ETSI ETR 086-3-1994 Trans European Trunked Radio (TETRA) System Technical Requirements Specification Part 3 Security Aspects《泛欧集群无线电(TETRA)系统 技术要求规范 第3部分 安全方面》.pdf
《ETSI ETR 086-3-1994 Trans European Trunked Radio (TETRA) System Technical Requirements Specification Part 3 Security Aspects《泛欧集群无线电(TETRA)系统 技术要求规范 第3部分 安全方面》.pdf》由会员分享,可在线阅读,更多相关《ETSI ETR 086-3-1994 Trans European Trunked Radio (TETRA) System Technical Requirements Specification Part 3 Security Aspects《泛欧集群无线电(TETRA)系统 技术要求规范 第3部分 安全方面》.pdf(67页珍藏版)》请在麦多课文档分享上搜索。
1、kH N I CAL REPORT ETR 086-3 January 1994 Source: ETSI TC-RES Reference: DTR/RES-06001 UDC: 621.396 Key words: TETRA, security Trans European Trunked Radio (TETRA) system; Technical requirements specification Part 3: Security aspects ETSI European Telecommunications Standards Institute ETSI Secretari
2、at Postal address: 06921 Sophia Antipolis Cedex - FRANCE Office address: Route des Lucioles - Sophia Antipolis - Valbonne - FRANCE Tel.: + 33 92 94 42 O0 - Fax: + 33 93 65 47 16 European Telecornmunications Standards Institute 1 994. All rights reserved, No part may be reproduced except as authorize
3、d by written permission. The copyright and the foregoing restriction on reproduction extend to all media in which the information may be embodied. m 3404583 0096233 530 m Page 2 ETR 086-3: 1 994 Whilst every care has been taken in the preparation and publication of this document, errors in content,
4、typographical or otherwise, may occur. If you have comments concerning its accuracy, please write to “ETSI Editing and Standards Approval Dept.“ at the address shown on the title page. = 3404583 0096234 477 Page 3 ETR 086-3: 1994 Contents Foreword . 7 1 Scope . 9 2 References . 9 3 Definitions and a
5、bbreviations (TETRA 01.04) 9 3.1 Definitions . 9 3.2 General abbreviations . 16 Supplementary service abbreviations . 17 3.3 4 Security aspects (TETRA 02.20) . 18 4.1.1 Introduction., 18 Applicability of the security services 18 4.2 Security policy . 19 The field of application 20 4.4 General archit
6、ecture . 20 The standardization boundaries 22 Methodology and outputs 23 Definition of TETRA players . 24 Principles of security profiles . 25 Threat analysis (TETRA 02.21 ) . 25 5.1 introduction . 25 Classification of threats., . 26 Message related threats 27 5.3.1 Interception 27 5.3.2 Manipulatio
7、n . 29 5.3.3 Repudiation 32 Repudiation of delivery 32 Repudiation of origin . 32 User related threats 32 5.4.1 Traffic analysis . 32 5.4.2 Observability 33 System related threats 33 Un-authorized use of resources . 33 Use of prohibited resources . 34 Use of resources beyond the authorized limits 34
8、 5.6 Summary 34 Security objectives and requirements (TETRA 02.22) . 34 Introduction. 34 Description of objectives and requirements 35 6.2.1 Correct charging . 35 6.2.2 Authenticity . 37 Confidentiality of communication . 39 Integrity of communication . 40 . 4.1 General 18 4.1.2 4.3 4.5 4.6 4.7 4.8
9、5 5.2 5.3 5.3.1.1 5.3.1.2 5.3.2.1 5.3.2.2 5.3.3.1 5.3.3.2 Interception at the radio interface . 27 Interception in the fixed parts of the network . 29 Manipulation at the radio interface 30 Manipulation in the fixed parts of the network 31 5.4 5.5 5.5.1 5.5.2 Denial of service . 33 5.5.2.1 5.5.2.2 6
10、 6.1 6.2 6.2.3 6.2.4 6.2.5 Privacy 41 3404583 0096235 303 Page 4 ETR 086-3:1994 6.2.6 Traffic flow confidentiality . 42 6.2.7 Monitoring 43 6.2.8 6.2.9 Security management . 45 Protection of resources . 44 6.2.1 O Non-repudiation . 46 Survey of objectives 46 Rating of security requirements -48 6.4.1
11、 Correct charging 49 6.4.2 Authenticity 49 6.4.3 Confidentiality of communication . 50 6.4.4 Integrity of communication 50 Privacy . 6.4.5 50 6.4.6 Traffic flow confidentiality . 51 6.4.7 Monitoring 51 6.4.8 Protection of resources -51 6.4.9 Security management . 52 6.4.1 O Classes of identical or a
12、lmost identical requirements . 52 6.3 6.4 7 Security services (TETRA 02.23) . 52 7.1 Introduction 52 7.2 7.3 . Survey of possible areas for the standardization of security 53 Description of security services., -54 7.3.1 Confidentiality services . 54 Relations to other security services . 54 7.3.1 .
13、1 7.3.1.2 7.3.1.3 7.3.1.4 Information confidentiality for voice (air-interface) - 7.3.1.5 7.3.1.6 7.3.1.7 General aspects 54 Information confidentiality for voice (End-to-End) - A . 1 -55 B.l . 55 User identity confidentiality - C . 1 56 Group identity confidentiality - C.2 57 Signalling information
14、 confidentiality - (2.3 57 Authentication 6) and key management services 58 7.3.2.1 General aspects 58 Relations to other security services . 58 Authentication of user (air-interface) - H1 . 59 Air-interface key management service - El . 60 Key management functions for air- interface authentication
15、60 Key management functions for air- interface confidentiality and integrity services . 60 7.3.3 Integrity services . 61 7.3.3.1 General aspects 61 Relations to other security services -61 signalling data - C4 . 61 Annex A (informative): Tables of requirements . 63 7.3.2 7.3.2.2 7.3.2.3 7.3.2.4 7.3.
16、2.5 Authentication of TETRA infrastructure (air-interface) - H2 59 7.3.2.5.1 7.3.2.5.2 7.3.3.2 7.3.3.3 Data integrity and data origin authentication for . A . 1 Correct charging. 63 A.2 Authenticity., 63 A.3 Confidentiality of communication 64 A.4 Integrity of communication -64 A.5 Privacy 64 . . m
17、3404583 00b23b 24T Page 5 ETR 086-3: 1994 A.6 Traffic flow confidentiality 65 A.7 Monitoring . 65 A.8 Protection of resources 65 14.9 Security management 66 A . 1 O Non-repudiation 66 Annex B (informative): TETRA V + D and PDO interfaces . 67 History 69 3404583 0096233 L8b Page 7 ETR 086-3: 1994 For
18、eword This ETSI Technical Report (ETR) has been prepared by the Radio Equipment and Systems (RES1 Technical Committee of the European Telecommunications Standards Institute (ETSI). ETRs are informative documents resulting from ETSI studies which are not appropriate for European Telecommunication Sta
19、ndard (ETS) or Interim European Telecommunication Standard (LETS) status. An ETR may be used to publish material which is either of an informative nature, relating to the use or application of ETSs or I-ETSs, or which is immature and not yet suitable for format adoption as an ETS or LETS. This part
20、of the ETR contains the specification of the Security aspects of the Trans European Trunked Radio (TETRA) system. This ETR will be subject to revision and therefore future editions. This ETR is divided into three parts: Part 1: Voice plus Data (V +DI systems; Part 2: Packet Data Optimized (PDO) syst
21、ems; Part 3: Security aspects. Previous page is blank Page 9 ETR 086-3: 1994 I Scope This ETSI Technical Report (ETR) defines the TETRA Security aspects, analyses the possible threats, defines the security objectives and requirements, and describes the security services. 2 References For the purpose
22、s of this ETR the following references apply. 121 i31 ITU-T Recommendation X.25 (1 993): “Interface between Data Terminal Equipment (DTE) and Data Circuit-Terminating Equipment (DCE) for terminals operating in the packet mode and connected to public data networks by dedicated circuit“. ETR 086-1 (1
23、994): “Trans European Trunked Radio (TETRA) system; Technical requirements specifications; Part 1 : Voice plus Data (VI- DI systems“. IS0 7498-2 (1 989): “Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture“. 3 Definitions and abbrevi
24、ations (TETRA O1 .O41 3.1 Definitions For the purposes of this ETR the following definitions apply: Access control: the prevention of unauthorized use of resources, including the use of a resource in an unauthorized manner. Authentication: the act of positively verifying that the true identity of an
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIETR08631994TRANSEUROPEANTRUNKEDRADIOTETRASYSTEMTECHNICALREQUIREMENTSSPECIFICATIONPART3SECURITYASPECTS

链接地址:http://www.mydoc123.com/p-731410.html