ETSI EN 300 392-7-2012 Terrestrial Trunked Radio (TETRA) Voice plus Data (V+D) Part 7 Security (V3 3 1)《陆地集群无线电(TETRA) 语音加数据(V+D) 第7部分 安全 版本3 3 1》.pdf
《ETSI EN 300 392-7-2012 Terrestrial Trunked Radio (TETRA) Voice plus Data (V+D) Part 7 Security (V3 3 1)《陆地集群无线电(TETRA) 语音加数据(V+D) 第7部分 安全 版本3 3 1》.pdf》由会员分享,可在线阅读,更多相关《ETSI EN 300 392-7-2012 Terrestrial Trunked Radio (TETRA) Voice plus Data (V+D) Part 7 Security (V3 3 1)《陆地集群无线电(TETRA) 语音加数据(V+D) 第7部分 安全 版本3 3 1》.pdf(210页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI EN 300 392-7 V3.3.1 (2012-07) Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 7: Security European Standard ETSI ETSI EN 300 392-7 V3.3.1 (2012-07) 2Reference REN/TETRA-06180 Keywords security, TETRA, V+D ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.:
2、+33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made ava
3、ilable in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on
4、a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find
5、errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction i
6、n all media. European Telecommunications Standards Institute 2012. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Org
7、anizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI EN 300 392-7 V3.3.1 (2012-07) 3Contents Intellectual Property Rights 10g3Foreword . 10g31 Scope 12g32 References 12g32.1 Normative references . 12g32.2 Informative references 13g33 Defin
8、itions and abbreviations . 13g33.1 Definitions 13g33.2 Abbreviations . 16g34 Air Interface authentication and key management mechanisms 18g34.0 Security classes 18g34.1 Air interface authentication mechanisms . 19g34.1.1 Overview 19g34.1.2 Authentication of an MS . 19g34.1.3 Authentication of the in
9、frastructure 20g34.1.4 Mutual authentication of MS and infrastructure . 21g34.1.5 The authentication key 23g34.1.6 Equipment authentication . 23g34.1.7 Authentication of an MS when migrated 24g34.1.8 Authentication of the home SwMI when migrated . 25g34.1.9 Mutual Authentication of MS and infrastruc
10、ture when migrated . 26g34.2 Air Interface key management mechanisms . 26g34.2.1 The DCK . 26g34.2.2 The GCK . 27g34.2.2.1 Session key modifier GCK0 28g34.2.3 The CCK . 29g34.2.4 The SCK . 30g34.2.4.1 SCK association for DMO use 31g34.2.4.1.1 DMO SCK subset grouping . 32g34.2.5 The GSKO 34g34.2.5.1
11、SCK distribution to groups with OTAR 35g34.2.5.2 GCK distribution to groups with OTAR . 35g34.2.5.3 Rules for MS response to group key distribution 36g34.2.6 Encrypted Short Identity (ESI) mechanism 36g34.2.7 Encryption Cipher Key . 37g34.2.8 Summary of AI key management mechanisms . 37g34.3 Service
12、 description and primitives . 39g34.3.1 Authentication primitives . 39g34.3.2 SCK transfer primitives 39g34.3.3 GCK transfer primitives 40g34.3.4 GSKO transfer primitives . 41g34.4 Authentication protocol 42g34.4.1 Authentication state transitions . 42g34.4.2 Authentication protocol sequences and op
13、erations . 45g34.4.2.1 MSCs for authentication . 46g34.4.2.2 MSCs for authentication Type-3 element . 52g34.4.2.3 Control of authentication timer T354 at MS . 55g34.5 OTAR protocols . 56g34.5.1 CCK delivery - protocol functions 56g34.5.1.1 SwMI-initiated CCK provision . 56g34.5.1.2 MS-initiated CCK
14、provision with U-OTAR CCK demand. 58g34.5.1.3 MS-initiated CCK provision with announced cell reselection 59g34.5.2 OTAR protocol functions - SCK 59g34.5.2.1 MS requests provision of SCK(s) 60g34.5.2.2 SwMI provides SCK(s) to individual MS . 61g3ETSI ETSI EN 300 392-7 V3.3.1 (2012-07) 44.5.2.3 SwMI p
15、rovides SCK(s) to group of MSs 64g34.5.2.4 SwMI rejects provision of SCK 66g34.5.3 OTAR protocol functions - GCK 66g34.5.3.1 MS requests provision of GCK . 66g34.5.3.2 SwMI provides GCK to an individual MS 69g34.5.3.3 SwMI provides GCK to a group of MSs . 71g34.5.3.4 SwMI rejects provision of GCK 73
16、g34.5.4 Cipher key association to group address . 73g34.5.4.1 SCK association for DMO 74g34.5.4.2 GCK association . 78g34.5.5 Notification of key change over the air . 80g34.5.5.1 Change of DCK . 82g34.5.5.2 Change of CCK . 82g34.5.5.3 Change of GCK . 82g34.5.5.4 Change of SCK for TMO 82g34.5.5.5 Ch
17、ange of SCK for DMO . 83g34.5.5.6 Synchronization of Cipher Key Change 83g34.5.6 Security class change 83g34.5.6.1 Change of security class to security class 1 84g34.5.6.2 Change of security class to security class 2 84g34.5.6.3 Change of security class to security class 3 84g34.5.6.4 Change of secu
18、rity class to security class 3 with GCK . 85g34.5.7 Notification of key in use 85g34.5.8 Notification of GCK Activation/Deactivation 85g34.5.9 Deletion of SCK, GCK and GSKO . 85g34.5.10 Air Interface Key Status Enquiry 87g34.5.11 Crypto management group 90g34.5.12 OTAR retry mechanism 90g34.5.13 OTA
19、R protocol functions - GSKO . 91g34.5.13.1 MS requests provision of GSKO . 91g34.5.13.2 SwMI provides GSKO to an MS . 92g34.5.13.3 SwMI rejects provision of GSKO . 93g34.5.14 OTAR protocol functions - interaction and queuing . 93g34.5.15 KSOv for OTAR operations in visited SwMI . 93g34.5.16 Transfer
20、 of AI cipher keys across the ISI . 97g35 Enable and disable mechanism . 97g35.1 General relationships 98g35.2 Enable/disable state transitions . 98g35.3 Mechanisms 99g35.3.1 Disable of MS equipment . 100g35.3.2 Disable of an subscription . 100g35.3.3 Disable of subscription and equipment . 100g35.3
21、.4 Enable an MS equipment 100g35.3.5 Enable an MS subscription . 100g35.3.6 Enable an MS equipment and subscription . 100g35.4 Enable/disable protocol 101g35.4.1 General case 101g35.4.2 Status of cipher key material. 102g35.4.2.1 Permanently disabled state 102g35.4.2.2 Temporarily disabled state 102
22、g35.4.3 Specific protocol exchanges . 103g35.4.3.1 Disabling an MS with mutual authentication 103g35.4.3.2 Enabling an MS with mutual authentication . 105g35.4.3.3 Enabling an MS with non-mutual authentication 106g35.4.3.4 Disabling an MS with non-mutual authentication . 107g35.4.4 Enabling an MS wi
23、thout authentication 108g35.4.5 Disabling an MS without authentication . 109g35.4.6 Rejection of enable or disable command 109g35.4.6a Expiry of Enable/Disable protocol timer 110g35.4.7 MM service primitives 111g35.4.7.1 TNMM-DISABLING primitive 111g3ETSI ETSI EN 300 392-7 V3.3.1 (2012-07) 55.4.7.2
24、TNMM-ENABLING primitive . 111g36 Air Interface (AI) encryption . 111g36.1 General principles. 111g36.2 Security class 112g36.2.0 Notification of security class 113g36.2.0.1 Security Class of Neighbouring Cells . 114g36.2.0.2 Identification of MS security capabilities . 114g36.2.1 Constraints on LA a
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIEN30039272012TERRESTRIALTRUNKEDRADIOTETRAVOICEPLUSDATAVDPART7SECURITYV331 陆地 集群 无线电 TETRA 语音 数据 VD

链接地址:http://www.mydoc123.com/p-728458.html