ETSI EN 300 392-7-2017 Terrestrial Trunked Radio (TETRA) Voice plus Data (V+D) Part 7 Security (V3 4 1)《陆地集群无线电(TETRA) 声音加数据(V+D) 第7部分 安全(V3 4 1)》.pdf
《ETSI EN 300 392-7-2017 Terrestrial Trunked Radio (TETRA) Voice plus Data (V+D) Part 7 Security (V3 4 1)《陆地集群无线电(TETRA) 声音加数据(V+D) 第7部分 安全(V3 4 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI EN 300 392-7-2017 Terrestrial Trunked Radio (TETRA) Voice plus Data (V+D) Part 7 Security (V3 4 1)《陆地集群无线电(TETRA) 声音加数据(V+D) 第7部分 安全(V3 4 1)》.pdf(216页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI EN 300 392-7 V3.4.1 (2017-01) Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 7: Security EUROPEAN STANDARD ETSI ETSI EN 300 392-7 V3.4.1 (2017-01) 2 Reference REN/TETRA-06184 Keywords security, TETRA, V+D ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.:
2、 +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be made availa
3、ble in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only p
4、revailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other
5、ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utili
6、zed in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to re
7、production in all media. European Telecommunications Standards Institute 2017. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of
8、the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI EN 300 392-7 V3.4.1 (2017-01) 3 Contents Intellectual Property Rights 11g3Foreword . 11g3Modal verbs terminology 12g31 Scope 13g32 References 13g32.1 Normative references . 1
9、3g32.2 Informative references 14g33 Definitions and abbreviations . 15g33.1 Definitions 15g33.2 Abbreviations . 18g34 Air Interface authentication and key management mechanisms 20g34.a General . 20g34.0 Security classes 20g34.1 Air interface authentication mechanisms . 21g34.1.1 Overview 21g34.1.1a
10、Authentication and key management algorithms 21g34.1.2 Authentication of an MS . 21g34.1.3 Authentication of the infrastructure 22g34.1.4 Mutual authentication of MS and infrastructure . 23g34.1.5 The authentication key 25g34.1.6 Equipment authentication . 25g34.1.6a Request for information related
11、to an MS . 26g34.1.7 Authentication of an MS when migrated 26g34.1.8 Authentication of the home SwMI when migrated . 27g34.1.9 Mutual Authentication of MS and infrastructure when migrated . 28g34.2 Air Interface key management mechanisms . 29g34.2.0 General 29g34.2.1 The DCK . 29g34.2.2 The GCK . 30
12、g34.2.2.0 General 30g34.2.2.1 Session key modifier GCK0 31g34.2.3 The CCK . 32g34.2.4 The SCK . 33g34.2.4.0 General 33g34.2.4.1 SCK association for DMO use 35g34.2.4.1.0 General 35g34.2.4.1.1 DMO SCK subset grouping . 35g34.2.5 The GSKO 37g34.2.5.0 General 37g34.2.5.1 SCK distribution to groups with
13、 OTAR 38g34.2.5.2 GCK distribution to groups with OTAR . 38g34.2.5.3 Rules for MS response to group key distribution 39g34.2.6 Encrypted Short Identity (ESI) mechanism 39g34.2.7 Encryption Cipher Key . 40g34.2.8 Summary of AI key management mechanisms . 40g34.3 Service description and primitives . 4
14、2g34.3.1 Authentication primitives . 42g34.3.2 SCK transfer primitives 42g34.3.3 GCK transfer primitives 43g34.3.4 GSKO transfer primitives . 44g34.4 Authentication protocol 45g34.4.1 Authentication state transitions . 45g34.4.2 Authentication protocol sequences and operations . 48g34.4.2.0 General
15、48g34.4.2.1 MSCs for authentication . 49g3ETSI ETSI EN 300 392-7 V3.4.1 (2017-01) 4 4.4.2.2 MSCs for authentication and security type-3 elements . 55g34.4.2.3 Control of authentication timer T354 at MS . 58g34.4a Information request protocol 59g34.5 OTAR protocols . 62g34.5.1 CCK delivery - protocol
16、 functions 62g34.5.1.0 General 62g34.5.1.1 SwMI-initiated CCK provision . 63g34.5.1.2 MS-initiated CCK provision with U-OTAR CCK demand. 65g34.5.1.3 MS-initiated CCK provision with announced cell reselection 65g34.5.2 OTAR protocol functions - SCK 66g34.5.2.0 General 66g34.5.2.1 MS requests provisio
17、n of SCK(s) 67g34.5.2.2 SwMI provides SCK(s) to individual MS . 68g34.5.2.3 SwMI provides SCK(s) to group of MSs 70g34.5.2.4 SwMI rejects provision of SCK 71g34.5.3 OTAR protocol functions - GCK 72g34.5.3.0 General 72g34.5.3.1 MS requests provision of GCK . 72g34.5.3.2 SwMI provides GCK to an indivi
18、dual MS 74g34.5.3.3 SwMI provides GCK to a group of MSs . 75g34.5.3.4 SwMI rejects provision of GCK 77g34.5.4 Cipher key association to group address . 78g34.5.4.0 General 78g34.5.4.1 SCK association for DMO 79g34.5.4.2 GCK association . 82g34.5.5 Notification of key change over the air . 84g34.5.5.
19、0 General 84g34.5.5.1 Change of DCK . 85g34.5.5.2 Change of CCK . 86g34.5.5.3 Change of GCK . 86g34.5.5.4 Change of SCK for TMO 86g34.5.5.5 Change of SCK for DMO . 86g34.5.5.6 Synchronization of Cipher Key Change 87g34.5.6 Security class change 87g34.5.6.0 General 87g34.5.6.1 Change of security clas
20、s to security class 1 88g34.5.6.2 Change of security class to security class 2 88g34.5.6.3 Change of security class to security class 3 88g34.5.6.4 Change of security class to security class 3 with GCK . 88g34.5.7 Notification of key in use 89g34.5.8 Notification of GCK Activation/Deactivation 89g34
21、.5.9 Deletion of SCK, GCK and GSKO . 89g34.5.10 Air Interface Key Status Enquiry 91g34.5.11 Crypto management group 93g34.5.12 OTAR retry mechanism 94g34.5.13 OTAR protocol functions - GSKO . 94g34.5.13.0 General 94g34.5.13.1 MS requests provision of GSKO . 95g34.5.13.2 SwMI provides GSKO to an MS .
22、 95g34.5.13.3 SwMI rejects provision of GSKO . 96g34.5.14 OTAR protocol functions - interaction and queuing . 96g34.5.15 KSOv for OTAR operations in visited SwMI . 96g34.5.16 Transfer of AI cipher keys across the ISI . 100g35 Enable and disable mechanism . 100g35.0 General . 100g35.1 General relatio
23、nships 101g35.2 Enable/disable state transitions . 101g35.3 Mechanisms 102g35.3.0 General 102g35.3.1 Disable of MS equipment . 103g35.3.2 Disable of an subscription . 103g3ETSI ETSI EN 300 392-7 V3.4.1 (2017-01) 5 5.3.3 Disable of subscription and equipment . 103g35.3.4 Enable an MS equipment 103g35
24、.3.5 Enable an MS subscription . 103g35.3.6 Enable an MS equipment and subscription . 103g35.4 Enable/disable protocol 104g35.4.1 General case 104g35.4.2 Status of cipher key material. 105g35.4.2.1 Permanently disabled state 105g35.4.2.2 Temporarily disabled state 105g35.4.3 Specific protocol exchan
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIEN30039272017TERRESTRIALTRUNKEDRADIOTETRAVOICEPLUSDATAVDPART7SECURITYV341 陆地 集群 无线电 TETRA 声音 数据 VD

链接地址:http://www.mydoc123.com/p-728459.html