1、ISO/IEC 29180:2012/Cor.1:2015 (E) Rec. ITU-T X.1311 (2011)/Cor.1 (11/2014) 1 INTERNATIONAL STANDARD ITU-T RECOMMENDATION Information technology Security framework for ubiquitous sensor networks Technical Corrigendum 1 Conventions used in this corrigendum: Original, unchanged, text is in normal font.
2、 Deleted text is struck-through, thus: deleted text. Inserted text is underlined, thus: inserted text. 1 Clause 2.2 Modify clause 2.2 as follows: 2.2 Paired Recommendations | International Standards equivalent in technical content Recommendation ITU-T X.800 (1991), Security architecture for Open Sys
3、tems Interconnection for CCITT applications. ISO/IEC 7498-2:1989, Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture. Recommendation ITU-T X.805 (2003), Security architecture for systems providing end-to-end communications. ISO/IEC 18028-2
4、:2006, Information technology Security techniques IT network security Part 2: Network security architecture. 2 Clause 2.3 Add the following reference to clause 2.3: Recommendation ITU-T X.805 (2003), Security architecture for systems providing end-to-end communications. 3 Clause 6 Modify the 10th pa
5、ragraph as follows: There are three components in the SN: the application server communicating with the sink node; the sink node called the base station, which interfaces the sensor network and the application server, and the collection of sensor nodes using wireless communication to communicate wit
6、h each other. The sink may communicate with the application server via the Internet or a satellite. Security architecture in the IP-based network is very similar to that in Rec. ITU-T X.805 | ISO/IEC 18028-2. Therefore, this Recommendation | International Standard focuses on the security of the wire
7、less sensor network (SN) consisting of a set of sensor nodes using wireless transmission. 4 Clause 7.1.1 Modify the first sentence of the first paragraph as follows: Rec. ITU-T X.800 | ISO/IEC 7498-2 and Rec. ITU-T X.805 | ISO/IEC 18028-2cite the following security threats to the networks (note that
8、 these are also security threats applicable to the SN): 5 Clause 7.1.2 Modify the first sentence of the first paragraph as follows: Rec. ITU-T X.800 | ISO/IEC 7498-2 and Rec. ITU-T X.805 | ISO/IEC 18028-2 identify five threats that are applicable to routing-related message exchange in the SN. In add
9、ition to these, seven threats are identified in (see Karlrof et al. in the Bibliography) with regard to the routing messages exchanged between sensor nodes. ISO/IEC 29180:2012/Cor.1:2015 (E) 2 Rec. ITU-T X.1311 (2011)/Cor.1 (11/2014) 6 Clause 7.2 Modify the first sentence of the first paragraph as f
10、ollows: The threat models developed in Rec. ITU-T X.805 | ISO/IEC 18028-2 can be applied to the IP network. Therefore, refer to Rec. ITU-T X.805 | ISO/IEC 18028-2 for the details of those threats. 7 Clause 8 Modify the second paragraph as follows: To counter the aforesaid threats in both the SN and
11、the IP networks, the following security dimensions in Rec. ITU-T X.805 | ISO/IEC 18028-2 are applicable: 8 Clause 9.1.1 Modify the first paragraph as follows: Table 1 lists the security requirements and describes the relationship between the security dimensions and the security threats identified in
12、 Rec. ITU-T X.805 | ISO/IEC 18028-2. The letter “Y“ in a cell formed by the intersection of the tables columns and rows suggests that a particular security threat is opposed by the corresponding security dimension. 9 Clause 9.2 Modify the first paragraph as follows: The security threats and security
13、 dimensions developed in Rec. ITU-T X.805 | ISO/IEC 18028-2 can directly be applied to a secure message exchange through the IP network. Therefore, refer to Rec. ITU-T X.805 | ISO/IEC 18028-2 for related details. 10 Clause 10.7 Modify the first paragraph as follows: The IP network security technologies in Rec. ITU-T X.805 | ISO/IEC 18028-2 can directly be applied to secure message exchange through the IP network. Therefore, related details can be omitted.