ETSI TR 102 512-2006 Terrestrial Trunked Radio (TETRA) Security Security requirements analysis for modulation enhancements to TETRA《陆地集群无线电(TETRA) 安全性 TETRA调制增强的安全要求分析》.pdf
《ETSI TR 102 512-2006 Terrestrial Trunked Radio (TETRA) Security Security requirements analysis for modulation enhancements to TETRA《陆地集群无线电(TETRA) 安全性 TETRA调制增强的安全要求分析》.pdf》由会员分享,可在线阅读,更多相关《ETSI TR 102 512-2006 Terrestrial Trunked Radio (TETRA) Security Security requirements analysis for modulation enhancements to TETRA《陆地集群无线电(TETRA) 安全性 TETRA调制增强的安全要求分析》.pdf(23页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 102 512 V1.1.1 (2006-08)Technical Report Terrestrial Trunked Radio (TETRA); Security; Security requirements analysis for modulation enhancements to TETRAETSI ETSI TR 102 512 V1.1.1 (2006-08) 2 Reference DTR/TETRA-06139 Keywords analysis, security, TETRA ETSI 650 Route des Lucioles F-06921 S
2、ophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org
3、 The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI
4、 printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.
5、org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing
6、 restriction extend to reproduction in all media. European Telecommunications Standards Institute 2006. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered by ETS
7、I for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TR 102 512 V1.1.1 (2006-08) 3 Contents Intellectual Property Rights5 Foreword.5 1 Scope 6 2 References 6 3 Definitions and abbreviations.7 3.1
8、 Definitions7 3.2 Abbreviations .8 4 Communications security model 8 4.1 Introduction 8 4.2 General model identifying security relationships .9 4.3 TVRA development model.10 5 Security objectives .11 5.1 General objectives 11 5.2 Objectives from the legislative framework.11 5.2.1 Privacy11 5.2.2 Dat
9、a protection12 5.2.3 Security order12 5.2.4 Lawful Interception.12 5.2.5 Contract 12 5.3 Summary 12 6 Vulnerability analysis.13 6.1 Introduction 13 6.2 TETRA system under evaluation .15 6.3 TETRA use cases (security scenarios) .15 6.3.1 Point to point communication within single TETRA SwMI.15 6.3.2
10、Point to multipoint communication within single TETRA SwMI 15 6.3.3 Broadcast communication within single TETRA SwMI 15 6.3.4 Point to point communication within multiple TETRA SwMIs .15 6.3.5 Point to multipoint communication within multiple TETRA SwMIs.15 6.3.6 Broadcast communication within multi
11、ple TETRA SwMIs .15 6.4 Overview of existing TETRA security measures .16 6.4.1 Security analysis and recommendation.16 6.4.2 Air interface capabilities.16 6.4.2.1 Security profiles or classes16 6.4.2.2 Authentication.16 6.4.2.3 Over the air key management support.16 6.4.2.4 Encryption.17 6.4.2.5 Ove
12、r the Air enable and disable 17 6.4.3 Crypto capabilities 17 6.4.3.1 TAA1 17 6.4.3.2 TEAx.17 6.4.3.2.1 Overview .17 6.4.3.2.2 TEA1 .17 6.4.3.2.3 TEA2 .17 6.4.3.2.4 TEA3 .17 6.4.3.2.5 TEA4 .17 6.5 System capabilities not covered by existing TETRA security measures18 6.5.1 PEI 18 6.5.1.1 Overview.18 6
13、.5.1.2 Objectives19 6.5.1.3 Threats and threat agents.19 6.5.1.4 Summary of unwanted incidents .19 6.5.2 ISI .19 ETSI ETSI TR 102 512 V1.1.1 (2006-08) 4 6.5.3 IP.20 6.5.4 Application level security .20 7 Identification of requirements for countermeasures.20 7.1 Overview 20 7.2 TETRA air interface mo
14、difications 20 7.2.1 Outline of modifications to TETRA air interface security21 History 23 ETSI ETSI TR 102 512 V1.1.1 (2006-08) 5 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essentia
15、l IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates ar
16、e available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI
17、Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Report (TR) has been produced by ETSI Technical Committee Terrestrial Trunked Radio (TETRA). ETSI ETSI TR 102 512 V1.1.1 (2006-08) 6 1 Scope The present document updates the threat analysis pr
18、esented in ETR 086-3 1 with respect to new services and capabilities offered by the enhancements to TETRA that aim to provide alternative modulation schemes with a view to offering higher data transmission rates. NOTE: The analysis provided by ETR 086-3 1 remains valid and the recommendations made b
19、y that document remain in force. In clause 7 the analysis identifies security extensions required for EN 300 392-7 3. 2 References For the purposes of this Technical Report (TR), the following references apply: 1 ETSI ETR 086-3: “Trans European Trunked Radio (TETRA) systems; Technical requirements s
20、pecification; Part 3: Security aspects“. 2 ISO/IEC 9798-2: “Information technology - Security techniques - Entity authentication: Part 2: Mechanisms using symmetric encipherment algorithms“. 3 ETSI EN 300 392-7: “Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 7: Security“. 4 ETSI TR
21、101 053-1: “Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 1: TEA1“. 5 ETSI TR 101 053-2: “Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 2: TEA2“. 6 ETSI
22、 TR 101 053-3: “Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 3: TEA3“. 7 ETSI TR 101 053-4: “Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard encryption algorithms; Part 4: TEA4“. 8
23、ETSI TR 101 052: “Security Algorithms Group of Experts (SAGE); Rules for the management of the TETRA standard authentication and key management algorithm set TAA1“. 9 ETSI EN 300 392-5: “Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 5: Peripheral Equipment Interface (PEI)“. 10 ETSI
24、TS 101 331: “Telecommunications security; Lawful Interception (LI); requirements of Law Enforcement Agencies“. 11 ETSI ETR 332: “Security Techniques Advisory Group (STAG); Security requirements capture“. 12 ISO/IEC 15408-1: “Information technology - Security techniques - Evaluation criteria for IT s
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1025122006TERRESTRIALTRUNKEDRADIOTETRASECURITYSECURITYREQUIREMENTSANALYSISFORMODULATIONENHANCEMENTSTOTETRA

链接地址:http://www.mydoc123.com/p-735984.html