obtain root certifi

48、cates during the manufacture or maintenance lifecycle stages described in clauses 6.1.1 to 6.1.4 respectively. In principle root certificate information may be distributed over the air through a cross-certification process, but the present document does not specify messages to support this use case.

49、 5 Privacy in ITS ISO/IEC 15408-2 i.1 identifies 4 key attributes that relate to privacy: anonymity; pseudonymity; unlinkability; and unobservability. ETSI ETSI TS 102 941 V1.1.1 (2012-06)9Anonymity alone is insufficient for protection of an ITS users privacy and unsuitable as a solution for ITS, as one of the main requirements of ITS is that the ITS-S should be observable in order to provide improved safety. Consequently, pseudonymity and unlinkability offer the appropriate protection of the priva

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1