ETSI TS 102 941-2012 Intelligent Transport Systems (ITS) Security Trust and Privacy Management (V1 1 1)《智能交通系统(ITS) 安全 可信与隐私管理 版本1 1 1》.pdf

上传人:dealItalian200 文档编号:739733 上传时间:2019-01-11 格式:PDF 页数:30 大小:216.89KB
下载 相关 举报
ETSI TS 102 941-2012 Intelligent Transport Systems (ITS) Security Trust and Privacy Management (V1 1 1)《智能交通系统(ITS) 安全 可信与隐私管理 版本1 1 1》.pdf_第1页
第1页 / 共30页
ETSI TS 102 941-2012 Intelligent Transport Systems (ITS) Security Trust and Privacy Management (V1 1 1)《智能交通系统(ITS) 安全 可信与隐私管理 版本1 1 1》.pdf_第2页
第2页 / 共30页
ETSI TS 102 941-2012 Intelligent Transport Systems (ITS) Security Trust and Privacy Management (V1 1 1)《智能交通系统(ITS) 安全 可信与隐私管理 版本1 1 1》.pdf_第3页
第3页 / 共30页
ETSI TS 102 941-2012 Intelligent Transport Systems (ITS) Security Trust and Privacy Management (V1 1 1)《智能交通系统(ITS) 安全 可信与隐私管理 版本1 1 1》.pdf_第4页
第4页 / 共30页
ETSI TS 102 941-2012 Intelligent Transport Systems (ITS) Security Trust and Privacy Management (V1 1 1)《智能交通系统(ITS) 安全 可信与隐私管理 版本1 1 1》.pdf_第5页
第5页 / 共30页
点击查看更多>>
资源描述

1、 ETSI TS 102 941 V1.1.1 (2012-06) Intelligent Transport Systems (ITS); Security; Trust and Privacy Management Technical Specification ETSI ETSI TS 102 941 V1.1.1 (2012-06)2Reference DTS/ITS-0050015 Keywords interoperability, ITS, management, security ETSI 650 Route des Lucioles F-06921 Sophia Antipo

2、lis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present

3、 document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of

4、 the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/statu

5、s/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction

6、 extend to reproduction in all media. European Telecommunications Standards Institute 2012. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTETMare Trade Marks of ETSI registered for the benefit of its M

7、embers and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TS 102 941 V1.1.1 (2012-06)3Contents Intellectual Property Rights 4g3Foreword . 4g31 Scope 5g32 References 5g32.1 Normative references . 5g32.2 Informative refe

8、rences 6g33 Definitions and abbreviations . 6g33.1 Definitions 6g33.2 Abbreviations . 6g34 ITS authority hierarchy 7g34.1 Overview 7g34.2 ITS authorities 7g34.2.1 Enrolment Authority . 7g34.2.2 Authorization Authority 8g34.2.3 Root CA 8g35 Privacy in ITS . 8g36 Trust and privacy management 9g36.1 IT

9、S-S Security Lifecycle 9g36.1.1 Manufacture 9g36.1.2 Enrolment . 10g36.1.3 Authorization 10g36.1.4 Maintenance 10g36.2 Public Key Infrastructure . 10g36.2.1 Assumption and requirements. 10g36.2.2 Message Sequences. 10g36.2.2.1 Introduction . 10g36.2.2.2 Enrolment Request 11g36.2.2.3 Authorization Re

10、quest. 13g37 Security association and key management between ITS Stations 16g37.1 Broadcast SAs 16g37.2 Multicast SAs . 16g37.3 Unicast SAs 17g3Annex A (informative): ITS security messages specified in ASN.1 18g3A.1 ITS trust and privacy messages specified in ASN.1 . 18g3A.2 Enrolment and authorizat

11、ion message structures . 18g3Annex B (informative): Secret-key use cases and application categories 26g3Annex C (informative): Extensions to IEEE 1609.2 to support additional security functions 27g3C.1 Rationale . 27g3C.2 Use of a cryptographic digest of the signer identifier 27g3C.3 Encryption of t

12、he signer identifier in an authorization certificate request . 27g3C.4 Request and transmission of multiple authorization certificates 28g3Annex D (informative): Bibliography . 29g3History 30 ETSI ETSI TS 102 941 V1.1.1 (2012-06)4Intellectual Property Rights IPRs essential or potentially essential t

13、o the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to

14、ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the exi

15、stence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by ETSI Technical Committee Intelligent Transport System (ITS). ETSI ETS

16、I TS 102 941 V1.1.1 (2012-06)51 Scope The present document specifies the trust and privacy management for Intelligent Transport System (ITS) communications. Based upon the security services defined in TS 102 731 1 and the security architecture define in TS 102 940 5, it identifies the trust establis

17、hment and privacy management required to support security in an ITS environment and the relationships that exist between the entities themselves and the elements of the ITS reference architecture defined in EN 302 665 2. The present document identifies and specifies security services for the establi

18、shment and maintenance of identities and cryptographic keys in an Intelligent Transport System (ITS). Its purpose is to provide the functions upon which systems of trust and privacy can be built within an ITS. 2 References References are either specific (identified by date of publication and/or edit

19、ion number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected loc

20、ation might be found at http:/docbox.etsi.org/Reference. NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity. 2.1 Normative references The following referenced documents are necessary for the application of the prese

21、nt document. 1 ETSI TS 102 731: “Intelligent Transport Systems (ITS); Security; Security Services and Architecture“. 2 ETSI EN 302 665: “Intelligent Transport Systems (ITS); Communications Architecture“. 3 ETSI TS 102 867: “Intelligent Transport Systems (ITS); Security; Stage 3 mapping for IEEE 1609

22、.2“. 4 ETSI TS 102 942: “Intelligent Transport Systems (ITS); Security; Access control“. 5 ETSI TS 102 940: “Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management“. 6 ISO/IEC 8824-1:2008: “Information technology - Abstract Syntax Notation One

23、 (ASN.1): Specification of basic notation“. 7 ISO/IEC 8825-2:2008: “Information technology - ASN.1 encoding rules: Specification of Packed Encoding Rules (PER)“. 8 IEEE P1609.2/D12 (January 2012): “IEEE Draft Standard for Wireless Access in Vehicular Environments - Security Services for Applications

24、 and Management Messages“. NOTE: Available from http:/ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?reload=true Security; Confidentiality services“. ETSI ETSI TS 102 941 V1.1.1 (2012-06)62.2 Informative references The following referenced documents are not necessary for the application of the present

25、document but they assist the user with regard to a particular subject area. i.1 ISO/IEC 15408-2: “Information technology - Security techniques - Evaluation criteria for IT security; Part 2: Security functional components“. i.2 ETSI TR 102 638: “Intelligent Transport Systems (ITS); Vehicular Communic

26、ations; Basic Set of Applications; Definitions“. i.3 IETF RFC 4046: “Multicast Security (MSEC) Group Key Management Architecture“. i.4 IETF RFC 4301: “Security Architecture for the Internet Protocol“. i.5 IETF RFC 4302: “IP Authentication Header“. i.6 IETF RFC 4303: “IP Encapsulating Security Payloa

27、d (ESP)“. i.7 IETF RFC 5246: “The Transport Layer Security (TLS) Protocol Version 1.2“. i.8 IETF RFC 3547: “The Group Domain of Interpretation“. i.9 IETF RFC 3830: “MIKEY: Multimedia Internet KEYing“. i.10 IETF RFC 4535: “GSAKMP: Group Secure Association Key Management Protocol“. 3 Definitions and a

28、bbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: anonymity: ability of a user to use a resource or service without disclosing the users identity authorization authority: authority that provides an ITS-S with permission to invoke ITS ap

29、plications and services canonical identifier: structured identifier that is globally unique enrolment authority: authority that validates that an ITS-S can be trusted to function correctly pseudonymity: ability of a user to use a resource or service without disclosing its user identity while still b

30、eing accountable for that use unlinkability: ability of a user to make multiple uses of resources or services without others being able to link these uses together unobservability: ability of a user to use a resource or service without others, especially third parties, being able to observe that the

31、 resource or service is being used 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: AA Authorization Authority CA Certification AuthorityCAM Cooperative Awareness Message CRL Certificate Revocation List CSR Certificate Signing Request DENM Decentralized

32、Environmental Notification Message EA Enrolment Authority ETSI ETSI TS 102 941 V1.1.1 (2012-06)7ITS Intelligent Transport System ITS-AID ITS Application ID ITS-S ITS Station MSEC Multicast Security PKI Public Key Infrastructure PSID Provider Service Identifier SA Security Association SSP Service Spe

33、cific Permissions TLS Transport Layer Security 4 ITS authority hierarchy 4.1 Overview Trust and privacy management requires secure distribution and maintenance (including revocation when applicable) of trust relationships, which may be enabled by specific security parameters that include 3rdparty ce

34、rtificates of proof of identity or other attributes such as pseudonym certificates. Public key certificates and Public Key Infrastructure (PKI) are used to establish and maintain trust between the ITS-S and other ITS stations and authorities. TS 102 731 1 defines the security management roles taken

35、by: manufacturers: - insert an ITS authoritative identity (canonical identifier) into each ITS-S; Enrolment Authorities (EA): - verify an ITS Station (ITS-S) as a whole; and Authorization Authorities (AA): - authorize an ITS-S to use a particular application, service, or privilege. Separation of enr

36、olment (identification and authentication) and authorization has been shown in TS 102 731 1 as an essential component of privacy management and provides protection against attacks on a users privacy. However, it is possible for the EA role to be delegated to the manufacturer and for the EA and AA ro

37、les to be assumed by a single authority. NOTE: EN 302 665 2 defines an ITS registration authority role to protect against the distribution of malicious ITS applications. Registration authorities are responsible for registering and managing ITS applications exclusively and are not involved in operati

38、onal security management. 4.2 ITS authorities 4.2.1 Enrolment Authority The EA issues a proof of identity authenticating the canonical identifier issued to the ITS-S. The proof of identity does not reveal the canonical identifier to a 3rdparty and may be used by the ITS-S to request authorization of

39、 services from an AA. The functions provided by the EA are as follows: the authentication of the canonical identifier of an ITS-S; the provision of proof of authentication of the ITS-S. ETSI ETSI TS 102 941 V1.1.1 (2012-06)84.2.2 Authorization Authority An ITS-S that has enrolled with, and been auth

40、enticated by, an EA may apply to an AA for specific permissions within the enrolment authoritys domain and the AAs authorization context. These privileges are denoted by means of authorization credentials in the form of IEEE 1609.2 8 authorisation certificates. Each authorization certificate specifi

41、es a particular authorization context which comprises a set of permissions. EXAMPLE 1: An authorization certificate might grant permission to an ITS-S to broadcast messages from a particular message set. Alternatively, it might grant permission to claim certain privileges. The authorization context

42、is specified either by explicitly encoding the permissions granted or by including a reference to a known policy that specifies the context. NOTE: An AA will normally be responsible for a particular set of contexts which may be specified by one or more of the following: square4 application (for exam

43、ple, cooperative awareness applications for personal user vehicles, emergency service vehicles or tolling); square4 time period; square4 geographic region (nation, state, locality); or square4 any other criteria that can be encoded. The authorization system may comprise a hierarchy of authorization

44、authorities with lower-layer authorities authorizing ITS stations and higher-layer authorities authorizing lower-level authorities. EXAMPLE 2: The following three layer structure might be appropriate for official use vehicles: a) ITS global (National) authorization authority; b) ITS regional authori

45、zation authority; and c) ITS local authorization authority. EXAMPLE 3: For personal user vehicles, it might be appropriate to have a single authorization authority (either national or system-wide) for CAMs and DENMs, because short certificate chains reduce the packet size associated with authorizati

46、on data. An AA should be unable to link the proof of authentication to the canonical identifier of an ITS-S without the collusion of the EA that performed the verification of the canonical identifier of the ITS-S. 4.2.3 Root CA Each CA hierarchy (for EA or AA) has at its summit a Root Certificate, w

47、hich is the ultimate root of trust for all certificates within that hierarchy. In order to trust an incoming message, an ITS-S must have access at least to the root certificate at the summit of the hierarchy for the authorization certificate attached to the message. The ITS-S may obtain root certifi

48、cates during the manufacture or maintenance lifecycle stages described in clauses 6.1.1 to 6.1.4 respectively. In principle root certificate information may be distributed over the air through a cross-certification process, but the present document does not specify messages to support this use case.

49、 5 Privacy in ITS ISO/IEC 15408-2 i.1 identifies 4 key attributes that relate to privacy: anonymity; pseudonymity; unlinkability; and unobservability. ETSI ETSI TS 102 941 V1.1.1 (2012-06)9Anonymity alone is insufficient for protection of an ITS users privacy and unsuitable as a solution for ITS, as one of the main requirements of ITS is that the ITS-S should be observable in order to provide improved safety. Consequently, pseudonymity and unlinkability offer the appropriate protection of the priva

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1