TIA-102 AACB-2002 Project 25 - Over-the-Air Rekeying (OTAR) Opertional Description《项目25-空中下载 (OTAR)业务描述》.pdf
《TIA-102 AACB-2002 Project 25 - Over-the-Air Rekeying (OTAR) Opertional Description《项目25-空中下载 (OTAR)业务描述》.pdf》由会员分享,可在线阅读,更多相关《TIA-102 AACB-2002 Project 25 - Over-the-Air Rekeying (OTAR) Opertional Description《项目25-空中下载 (OTAR)业务描述》.pdf(50页珍藏版)》请在麦多课文档分享上搜索。
1、TIA STANDARD Project 25 - Over-the-Air-Rekeying (OTAR) Operational Description TIA- 102 .AACB NOVEMBER 2002 TELECOMMUNICATIONS INDUSTRY ASSOCIATION Copyright Telecommunications Industry Association Provided by IHS under license with EIANot for ResaleNo reproduction or networking permitted without li
2、cense from IHS-,-,-NOTICE TIA Engineering Standards and Publications are designed to serve the public interest through eliminating misunderstandings between manufacturers and purchasers, facilitating interchangeability and improvement of products, and assisting the purchaser in selecting and obtaini
3、ng with minimum delay the proper product for their particular need. The existence of such Standards and Publications shall not in any respect preclude any member or non-member of TIA fi-om manufacturing or selling products not conforming to such Standards and Publications. Neither shall the existenc
4、e of such Standards and Publications preclude their voluntary use by Non-TIA members, either domestically or internationally. Standards and Publications are adopted by TIA in accordance with the American National Standards Institute (ANSI) patent policy. By such action, TIA does not assume any liabi
5、lity to any patent owner, nor does it assume any obligation whatever to parties adopting the Standard or Publication. This Standard does not purport to address all safety problems associated with its use or all applicable regulatory requirements. It is the responsibility of the user of this Standard
6、 to establish appropriate safety and health practices and to determine the applicability of regulatory limitations before its use. (From Standards Proposal No. 3-4910-URV-1, formulated under the cognizance of the TIA TR-8.3 Subcommittee on Encryption.) Published by OTELECOMMUNICATIONS INDUSTRY ASSOC
7、IATION 2002 Standards and Technology Department 2500 Wilson Boulevard Arlington, VA 22201 U.S.A. PRICE: Please refer to current Catalog of TIA TELECOMMUNICATIONS INDUSTRY ASSOCIATION STANDARDS AND ENGINEERING PUBLICATIONS or call Global Engineering Documents, USA and Canada (1-800-854-7179) Internat
8、ional (303-397-7956) or search online at http:/www.tiaonline.org/standards/search-n-order.cfm All rights reserved Printed in U.S.A. Copyright Telecommunications Industry Association Provided by IHS under license with EIANot for ResaleNo reproduction or networking permitted without license from IHS-,
9、-,-Copyright Telecommunications Industry Association Provided by IHS under license with EIANot for ResaleNo reproduction or networking permitted without license from IHS-,-,-NOTICE OF DISCLAIMER AND LIMITATION OF LIABILITY The document to which this Notice is affixed has been prepared by one or more
10、 Engineering Committees of the Telecommunications Industry Association (“TIA”). TIA is not the author of the document contents, but publishes and claims copyright to the document pursuant to licenses and permission granted by the authors of the contents. TIA Engineering Committees are expected to co
11、nduct their affairs in accordance with the TIA Engineering Manual (“Manual”), the current and predecessor versions of which are available at b i: /hvww. i8mnI i n od or US 5,146,497; US 5,185,795 At the time of publication, the above patent holder has agreed to license this intellectual property for
12、 Project 25 use only. iv Copyright Telecommunications Industry Association Provided by IHS under license with EIANot for ResaleNo reproduction or networking permitted without license from IHS-,-,-TIA-I 02.AACB 1 INTRODUCTION This document provides an operational description of OTAR. Its purpose is t
13、o describe, in relatively simple terms, the various complex over-the-air-rekeying messages and procedures. This document is meant to be used in conjunction with an OTAR protocol standard, and a basic familiarity with an OTAR protocol standard is helpful to interpret this operational description. Thi
14、s document was generated in response to Project 25 requirements for OTAR services; however, it is applicable to any land mobile communications system. The reader is advised that OTAR may use a data service and that relevant EIA/TIA Data documents should be consulted for any necessary protocols such
15、as data registration of data affiliation. 1.1 Scope Many of the parts of a land mobile radio communications system will use encryption to protect the information that is sent through the system. The encryption algorithms require keys in order to protect the confidentiality of this information. The p
16、rocess by which these encryption keys are generated, stored, protected, transferred, loaded, used and destroyed is known as key management. These keys must be protected from disclosure and require updating or replacement in order to maintain system security. This is often accomplished manually. Howe
17、ver, the most convenient way to do this is by electronically sending keys from a key management facility (KMF) to the destination equipment. This involves sending keys over the air and this procedure is referred to as Over-the-Air-Rekeying (OTAR). OTAR is a method of encrypting and sending the encry
18、ption keys and other related key management messages through an air interface in such a way that they are protected from disclosure, and, in some cases, unauthorized modification. This document describes the basic keying concepts for protected radios, including those fundamental key management conce
19、pts related to OTAR. OTAR is an application layer process. Peer processes exist in the key management facility (KMF) and at the mobile radios. The KMF is responsible for providing OTAR functions for the set of mobile radios within its jurisdiction. The document gives sample operational procedures fo
20、r the OTAR of radios in a protected system. The interaction between the KMF and mobile radios that is necessary to provide various key management services is described. The operational procedures delineated in this document include both a basic and an advanced set of procedures. No advanced public k
21、ey OTAR procedures have been defined for Data Encryption Standard applications, and are not discussed in this document. An OTAR protocol document for the particular encryption algorithm being used describes which messages require encryption, message authentication and replay protection. 1 Copyright
22、Telecommunications Industry Association Provided by IHS under license with EIANot for ResaleNo reproduction or networking permitted without license from IHS-,-,-TIA-I 02.AACB 1.2 Revision History Version Date 1 .o May 19,1995 1 .I July 19, 1995 1.2 August 11,1995 1.3 January 11,1996 1.4 March 11, 19
23、96 1.5 Decem ber 20,1996 1.6 March 30,2001 1.7 October 2,2001 1.8 June 17,2002 1.9 Novem ber 1,2002 1.3 References (known as P25.051995.1 .O) P25. ETG.(95)07.a P25.ETG.(95)07. b P25.950812.2.0 P25.950812.2.1 TSB102.AAACB S P-3-49 1 O SP-3-491 O-Update- October 2,2001 SP-3-4910-1 TIA/EIA 102.AACB Com
24、ments Initial version Revised after review Revised Table 4.2 title No modifications made PN-3677 Ballot Release Modifications as per PN-3677 Ballot Comments Final Modifications Preparation for ballot as a full standard - only editorial changes Update from October 2, 2001 meeting to reflect comment r
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- TIA102AACB2002PROJECT25OVERTHEAIRREKEYINGOTAROPERTIONALDESCRIPTION 项目 25 空中 下载 OTAR 业务 描述 PDF

链接地址:http://www.mydoc123.com/p-1059910.html