欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ISO IEC 29180-2012 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networks《信息技术.pdf

    • 资源ID:1257183       资源大小:2MB        全文页数:42页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ISO IEC 29180-2012 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networks《信息技术.pdf

    1、 Reference number ISO/IEC 29180:2012(E) ISO/IEC 2012INTERNATIONAL STANDARD ISO/IEC 29180 First edition 2012-12-01 Information technology Telecommunications and information exchange between systems Security framework for ubiquitous sensor networks Technologies de linformation Tlcommunications et chan

    2、ge dinformations entre systmes Cadre de scurit pour rseaux de capteurs ubiquitaires ISO/IEC 29180:2012(E) COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2012 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or me

    3、chanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.

    4、iso.org Published in Switzerland ii ISO/IEC 2012 All rights reservedISO/IEC 29180:2012(E) ISO/IEC 2012 All rights reserved iiiCONTENTS Page 1 Scope 1 2 Normative references 1 2.1 Identical Recommendations | International Standards 1 2.2 Paired Recommendations | International Standards equivalent in

    5、technical content . 1 2.3 Additional references 1 3 Definitions 2 3.1 Terms defined elsewhere . 2 3.2 Terms defined in this Recommendation | International Standard 2 4 Abbreviations . 3 5 Conventions 4 6 Overview 4 7 Threats and security models for ubiquitous sensor networks . 7 7.1 Threat models in

    6、 sensor networks . 7 7.2 Threat models in IP networks 10 7.3 Security model for USNs 10 8 General security dimensions for USN 10 9 Security dimensions and threats in ubiquitous sensor networks . 11 9.1 Security dimensions and threats for the message exchange in sensor networks . 11 9.2 Security dime

    7、nsion and threats for the message exchange in the IP network . 14 10 Security techniques for ubiquitous sensor networks . 14 10.1 Key management . 14 10.2 Authenticated broadcast 15 10.3 Secure data aggregation 16 10.4 Data freshness . 17 10.5 Tamper-resistant module . 17 10.6 USN middleware securit

    8、y . 17 10.7 IP network security . 17 10.8 Sensor node authentication 18 10.9 Privacy protection in sensor networks . 18 11 Specific security functional requirements for USN 18 11.1 Mandatory functional requirement 18 11.2 Recommended functional specifications . 18 11.3 Optional functional specificat

    9、ions . 18 Annex A Key management in sensor networks 20 A.1 Threat time 20 A.2 Key management classes . 20 A.3 Key schemes 21 Annex B Authenticated broadcast in sensor networks: TPC 23 B.1 Construction of TPC . 23 B.2 Construction of TPCT . 24 B.3 Authenticated broadcast 25 Annex C Authentication mec

    10、hanisms in sensor networks 26 C.1 XOR-based mechanism . 26 C.2 Hash-based mechanism . 27 C.3 Public key-based authentication 29 Annex D Secure data aggregation in sensor networks 32 D.1 Elect aggregation node and supervisor 32 D.2 Implementation of supervisor functions 33 D.3 Upload supervising mess

    11、age . 33 D.4 Determine the trust of aggregation nodes 33 ISO/IEC 29180:2012(E) iv ISO/IEC 2012 All rights reservedPage D.5 Send revocation message 33 Bibliography 34 ISO/IEC 29180:2012(E) ISO/IEC 2012 All rights reserved vForeword ISO (the International Organization for Standardization) and IEC (the

    12、 International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particu

    13、lar fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have establi

    14、shed a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technica

    15、l committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and I

    16、EC shall not be held responsible for identifying any or all such patent rights. ISO/IEC 29180 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 6, Telecommunications and information exchange between systems, in collaboration with ITU-T. The identical te

    17、xt is published as Rec. ITU-T X.1311 (02/2011). Introduction This Recommendation | International Standard describes the security threats to and security requirements of the ubiquitous sensor network. In addition, this Recommendation | International Standard categorizes the security technologies acco

    18、rding to the security functions that satisfy the said security requirements and where the security technologies are applied in the security model of ubiquitous sensor networks. Finally, the security functional requirements and security technologies for the ubiquitous sensor networks are presented. I

    19、SO/IEC 29180:2012(E) vi ISO/IEC 2012 All rights reservedISO/IEC 29180:2012 (E) Rec. ITU-T X.1311 (02/2011) 1 INTERNATIONAL STANDARD RECOMMENDATION ITU-T Information technology Security framework for ubiquitous sensor networks 1 Scope The recent advancement of wireless-based communication technology

    20、and electronics has facilitated the implementation of a low-cost, low-power sensor network. Basically, a ubiquitous sensor network (USN) consists of three parts: a sensor network consisting of a large number of sensor nodes, a base station (also known as a gateway) interfacing between the sensor net

    21、works and an application server, and the application server controlling the sensor node in the sensor network or collecting the sensed information from the sensor nodes in the sensor network. USN can be an intelligent information infrastructure of advanced e-Life society, which delivers user-oriente

    22、d information and provides knowledge services to anyone anytime, anywhere and wherein information and knowledge are developed using context awareness by detecting, storing, processing, and integrating the situational and environmental information gathered from sensor tags and/or sensor nodes affixed

    23、 to anything. Since there are many security and privacy threats in transferring and storing information in the USN, appropriate security mechanisms may be needed to protect against those threats in the USN. This Recommendation | International Standard describes the security threats to and security r

    24、equirements of the ubiquitous sensor network. In addition, this Recommendation | International Standard categorizes the security technologies according to the security functions that satisfy the said security requirements and where the security technologies are applied in the security model of the U

    25、SN. Finally, the security requirements and security technologies for the USN are presented. 2 Normative references The following Recommendations and International Standards contain provisions which, through reference in this text, constitute provisions of this Recommendation | International Standard

    26、. At the time of publication, the editions indicated were valid. All Recommendations and Standards are subject to revision, and parties to agreements based on this Recommendation | International Standard are encouraged to investigate the possibility of applying the most recent edition of the Recomme

    27、ndations and Standards listed below. Members of IEC and ISO maintain registers of currently valid International Standards. The Telecommunication Standardization Bureau of the ITU maintains a list of currently valid ITU-T Recommendations. 2.1 Identical Recommendations | International Standards None.

    28、2.2 Paired Recommendations | International Standards equivalent in technical content Recommendation ITU-T X.800 (1991), Security architecture for Open Systems Interconnection for CCITT applications. ISO/IEC 7498-2:1989, Information processing systems Open Systems Interconnection Basic Reference Mode

    29、l Part 2: Security Architecture. Recommendation ITU-T X.805 (2003), Security architecture for systems providing end-to-end communications. ISO/IEC 18028-2:2006, Information technology Security techniques IT network security Part 2: Network security architecture. 2.3 Additional references Recommendat

    30、ion ITU-T H.235.0 (2005), H.323 security: Framework for security in H-series (H.323 and other H.245-based) multimedia systems. Recommendation ITU-T X.1111 (2007), Framework of security technologies for home network. Recommendation ITU-T X.1191 (2009), Functional requirements and architecture for IPT

    31、V security aspects. ISO/IEC 29180:2012 (E) 2 Rec. ITU-T X.1311 (02/2011) Recommendation ITU-T Y.2221 (2010), Requirements for support of ubiquitous sensor network (USN) applications and services in the NGN environment. Recommendation ITU-T Y.2701 (2007), Security requirements for NGN release 1. FIPS

    32、 PUB 140-2 (2001), Security Requirements for Cryptographic Modules. 3 Definitions 3.1 Terms defined elsewhere This Recommendation | International Standard uses the following terms defined elsewhere: 3.1.1 Terms from FIPS PUB 140-2 a) key transport b) tamper detection c) tamper evidence d) tamper res

    33、ponse. 3.1.2 Terms from Rec. ITU-T Y.2221 a) sensor b) sensor network c) USN middleware d) ubiquitous sensor network (USN). 3.1.3 Terms from Rec. ITU-T H.235.0 a) attack. 3.1.4 Terms from Rec. ITU-T X.1191 a) tamper-resistant. 3.1.5 Terms from Rec. ITU-T X.800 | ISO/IEC 7498-2 This Recommendation |

    34、International Standard uses the following terms, which are defined elsewhere: a) access control b) authentication c) authorization d) confidentiality e) data origin authentication f) denial of service g) digital signature h) integrity i) key j) key management k) peer-entity authentication l) privacy

    35、 m) repudiation n) security policy o) threat. 3.2 Terms defined in this Recommendation | International Standard For the purposes of this Recommendation | International Standard, the following definitions apply: 3.2.1 aggregator node: Sensor node that performs the data aggregation function in a senso

    36、r network. ISO/IEC 29180:2012 (E) Rec. ITU-T X.1311 (02/2011) 3 3.2.2 bootstrapping: Refers to a process performed in a secure context prior to the deployment of the sensor node to establish a security association between the sensor nodes that may have been initialized with credentials, enabling a s

    37、ensor node to communicate securely with other sensor nodes after their deployment. 3.2.3 credentials: Set of security-related information consisting of keys, keying materials, and cryptographic algorithm-related parameters permitting a successful interaction with a security system. 3.2.4 data aggreg

    38、ation: In-network process that transfers the aggregation value to the sink node by combining the sensed values sent by a number of sensor nodes into concise digest. 3.2.5 group-wise key: Refers to a key that is used to protect multicast communications among a set of sensor nodes over a shared wirele

    39、ss link. 3.2.6 intrusion detection: Process of monitoring the events occurring in a computer system or a network and analysing them for intrusions. 3.2.7 key agreement: A key establishment procedure (either manual or electronic) where the resultant key is a function of information by two or more par

    40、ticipants, so that no party can predetermine the value of the key independently of the other partys contribution. 3.2.8 key establishment: Process by which cryptographic keys are securely established among sensor nodes using key transport and/or key agreement procedures. 3.2.9 pair-wise key: It refe

    41、rs to a key that is used to protect unicast communication between a pair of sensor nodes over a single wireless link. 3.2.10 resilience: Ability to recover from security compromises or attacks. 3.2.11 secure data aggregation: Data aggregation that ensures the integrity of the results in the presence

    42、 of a small number of malicious aggregation nodes that may be attempting to influence the result. 3.2.12 tamper-resistant module: A device designed to make it difficult for attackers to gain access to sensitive information contained in the module. 4 Abbreviations For the purposes of this Recommendat

    43、ion | International Standard, the following abbreviations apply: BNode Broadcast Node BS Base Station CDMA Code Division Multiple Access DDoS Distributed Denial of Service DoS Denial of Service ECDH Elliptic Curve Diffie-Hellman FP Feature Parameters GSM Global System for Mobile Communications HSDPA

    44、 High Speed Downlink Packet Access ID Identity MAC Medium Access Control; Message Authentication Code NGN Next-Generation Network PHY physical layer RFID Radio-Frequency IDentification SN Sensor Network TPM Trusted Platform Module USN Ubiquitous Sensor Network WCDMA Wideband CDMA WiMAX Worldwide Int

    45、eroperability for Microwave Access WLAN Wireless Local Area Network WSN Wireless Sensor Network ISO/IEC 29180:2012 (E) 4 Rec. ITU-T X.1311 (02/2011) 5 Conventions In this Recommendation | International Standard: The keywords “is required to“ indicate a requirement which must be strictly followed and

    46、 from which no deviation is permitted, if conformance to this Recommendation | International Standard is to be claimed. The keywords “is recommended“ indicate a requirement which is recommended but which is not absolutely required. Thus this requirement need not be present to claim conformance. The

    47、keywords “is prohibited from“ indicate a requirement which must be strictly followed and from which no deviation is permitted, if conformance to this Recommendation | International Standard is to be claimed. The keywords “can optionally“ indicate an optional requirement which is permissible, without

    48、 implying any sense of being recommended. This term is not intended to imply that the vendors implementation must provide the option and the feature can be optionally enabled by the network operator/service provider. Rather, it means the vendor may optionally provide the feature and still claim conf

    49、ormance with this Recommendation | International Standard. 6 Overview Figure 1 shows the major application areas for USN including home network application, pollution monitoring, fire monitoring, telemetry applications for utility companies (electricity, gas, water, etc.), urban resource monitoring/management applications (e.g., smart city infrastructure), and flood monitoring. Home network Disaster/crisis management Structural health monitoring Home utility control Pollution monitoring Fire monitoring Flood


    注意事项

    本文(ISO IEC 29180-2012 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networks《信息技术.pdf)为本站会员(testyield361)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开