ETSI GSM 02 09-1993 European Digital Cellular Telecommunication System (Phase 2) Security Aspects (ETS 300 506 Version 4 3 0)《欧洲数字蜂窝通信系统(第2阶段) 安全方面(ETS 300 506 版本4 3 0)》.pdf

上传人:roleaisle130 文档编号:733477 上传时间:2019-01-08 格式:PDF 页数:6 大小:301.23KB
下载 相关 举报
ETSI GSM 02 09-1993 European Digital Cellular Telecommunication System (Phase 2) Security Aspects (ETS 300 506 Version 4 3 0)《欧洲数字蜂窝通信系统(第2阶段) 安全方面(ETS 300 506 版本4 3 0)》.pdf_第1页
第1页 / 共6页
ETSI GSM 02 09-1993 European Digital Cellular Telecommunication System (Phase 2) Security Aspects (ETS 300 506 Version 4 3 0)《欧洲数字蜂窝通信系统(第2阶段) 安全方面(ETS 300 506 版本4 3 0)》.pdf_第2页
第2页 / 共6页
ETSI GSM 02 09-1993 European Digital Cellular Telecommunication System (Phase 2) Security Aspects (ETS 300 506 Version 4 3 0)《欧洲数字蜂窝通信系统(第2阶段) 安全方面(ETS 300 506 版本4 3 0)》.pdf_第3页
第3页 / 共6页
ETSI GSM 02 09-1993 European Digital Cellular Telecommunication System (Phase 2) Security Aspects (ETS 300 506 Version 4 3 0)《欧洲数字蜂窝通信系统(第2阶段) 安全方面(ETS 300 506 版本4 3 0)》.pdf_第4页
第4页 / 共6页
ETSI GSM 02 09-1993 European Digital Cellular Telecommunication System (Phase 2) Security Aspects (ETS 300 506 Version 4 3 0)《欧洲数字蜂窝通信系统(第2阶段) 安全方面(ETS 300 506 版本4 3 0)》.pdf_第5页
第5页 / 共6页
点击查看更多>>
资源描述

1、H 3404583 0077963 735 Released: July 1, 1993 GSM 02.09 Version: 4.2.1 Date: 7 June, 1993 Work Item No: Key words: European digital cellular telecommunication system (phase 2); SECURITY ASPECTS ETS I European Telecommunications Standards Institute ETSI Secretarlat: Route des Lucioles, F-O6921 Sophia

2、Antipolis Cedex . France Tp. + 33 92 94 42 O0 TF. + 33 93 65 47 16 Tx. 47 00 40 F This is an unpublished work the copyright in which vests in the European Telecommunications Standards Institute. All rights reserved. The information contained herein is the property of ETSI and no part may be reproduc

3、ed or used except as authorised by contract or other written permission. The copyright and the foregoing restriction on reproduction and use extend to all media in which the information may be embodied. 3404583 0077964 671 W Page 3 GSM 02.09 . verilon 4.2.1 : June 1993 CONTENTS 1 . SCOPE . 5 2 . GEN

4、ERAL . 5 3.3. 3.4. 3.5. 3 . SECURITY FEATURES PROVIDED IN A GSM PLMN 5 3.1. Subscriber Identity Confidentiality . 6 3.1.1. Definition . 6 3.1.2. Purpose . 6 3.1.3. Functional requirements . 6 Subscriber Identity Authentication . 6 3.2.1. Definition . 6 3.2.2. Purpose . 6 3.2.3. Functional requiremen

5、ts . 6 3.2.4. Authentication during a malfunction of the network . 7 User Data Confidentiality On Physical Connections (Voice and Non-voice) . 7 3.3.1. Definition . 7 3.3.2. Purpose . 7 3.3.3. Functional requirements . 7 Connectionless User Data Confidentiality 8 3.4.1. Definition . 8 3.4.2. Purpose

6、 . 8 3.4.3. Functional requirements . 8 Signalling Information Element Confidentiality . 8 3.5.1. Definition . 8 3.5.2. Purpose . 8 3.5.3. Functional requirements . 8 3.2. Previous page is blank 3404583 0077b5 508 Page 5 GSM 02.09 - version 4.2.1 : June 1993 1. SCOPE Bearer and Teleservices, as resp

7、ectively defined in GSM TS 02.02 and 02.03, are the objects which the GSM PLMN operators offer to their customers. Besides these basic telecommunications services, features which aim at up-grading these basic cervices need also to be offered. Due to the use of radiocommunications in a PLMN, which ar

8、e of a special nature compared to classical distribution transmission techniques used in the fixed networks, such a category of features is related to security aspects. In a GSM PLMN, both the users and the network operator have to be protected against undesirable intrusion of third parties. However

9、, measures should be provided for in order to insure maximum protection of the rights of the individuals concerns. As a consequence, a security feature is either a supplementary service to Tele or Bearer services, which can be selected by the subscriber, or a network function involved in the provisi

10、on of one or several telecommunication services. The purpose of this Specification is to define the security features which are to be available in a GSM PLMN, together with the associated levels of protection. This Specification is only concerned with those security features which aim at the up-grad

11、ing of the security in a GSM PLMN. In particular, end-to-end security is outside the scope of this Specification. The implementation aspects of security features are described in GSM TS 03.20. 2. GENERAL The use of radiocommunications for transmission to the mobile subscribers makes PLMNs particular

12、y sensitive to: - misuse of their resources by unauthorized persons using manipulated Mobile Stations, who try to impersonate authorized Subscribers; and - eavesdropping of the various informations which are exchanged on the radiopath. It can be seen that PLMNs intrinsically do not provide the same

13、level of protection to their operators and subscribers as the traditional telecommunication networks provide. This fact leads to the need to implement security features in a GSM PLMN in order to protect: i) the access to the mobile services; ii) any relevant item from being disclosed at the radiopat

14、h, mainly in order to ensure the privacy of user- related information. Two levels of protection are therefore assumed : - where security features are provided, as defined in Section 3, the level of protection at the radiopath of the corresponding items is as good as the level of protection provided

15、in the f xed networks: - where no special provision is made , the level of protection at the radiopath is null. All items which are not dealt with in Section 3 are therefore considered to need no protection. 3. SECURITY FEATURES PROVIDED IN A GSM PLMN The following security features are considered :

16、 - subscriber identity (IMSI) confidentiality; - subscriber identity (IMSI) authentication; - user data confidentiality on physical connections; Previous page is blank 3Y04583 007bb 444 Page 6 GSM 02.09 - version 4.2.1 : June 1993 I - connectionless user data confidentiality; - signalling informatio

17、n element confidentiality. The implementation of these five security features is mandatory on both the fixed infrastructure side and the MS side. This means that all GSM PLMNs and all MSs shall be able to support every security feature. Use of these five security features is at the discretion of the

18、 operator for its own subscribers while on the HPLMN. For roaming subscribers, use of these five security features is mandatory unless otherwise agreed by all the affected PLMN operators. (See also 3.3.3). 3.1. Subscriber identity Confldentiallty 3.1.1. Definition The subscriber identity confidentia

19、lity feature is the property that the IMSI is not made available or disclosed to unauthorized individuals, entities or processes. 3.1.2. Purpose This feature provides for the privacy of the identities of the subscribers who are using GSM PLMN resources (e.g. a traffic channel or any signalling means

20、). It allows for the improvement of all other security features (e.g. user data confidentiality) and provides for the protection against tracing the location of a mobile subscriber by listening to the signalling exchanges on the radio path. 3.1.3. Functional requirements This feature necessitates th

21、e confidentiality of the subscriber identity (IMSI) when it is transferred in signalling messages (see Section 3.5) together with specific measures to preclude the possibility to derive it indirectly from listening to specific informations, such as addresses, at the radiopath. The means used to iden

22、tify a mobile subscriber on the radiopath consists of a local number called TMSI (Temporary Mobile Subscriber identity), described in GSM TS 03.20. When used, the subscriber identity confidentiality feature shall apply for all signalling sequences on the radiopath. 1 However, in the case of location

23、 register failure, or in case the MS has no TMSI available, open identification is allowed on the radiopath. 3.2. Subscriber Identity Authentication 3.2.1. Definition Subscriber identity (IMSI) authentication is the corroboration by the land-based part of the system that the subscriber identity (IMS

24、I or TMSI), transferred by the mobile subscriber within the identification procedure at the radiopath,is the one claimed. 3.2.2. Purpose The purpose of this authentication security feature is to protect the network against unauthorized use. It enables also the protection of the GSM PLMN subscribers

25、by denying the possibility for intruders to impersonate authorized users. 3.2.3. Functional requirements The authentication of the GSM PLMN subscriber identity may be triggered by the network when the subscriber applies for: - a change of subscriber-related information element in the VLR or HLR (inc

26、luding some or all of: location up-dating involving change of VLR. registration or erasure of a 3404583 0077967 380 Page 7 GSM 02.09 - verslon 4.2.1 : June 1993 supplementary service), or - an access to a service (including some or all of: Set-up of mobile originating or terminated calls, activation

27、 or deactivation of a supplementary service), or - first network access after restart of MSCNLR, or in the event of cipher key sequence number mismatch. Physical security means must be provided to preclude the possibility to obtain sufficient information to impersonate or duplicate a subscriber in a

28、 GSM PLMN, in particular by deriving sensitive information from the mobile station equipment. If, on an access request to the GSM PLMN, the subscriber identity authentication procedure fails and this failure is not due to network malfunction, then the access to the GSM PLMN shall be denied to the re

29、questing party. 3.2.4. Authentlcatlon durlng a malfunction of the network If an MS is registered and has been succesfully authenticated, whether active or not active on a call, calls are permitted (including continuation and handover). If an MS has already been registered (and therefore been already

30、 authenticated) and can not be successfully reauthenticated due to the network malfunction (e.g. the HPLMN was not able to provide authentication pairs RAND, SRES), calls are permitted. If an MS attempts to register and can not be successfully authenticated due to the network malfunction, calls are

31、not permitted. If the MS is not registered, or ceases to be registered, a new registration need to be performed, and the preceding cases apply. 3.3. User Data Confidentiality On Physical Connections (Voice and Non-voice) 3.3.1. Definltlon The user data confidentiality feature on physical connections

32、 is the property that the user information exchanged on traffic channels is not made available or disclosed to unauthorized individuals, entities or processes. 3.3.2. Purpose The purpose of this feature is to ensure the privacy of the user information on traffic channels. 3.3.3. Functionat requireme

33、nts Encryption will normally be applied to all voice and non-voice communications. Although a standard algorithm will normally be employed, it is permissible for the mobile station and/or PLMN infrastructure to support more than one algorithm. In this case, the infrastructure is responsible for deci

34、ding which algorithm to use (including the possibility not to use encryption, in which case confidentiality is not applied). When necessary, the MS shall signal to the network indicating which of up to seven encryption, plus one transparent. algorithms it supports. (Note: The effect of the “transpar

35、ent algorithm“ being selected is the same as not being encrypted.) The serving network then selects one of these that it can support (based on an order of priority preset in the network), and signals this to the MS. The selected algorithm is then used by the MS and network. m 3404583 0077b8 217 m I

36、* Page 8 GSM 02.09 - version 4.2.1 : June 1993 3.4. Connectionless User Data Confidentlality 3.4.1. Definition The connectionless user data confidentiality feature is the property that the user information which is transferred in a connectionless packet mode over a signalling channel is not made ava

37、ilable or disclosed to unauthorized individuals, entities or processes. 3.4.2. Purpose The purpose of this feature is to ensure the privacy of the user information on signalling channels (e.g. short messages). 3.4.3. Functlonal requirements Note1 : Protection of connectionless user data is not appli

38、cable to SMS Cell Broadcast. 3.5. Slgnalllng Information Element Confidentiality 3.5.1. Deflnltion The signalling information element confidentiality feature is the property that a given piece of signalling information which is exchanged between mobile stations and base stations is not made availabl

39、e or disclosed to unauthorized individuals, entities or processes. 3.5.2. Purpose The purpose of this feature is to ensure the privacy of users related signalling elements. 3.5.3. Functional requirements When used, this feature applies on selected fields of signalling messages which are exchanged be

40、tween mobile stations an? tase stations. The signalling information eements included in the message used to establish the connection (protocol discriminator, connection reference, message type and mobile station identity (IMSI, TMSI or IMEI according to the circumstance) are not protected. The follo

41、wing signalling information elements related to the user are protected whenver used after connection establishment: - - - - International Mobile Equipment Identity (IMEI) International Mobile Subscriber Identity (IMSI); Calling subscriber directory number (mobile terminating calls) ; Called subscriber directory number (mobile originated calls). 1 The IMEI requires physical protection against being removed, replaced or its contents being changed by unauthoriced individuals. The IMSI is stored securely within the SIM.

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1