ISO IEC 29180 CORR 1-2015 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networ.pdf

上传人:appealoxygen216 文档编号:1257182 上传时间:2019-09-02 格式:PDF 页数:2 大小:511KB
下载 相关 举报
ISO IEC 29180 CORR 1-2015 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networ.pdf_第1页
第1页 / 共2页
ISO IEC 29180 CORR 1-2015 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networ.pdf_第2页
第2页 / 共2页
亲,该文档总共2页,全部预览完了,如果喜欢就下载吧!
资源描述

1、ISO/IEC 29180:2012/Cor.1:2015 (E) Rec. ITU-T X.1311 (2011)/Cor.1 (11/2014) 1 INTERNATIONAL STANDARD ITU-T RECOMMENDATION Information technology Security framework for ubiquitous sensor networks Technical Corrigendum 1 Conventions used in this corrigendum: Original, unchanged, text is in normal font.

2、 Deleted text is struck-through, thus: deleted text. Inserted text is underlined, thus: inserted text. 1 Clause 2.2 Modify clause 2.2 as follows: 2.2 Paired Recommendations | International Standards equivalent in technical content Recommendation ITU-T X.800 (1991), Security architecture for Open Sys

3、tems Interconnection for CCITT applications. ISO/IEC 7498-2:1989, Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture. Recommendation ITU-T X.805 (2003), Security architecture for systems providing end-to-end communications. ISO/IEC 18028-2

4、2006, Information technology Security techniques IT network security Part 2: Network security architecture. 2 Clause 2.3 Add the following reference to clause 2.3: Recommendation ITU-T X.805 (2003), Security architecture for systems providing end-to-end communications. 3 Clause 6 Modify the 10th pa

5、ragraph as follows: There are three components in the SN: the application server communicating with the sink node; the sink node called the base station, which interfaces the sensor network and the application server, and the collection of sensor nodes using wireless communication to communicate wit

6、h each other. The sink may communicate with the application server via the Internet or a satellite. Security architecture in the IP-based network is very similar to that in Rec. ITU-T X.805 | ISO/IEC 18028-2. Therefore, this Recommendation | International Standard focuses on the security of the wire

7、less sensor network (SN) consisting of a set of sensor nodes using wireless transmission. 4 Clause 7.1.1 Modify the first sentence of the first paragraph as follows: Rec. ITU-T X.800 | ISO/IEC 7498-2 and Rec. ITU-T X.805 | ISO/IEC 18028-2cite the following security threats to the networks (note that

8、 these are also security threats applicable to the SN): 5 Clause 7.1.2 Modify the first sentence of the first paragraph as follows: Rec. ITU-T X.800 | ISO/IEC 7498-2 and Rec. ITU-T X.805 | ISO/IEC 18028-2 identify five threats that are applicable to routing-related message exchange in the SN. In add

9、ition to these, seven threats are identified in (see Karlrof et al. in the Bibliography) with regard to the routing messages exchanged between sensor nodes. ISO/IEC 29180:2012/Cor.1:2015 (E) 2 Rec. ITU-T X.1311 (2011)/Cor.1 (11/2014) 6 Clause 7.2 Modify the first sentence of the first paragraph as f

10、ollows: The threat models developed in Rec. ITU-T X.805 | ISO/IEC 18028-2 can be applied to the IP network. Therefore, refer to Rec. ITU-T X.805 | ISO/IEC 18028-2 for the details of those threats. 7 Clause 8 Modify the second paragraph as follows: To counter the aforesaid threats in both the SN and

11、the IP networks, the following security dimensions in Rec. ITU-T X.805 | ISO/IEC 18028-2 are applicable: 8 Clause 9.1.1 Modify the first paragraph as follows: Table 1 lists the security requirements and describes the relationship between the security dimensions and the security threats identified in

12、 Rec. ITU-T X.805 | ISO/IEC 18028-2. The letter “Y“ in a cell formed by the intersection of the tables columns and rows suggests that a particular security threat is opposed by the corresponding security dimension. 9 Clause 9.2 Modify the first paragraph as follows: The security threats and security

13、 dimensions developed in Rec. ITU-T X.805 | ISO/IEC 18028-2 can directly be applied to a secure message exchange through the IP network. Therefore, refer to Rec. ITU-T X.805 | ISO/IEC 18028-2 for related details. 10 Clause 10.7 Modify the first paragraph as follows: The IP network security technologies in Rec. ITU-T X.805 | ISO/IEC 18028-2 can directly be applied to secure message exchange through the IP network. Therefore, related details can be omitted.

展开阅读全文
相关资源
猜你喜欢
  • JUS B G8 372-1983 Ores and concentrates Zine concentrate Methods for chemical analysis Determination of fluor《矿石及精矿 锌精矿 化学分析方法 测定萤石含量》.pdf JUS B G8 372-1983 Ores and concentrates Zine concentrate Methods for chemical analysis Determination of fluor《矿石及精矿 锌精矿 化学分析方法 测定萤石含量》.pdf
  • JUS B G8 400-1984 Ores and concentrates Lead concentrate《矿石及精矿 铅精矿》.pdf JUS B G8 400-1984 Ores and concentrates Lead concentrate《矿石及精矿 铅精矿》.pdf
  • JUS B G8 402-1982 Ores and concentrates Lead concentrates Methods of chemical analysis Determination of copper content《矿石及精矿 铅精矿 化学分析方法 铜量的测定》.pdf JUS B G8 402-1982 Ores and concentrates Lead concentrates Methods of chemical analysis Determination of copper content《矿石及精矿 铅精矿 化学分析方法 铜量的测定》.pdf
  • JUS B G8 403-1982 Ores and concentrates Lead concentrates Methods for hemical analysis Determination silver and gold content《矿石及精矿 铅精矿 化学分析方法 测定银量和金量》.pdf JUS B G8 403-1982 Ores and concentrates Lead concentrates Methods for hemical analysis Determination silver and gold content《矿石及精矿 铅精矿 化学分析方法 测定银量和金量》.pdf
  • JUS B G8 404-1984 Ores and concentratas Lead concsntrats Methods of chemical analysis Determination of bismuth con-tent《矿石及精矿 铅精矿 化学分析方法 测定铋量》.pdf JUS B G8 404-1984 Ores and concentratas Lead concsntrats Methods of chemical analysis Determination of bismuth con-tent《矿石及精矿 铅精矿 化学分析方法 测定铋量》.pdf
  • JUS B G8 405-1984 Oras and concentrates Lead concentrate Determination of $ntimony content Colorimetric method《矿石及精矿 铅精矿 比色法测定锑量》.pdf JUS B G8 405-1984 Oras and concentrates Lead concentrate Determination of $ntimony content Colorimetric method《矿石及精矿 铅精矿 比色法测定锑量》.pdf
  • JUS B G8 450-1983 Ores and concentrates Copper ores Spectrophotometric method for determination copper《矿石及精矿 铜矿石 分光光度法测定铜量》.pdf JUS B G8 450-1983 Ores and concentrates Copper ores Spectrophotometric method for determination copper《矿石及精矿 铜矿石 分光光度法测定铜量》.pdf
  • JUS B G8 470-1983 Ores and concentrates Copper concen trate Electrogravimetric method for determination of copper content《矿石及精矿 铜精矿 电重量分析法测定铜量》.pdf JUS B G8 470-1983 Ores and concentrates Copper concen trate Electrogravimetric method for determination of copper content《矿石及精矿 铜精矿 电重量分析法测定铜量》.pdf
  • JUS B G8 471-1983 Ores and concentrates Copper concentrate Determination of vvater content《矿石及精矿 铜精矿 测定含水量》.pdf JUS B G8 471-1983 Ores and concentrates Copper concentrate Determination of vvater content《矿石及精矿 铜精矿 测定含水量》.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1