ISO IEC 29180-2012 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networks《信息技术.pdf
《ISO IEC 29180-2012 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networks《信息技术.pdf》由会员分享,可在线阅读,更多相关《ISO IEC 29180-2012 Information technology - Telecommunications and information exchange between systems - Security framework for ubiquitous sensor networks《信息技术.pdf(42页珍藏版)》请在麦多课文档分享上搜索。
1、 Reference number ISO/IEC 29180:2012(E) ISO/IEC 2012INTERNATIONAL STANDARD ISO/IEC 29180 First edition 2012-12-01 Information technology Telecommunications and information exchange between systems Security framework for ubiquitous sensor networks Technologies de linformation Tlcommunications et chan
2、ge dinformations entre systmes Cadre de scurit pour rseaux de capteurs ubiquitaires ISO/IEC 29180:2012(E) COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2012 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or me
3、chanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or ISOs member body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.
4、iso.org Published in Switzerland ii ISO/IEC 2012 All rights reservedISO/IEC 29180:2012(E) ISO/IEC 2012 All rights reserved iiiCONTENTS Page 1 Scope 1 2 Normative references 1 2.1 Identical Recommendations | International Standards 1 2.2 Paired Recommendations | International Standards equivalent in
5、technical content . 1 2.3 Additional references 1 3 Definitions 2 3.1 Terms defined elsewhere . 2 3.2 Terms defined in this Recommendation | International Standard 2 4 Abbreviations . 3 5 Conventions 4 6 Overview 4 7 Threats and security models for ubiquitous sensor networks . 7 7.1 Threat models in
6、 sensor networks . 7 7.2 Threat models in IP networks 10 7.3 Security model for USNs 10 8 General security dimensions for USN 10 9 Security dimensions and threats in ubiquitous sensor networks . 11 9.1 Security dimensions and threats for the message exchange in sensor networks . 11 9.2 Security dime
7、nsion and threats for the message exchange in the IP network . 14 10 Security techniques for ubiquitous sensor networks . 14 10.1 Key management . 14 10.2 Authenticated broadcast 15 10.3 Secure data aggregation 16 10.4 Data freshness . 17 10.5 Tamper-resistant module . 17 10.6 USN middleware securit
8、y . 17 10.7 IP network security . 17 10.8 Sensor node authentication 18 10.9 Privacy protection in sensor networks . 18 11 Specific security functional requirements for USN 18 11.1 Mandatory functional requirement 18 11.2 Recommended functional specifications . 18 11.3 Optional functional specificat
9、ions . 18 Annex A Key management in sensor networks 20 A.1 Threat time 20 A.2 Key management classes . 20 A.3 Key schemes 21 Annex B Authenticated broadcast in sensor networks: TPC 23 B.1 Construction of TPC . 23 B.2 Construction of TPCT . 24 B.3 Authenticated broadcast 25 Annex C Authentication mec
10、hanisms in sensor networks 26 C.1 XOR-based mechanism . 26 C.2 Hash-based mechanism . 27 C.3 Public key-based authentication 29 Annex D Secure data aggregation in sensor networks 32 D.1 Elect aggregation node and supervisor 32 D.2 Implementation of supervisor functions 33 D.3 Upload supervising mess
11、age . 33 D.4 Determine the trust of aggregation nodes 33 ISO/IEC 29180:2012(E) iv ISO/IEC 2012 All rights reservedPage D.5 Send revocation message 33 Bibliography 34 ISO/IEC 29180:2012(E) ISO/IEC 2012 All rights reserved vForeword ISO (the International Organization for Standardization) and IEC (the
12、 International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particu
13、lar fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have establi
14、shed a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint technical committee is to prepare International Standards. Draft International Standards adopted by the joint technica
15、l committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. ISO and I
16、EC shall not be held responsible for identifying any or all such patent rights. ISO/IEC 29180 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 6, Telecommunications and information exchange between systems, in collaboration with ITU-T. The identical te
17、xt is published as Rec. ITU-T X.1311 (02/2011). Introduction This Recommendation | International Standard describes the security threats to and security requirements of the ubiquitous sensor network. In addition, this Recommendation | International Standard categorizes the security technologies acco
18、rding to the security functions that satisfy the said security requirements and where the security technologies are applied in the security model of ubiquitous sensor networks. Finally, the security functional requirements and security technologies for the ubiquitous sensor networks are presented. I
19、SO/IEC 29180:2012(E) vi ISO/IEC 2012 All rights reservedISO/IEC 29180:2012 (E) Rec. ITU-T X.1311 (02/2011) 1 INTERNATIONAL STANDARD RECOMMENDATION ITU-T Information technology Security framework for ubiquitous sensor networks 1 Scope The recent advancement of wireless-based communication technology
20、and electronics has facilitated the implementation of a low-cost, low-power sensor network. Basically, a ubiquitous sensor network (USN) consists of three parts: a sensor network consisting of a large number of sensor nodes, a base station (also known as a gateway) interfacing between the sensor net
21、works and an application server, and the application server controlling the sensor node in the sensor network or collecting the sensed information from the sensor nodes in the sensor network. USN can be an intelligent information infrastructure of advanced e-Life society, which delivers user-oriente
22、d information and provides knowledge services to anyone anytime, anywhere and wherein information and knowledge are developed using context awareness by detecting, storing, processing, and integrating the situational and environmental information gathered from sensor tags and/or sensor nodes affixed
23、 to anything. Since there are many security and privacy threats in transferring and storing information in the USN, appropriate security mechanisms may be needed to protect against those threats in the USN. This Recommendation | International Standard describes the security threats to and security r
24、equirements of the ubiquitous sensor network. In addition, this Recommendation | International Standard categorizes the security technologies according to the security functions that satisfy the said security requirements and where the security technologies are applied in the security model of the U
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ISOIEC291802012INFORMATIONTECHNOLOGYTELECOMMUNICATIONSANDINFORMATIONEXCHANGEBETWEENSYSTEMSSECURITYFRAMEWORKFORUBIQUITOUSSENSORNETWORKS

链接地址:http://www.mydoc123.com/p-1257183.html