欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    TIA-4940 022-2012 Smart Device Communications Protocol Aspects Deploying and Securing Applications.pdf

    • 资源ID:1060561       资源大小:3.81MB        全文页数:24页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    TIA-4940 022-2012 Smart Device Communications Protocol Aspects Deploying and Securing Applications.pdf

    1、TIA-4940.022November 2012Smart Device Communications; Protocol Aspects; Deploying and Securing ApplicationsNOTICE TIA Engineering Standards and Publications are designed to serve the public interest through eliminating misunderstandings between manufacturers and purchasers, facilitating interchangea

    2、bility and improvement of products, and assisting the purchaser in selecting and obtaining with minimum delay the proper product for their particular need. The existence of such Standards and Publications shall not in any respect preclude any member or non-member of TIA from manufacturing or selling

    3、 products not conforming to such Standards and Publications. Neither shall the existence of such Standards and Publications preclude their voluntary use by Non-TIA members, either domestically or internationally. Standards and Publications are adopted by TIA in accordance with the American National

    4、Standards Institute (ANSI) patent policy. By such action, TIA does not assume any liability to any patent owner, nor does it assume any obligation whatever to parties adopting the Standard or Publication. This Standard does not purport to address all safety problems associated with its use or all ap

    5、plicable regulatory requirements. It is the responsibility of the user of this Standard to establish appropriate safety and health practices and to determine the applicability of regulatory limitations before its use. (From Project No. TIA-PN-4940.022, formulated under the cognizance of the TIA TR-5

    6、0 M2M-Smart Device Communications). Published by TELECOMMUNICATIONS INDUSTRY ASSOCIATION Standards and Technology Department 2500 Wilson Boulevard Arlington, VA 22201 U.S.A. PRICE: Please refer to current Catalog of TIA TELECOMMUNICATIONS INDUSTRY ASSOCIATION STANDARDSAND ENGINEERING PUBLICATIONS or

    7、 call IHS, USA and Canada (1-877-413-5187) International (303-397-2896) or search online at http:/www.tiaonline.org/standards/catalog/All rights reserved Printed in U.S.A. NOTICE OF COPYRIGHT This document is copyrighted by the TIA. Reproduction of these documents either in hard copy or soft copy (i

    8、ncluding posting on the web) is prohibited without copyright permission. For copyright permission to reproduce portions of this document, please contact the TIA Standards Department or go to the TIA website (www.tiaonline.org) for details on how to request permission. Details are located at: http:/w

    9、ww.tiaonline.org/standards/catalog/info.cfm#copyrightorTelecommunications Industry Association Technology (b) there is no assurance that the Document will be approved by any Committee of TIA or any other body in its present or any other form; (c) the Document may be amended, modified or changed in t

    10、he standards development or any editing process. The use or practice of contents of this Document may involve the use of intellectual property rights (“IPR”), including pending or issued patents, or copyrights, owned by one or more parties. TIA makes no search or investigation for IPR. When IPR cons

    11、isting of patents and published pending patent applications are claimed and called to TIAs attention, a statement from the holder thereof is requested, all in accordance with the Manual. TIA takes no position with reference to, and disclaims any obligation to investigate or inquire into, the scope o

    12、r validity of any claims of IPR. TIA will neither be a party to discussions of any licensing terms or conditions, which are instead left to the parties involved, nor will TIA opine or judge whether proposed licensing terms or conditions are reasonable or non-discriminatory. TIA does not warrant or r

    13、epresent that procedures or practices suggested or provided in the Manual have been complied with as respects the Document or its contents. If the Document contains one or more Normative References to a document published by another organization (“other SSO”) engaged in the formulation, development

    14、or publication of standards (whether designated as a standard, specification, recommendation or otherwise), whether such reference consists of mandatory, alternate or optional elements (as defined in the TIA Engineering Manual, 4thedition) then (i) TIA disclaims any duty or obligation to search or i

    15、nvestigate the records of any other SSO for IPR or letters of assurance relating to any such Normative Reference; (ii) TIAs policy of encouragement of voluntary disclosure (see Engineering Manual Section 6.5.1) of Essential Patent(s) and published pending patent applications shall apply; and (iii) I

    16、nformation as to claims of IPR in the records or publications of the other SSO shall not constitute identification to TIA of a claim of Essential Patent(s) or published pending patent applications. TIA does not enforce or monitor compliance with the contents of the Document. TIA does not certify, in

    17、spect, test or otherwise investigate products, designs or services or any claims of compliance with the contents of the Document. ALL WARRANTIES, EXPRESS OR IMPLIED, ARE DISCLAIMED, INCLUDING WITHOUT LIMITATION, ANY AND ALL WARRANTIES CONCERNING THE ACCURACY OF THE CONTENTS, ITS FITNESS OR APPROPRIA

    18、TENESS FOR A PARTICULAR PURPOSE OR USE, ITS MERCHANTABILITY AND ITS NONINFRINGEMENT OF ANY THIRD PARTYS INTELLECTUAL PROPERTY RIGHTS. TIA EXPRESSLY DISCLAIMS ANY AND ALL RESPONSIBILITIES FOR THE ACCURACY OF THE CONTENTS AND MAKES NO REPRESENTATIONS OR WARRANTIES REGARDING THE CONTENTS COMPLIANCE WIT

    19、H ANY APPLICABLE STATUTE, RULE OR REGULATION, OR THE SAFETY OR HEALTH EFFECTS OF THE CONTENTS OR ANY PRODUCT OR SERVICE REFERRED TO IN THE DOCUMENT OR PRODUCED OR RENDERED TO COMPLY WITH THE CONTENTS. TIA SHALL NOT BE LIABLE FOR ANY AND ALL DAMAGES, DIRECT OR INDIRECT, ARISING FROM OR RELATING TO AN

    20、Y USE OF THE CONTENTS CONTAINED HEREIN, INCLUDING WITHOUT LIMITATION ANY AND ALL INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, LITIGATION, OR THE LIKE), WHETHER BASED UPON BREACH OF CONTRACT, BREACH OF WARRANTY, TORT (INCLUDING NEGLI

    21、GENCE), PRODUCT LIABILITY OR OTHERWISE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE FOREGOING NEGATION OF DAMAGES IS A FUNDAMENTAL ELEMENT OF THE USE OF THE CONTENTS HEREOF, AND THESE CONTENTS WOULD NOT BE PUBLISHED BY TIA WITHOUT SUCH LIMITATIONS. TIA-4940.022: Smart Device Communicatio

    22、ns; Protocol Aspects; Deploying and Securing Applications Contents |i 1 Contents 2 3 Protocol Aspects; Deploying and Securing Applications ii |List of Figures List of Figures 1 Figure 1 - Certificate Chaining 82 Figure 2 - Architecture for Securing and Deploying Applications 103 4 5 TIA-4940.022: Sm

    23、art Device Communications; Deploying and Securing Applications Foreword | iii Foreword 1 (This foreword is not part of this Standard.) 2 This document was formulated under the cognizance of the TIA Committee 3 TR-50, Smart Device Communications. 4 The contents of the present document are subject to

    24、continuing work within 5 the Formulating Group and may change following formal approval. Should 6 the Formulating Group approve modification, the present document will be re-7 released with an identifying change of release level, for example: 8 TIA-4940.022-Arevision levelpart numberstandard number9

    25、 The document contains informative annexes. 10 Suggestions for improvement of this document are welcome, and should be 11 sent to: 12 Telecommunications Industry Association, 13 Standards and Technology, 14 2500 Wilson Boulevard, Suite 300 15 Arlington, VA 22201-3834 16 17 TIA-4940.022: Smart Device

    26、 Communications; Protocol Aspects; Deploying and Securing Applications iv |Scope 1 Scope 2 This document is a member of a multi-part standard that, when taken in total, 3 defines the requirements for communications pertaining to the access agnostic 4 (e.g., PHY and MAC agnostic) monitoring and bi-di

    27、rectional communication 5 of events and information between smart devices and other devices, 6 applications and networks. 7 This standard enables organizations to increase security when deploying the 8 applications across a hostile network. 9 This standard provides a common foundation for personnel

    28、who support or 10 use risk management processes for IT systems. 11 12 TIA-4940.022: Smart Device Communications; Deploying and Securing Applications Introduction | i 1) Introduction 1 This standard is designed to build on existing cyber security policies and 2 procedures, help organize and clarify r

    29、isk management goals, and provide a 3 consistent approach in which to make risk decisions. 4 The guidance provided in this standard is intended to address only the 5 management of cyber security related risk derived from or associated with the 6 operation and use of information technology and system

    30、s and/or the 7 environments in which they operate. The guidance is not intended to replace 8 or subsume other risk-related activities, programs, processes, or approaches 9 that organizations have implemented or intend to implement addressing areas 10 of risk management covered by other legislation,

    31、regulation, policies, 11 programmatic initiatives, or mission and business requirements. Additionally, 12 this guidance is not part of any regulatory framework. Rather, the cyber 13 security risk mitigation guidance described herein is complementary to and 14 should be used as part of a more compreh

    32、ensive enterprise risk management 15 program. 16 17 TIA-4940.022: Smart Device Communications; Protocol Aspects; Deploying and Securing Applications ii |Scope 2) References 1 2 2.1 Normative References 3 The following standards contain provisions which, through reference in this 4 text, constitute p

    33、rovisions of this Standard. At the time of publication, the 5 editions indicated were valid. All standards are subject to revision, and parties 6 to agreements based on this Standard are encouraged to investigate the 7 possibility of applying the most recent editions of the standards indicated 8 bel

    34、ow. ANSI and TIA maintain registers of currently valid national standards 9 published by them. 10 References are either specific (identified by date of publication, release level, 11 etc.) or non-specific. For a specific reference, subsequent revisions do not 12 apply. For a non-specific reference,

    35、the latest version applies: a non-specific 13 reference implicitly refers to the latest version. 14 1 TIA-4940.005: Smart Device Communications; 15 Reference Architecture 16 2.2 Informative References 17 The following documents may be useful to the reader 18 a TSB-4940: Smart Device Communications;

    36、Security Aspects 19 TIA-4940.022: Smart Device Communications; Deploying and Securing Applications Defintions, Symbols and Abbreviations |3 3) Defintions, Symbols and Abbreviations 1 This section contains definitions, symbols and abbreviations that are used in 2 this document. 3 4 3.1 Definitions 5

    37、For the purposes of the present document, the following terms and definitions apply: 6 Asymmetric Cryptography: Public key cryptography is an asymmetric scheme that 7 uses a pair of keys for encryption. 8 Attack Surface: All A set of vulnerabilities that, when unprotected, may compromise 9 a system.

    38、 10 Authentication: The process of verifying the identity of entity. 11 Certificate: A document that binds a signature to an entity. 12 Cipher: An algorithm for performing encryption (reverse is decryption). 13 Ciphertext: Encrypting plaintext results in unreadable text. 14 Cleartext: Data that can

    39、be read and understood without any special measures. This 15 term is used interchangeable with “plaintext” in this document. 16 Confidentiality: The assurance to an entity that no one can read a particular piece of 17 data except the receiver(s) explicitly intended. 18 Cryptanalysis: The science of

    40、analyzing and breaking secure communication. 19 Cryptographic algorithm/cipher: A mathematical function used in the encryption and 20 decryption process. 21 Cryptography: The science of using mathematics to secure data via encrypting and 22 decrypting data. 23 Cryptology: Study of both cryptography

    41、and cryptanalysis. 24 Data-at-rest: Data that is stored within entities in a M2M system. 25 Data-in-transit: Data moving between entities in a M2M system. 26 Decryption: The process of reverting ciphertext to its original plaintext. 27 Diffie-Helman: is an anonymous (non-authenticated) key-agreement

    42、 protocol, it 28 provides the basis for a variety of authenticated protocols, and is used to provide 29 perfect forward secrecy in Transport Layer Securitys ephemeral modes. 30 Digital Signature: Enables the recipient of information to verify the authenticity of 31 the informations origin, and also

    43、verify that the information is intact. 32 Encryption: The method of disguising plaintext in such a way as to hide the actual 33 content of the text. 34 TIA-4940.022: Smart Device Communications; Protocol Aspects; Deploying and Securing Applications 4 |Defintions, Symbols and Abbreviations Hash: A on

    44、e-way function takes variable-length input and produces a fixed-length 1 output; that ensures the information has not changed in any way. 2 Integrity: The assurance to an entity that data has not been altered (intentionally or 3 unintentionally) between “there” and “here” or between “then” and “now.

    45、” 4 Key: A value that works with a cryptographic algorithm to produce a specific 5 ciphertext. 6 Non-Repudiation: Ensures that an author cannot refute that they signed or encrypted 7 a particular message once it has been sent, assuming the private key is secured. 8 Public Key Infrastructure: PKI is

    46、a set of hardware, software, people, policies, and 9 procedures needed to create, manage, store, distribute, and revoke Digital 10 Certificates. A Public Key Infrastructure (PKI) enables users of a basically unsecure 11 public network such as the Internet to securely and privately exchange data thro

    47、ugh 12 the use of a public and a private cryptographic key pair that is obtained and shared 13 through a trusted authority. 14 Symmetric Cryptography: One secret key is used both for encryption and 15 decryption. 16 17 3.2 Abbreviations 18 For the purposes of the present document, the following abbr

    48、eviations apply: 19 CIA: Confidentiality, Integrity and Availability. 20 CA: Certification Authority. 21 CRL: Certification Revocation List. 22 DH: Diffie-Helman. 23 DSA: Digital Signature Algorithm. 24 ECC: Elliptical Curve Cryptography. 25 ECDSA: Elliptic Curve Digital Signature Algorithm. 26 FIPS

    49、: Federal Information Processing Standards. 27 HTTP: Hypertext Transfer Protocol. 28 IoT: Internet of Things. 29 IPSec: Internet Protocol Security. 30 M2M: Machine to Machine. 31 MQV: Menezes-Qu-Vanstone algorithm. 32 SHA: Secure Hashing Algorithm. 33 SSL: Secure Sockets Layer 34 TIA-4940.022: Smart Device Communications; Deploying and Securing Applications Cryptology Introduction |5 4) Cryptology Introduction 1 To familiarize the reader with cryptology concepts and terminology that are 2 used within this standard, this introductory section attempts


    注意事项

    本文(TIA-4940 022-2012 Smart Device Communications Protocol Aspects Deploying and Securing Applications.pdf)为本站会员(周芸)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开