BS PD CEN TR 16968-2016 Electronic Fee Collection Assessment of security measures for applications using Dedicated Short-Range Communication《电子收费 使用专用短程通信应用的安全措施评估》.pdf
《BS PD CEN TR 16968-2016 Electronic Fee Collection Assessment of security measures for applications using Dedicated Short-Range Communication《电子收费 使用专用短程通信应用的安全措施评估》.pdf》由会员分享,可在线阅读,更多相关《BS PD CEN TR 16968-2016 Electronic Fee Collection Assessment of security measures for applications using Dedicated Short-Range Communication《电子收费 使用专用短程通信应用的安全措施评估》.pdf(50页珍藏版)》请在麦多课文档分享上搜索。
1、PD CEN/TR 16968:2016 Electronic Fee Collection Assessment of security measures for applications using Dedicated Short-Range Communication BSI Standards Publication WB11885_BSI_StandardCovs_2013_AW.indd 1 15/05/2013 15:06PD CEN/TR 16968:2016 PUBLISHED DOCUMENT National foreword This Published Documen
2、t is the UK implementation of CEN/TR 16968:2016. The UK participation in its preparation was entrusted to Technical Committee EPL/278, Intelligent transport systems. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport t
3、o include all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2016. Published by BSI Standards Limited 2016 ISBN 978 0 580 92597 9 ICS 35.240.60 Compliance with a British Standard cannot confer immunity from legal obligatio
4、ns. This Published Document was published under the authority of the Standards Policy and Strategy Committee on 31 May 2016. Amendments issued since publication Date Text affectedPD CEN/TR 16968:2016TECHNICAL REPORT RAPPORT TECHNIQUE TECHNISCHER BERICHT CEN/TR 16968 May 2016 ICS 35.240.60 English Ve
5、rsion Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication Elektronische Gebhrenerhebung - Beurteilung von Sicherheitsmanahmen fr Anwendungen mit dedizierter Nahbereichskommunikation This Technical Report was approved by CEN on 11 Apr
6、il 2016. It has been drawn up by the Technical Committee CEN/TC 278. CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Ita
7、ly, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMIT EUROPEN DE NORMALISATION EUROPISCHES KOMITEE FR NORMUNG CEN-CENELEC Management Centre: Ave
8、nue Marnix 17, B-1000 Brussels 2016 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No. CEN/TR 16968:2016 EPD CEN/TR 16968:2016 CEN/TR 16968:2016 (E) 2 Contents Page European foreword . 4 Introduction 5 1 Scope 6 2 Terms and definitions .
9、 6 3 Abbreviations . 9 4 Method . 10 5 Security Objectives and Functional Requirements 13 5.1 Target of evaluation 13 5.2 Security objectives . 14 5.2.1 Introduction . 14 5.2.2 Confidentiality . 14 5.2.3 Availability . 14 5.2.4 Accountability . 14 5.2.5 Data integrity . 14 5.3 Functional security re
10、quirements . 15 5.3.1 Introduction . 15 5.3.2 Confidentiality . 15 5.3.3 Availability . 17 5.3.4 Accountability . 18 5.3.5 Data integrity . 20 5.4 Inventory of assets . 21 5.4.1 Functional Assets . 21 5.4.2 Data Assets 22 6 Threat analysis 22 7 Qualitative risk analysis 24 7.1 Introduction . 24 7.1.
11、1 General . 24 7.1.2 Likelihood of a threat . 24 7.1.3 Impact of a threat . 25 7.1.4 Classification of Risk . 26 7.2 Risk determination 26 7.2.1 Definition of high and low risk context 26 7.2.2 Threat T1: Access Credentials keys can be obtained 27 7.2.3 Threat T2: Authentication keys can be obtained
12、 . 27 7.2.4 Threat T3: OBU can be cloned . 28 7.2.5 Threat T4: OBU can be faked 28 7.2.6 Threat T5: Authentication of OBU data can be repudiated . 29 7.2.7 Threat T6: Application data can be modified after the transaction 29 7.2.8 Threat T7: Data in the VST is not secure 30 7.2.9 Threat T8: DSRC Com
13、munication can be eavesdropped 30 7.2.10 Threat T9: Correctness of application data are repudiated . 31 7.2.11 Threat T10: Master keys may be obtained from RSE 31 7.3 Summary . 31 PD CEN/TR 16968:2016 CEN/TR 16968:2016 (E) 3 8 Proposals for new security measures . 32 8.1 Introduction 32 8.2 Security
14、 measures to counter risks related to key recovery 32 8.3 Recommended countermeasures . 34 8.4 Qualitative cost benefit analysis . 35 9 Impact of proposed countermeasures 35 9.1 Current situation and level of fraud in existing EFC systems using CEN DSRC link 35 9.2 EETS legislation . 36 9.3 Analysis
15、 of effects on existing EFC systems . 36 9.3.1 Affected roles . 36 9.3.2 The CEN DSRC equipment Manufacturers . 36 9.3.3 The Toll Service Providers 37 9.3.4 The Toll Chargers . 37 10 Recommendations 38 10.1 Add security levels and procedures to EN ISO 14906 38 10.2 Recommendation for other EFC stand
16、ards . 39 10.3 New standards . 39 Annex A (informative) Current status of the DEA cryptographic algorithm 40 A.1 Overview 40 A.2 ISO/IEC 9797-1 (MAC Algorithm 1) 40 A.3 FIPS 46 (DEA Specification DES) 40 A.4 ENISA recommendations . 41 Annex B (informative) Security considerations regarding DSRC in E
17、FC Standards 42 B.1 Security vulnerabilities in EN 15509 and EN ISO 14906 42 B.2 Security vulnerabilities in EN ISO 12813 (CCC) . 42 B.3 Security vulnerabilities in EN ISO 13141 (LAC) . 43 B.4 Security vulnerabilities in CEN/TS 16702-1 (SM-CC) 43 Bibliography . 44 PD CEN/TR 16968:2016 CEN/TR 16968:2
18、016 (E) 4 European foreword This document (CEN/TR 16968:2016) has been prepared by Technical Committee CEN/TC 278 “Intelligent transport systems”, the secretariat of which is held by NEN. Attention is drawn to the possibility that some of the elements of this document may be the subject of patent ri
19、ghts. CEN and/or CENELEC shall not be held responsible for identifying any or all such patent rights. PD CEN/TR 16968:2016 CEN/TR 16968:2016 (E) 5 Introduction Security for dedicated short-range communication (DSRC) applications in the context of electronic fee collection (EFC) has a long history in
20、 standardization. Currently the area is covered by several standards and technical specifications, successively developed over time: EN ISO 14906 (Electronic fee collection - Application interface definition for dedicated short-range communication) provides a toolbox of functions and security measur
21、es which can be used for DSRC application. CEN ISO/TS 19299 (Electronic fee collection - Security framework) analyzes the threats to an EFC system as a whole, and not specifically for the DSRC technology. EN ISO 12813 (Electronic fee collection - Compliance check communication for autonomous systems
22、) and EN ISO 13141 (Electronic fee collection - Localisation augmentation communication for autonomous systems) mirrors the best-practice security measures of EN 15509. CEN/TS 16702-1 (Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking) provides a
23、n EFC enforcement concept, partially dependent on a DSRC application. EN 15509 (Electronic fee collection - Interoperability application profile for DSRC) defines an interoperable application profile which comprises a selection of such measures with a definition of security algorithms associated to
24、it. It is based on the experience of many EU projects related to DSRC-EFC. As the security domain has evolved, it is now necessary to analyze again the threats, vulnerabilities and risks of using the CEN DSRC technology in all DSRC-based applications related to EFC. Technological advances and prolif
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSPDCENTR169682016ELECTRONICFEECOLLECTIONASSESSMENTOFSECURITYMEASURESFORAPPLICATIONSUSINGDEDICATEDSHORTRANGECOMMUNICATION

链接地址:http://www.mydoc123.com/p-397412.html