ETSI TR 103 087-2016 Reconfigurable Radio Systems (RRS) Security related use cases and threats in Reconfigurable Radio Systems (V1 1 1)《可重构无线电系统(RRS) 可重构无线电系统中的安全相关用例和威胁(V1 1 1)》.pdf
《ETSI TR 103 087-2016 Reconfigurable Radio Systems (RRS) Security related use cases and threats in Reconfigurable Radio Systems (V1 1 1)《可重构无线电系统(RRS) 可重构无线电系统中的安全相关用例和威胁(V1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI TR 103 087-2016 Reconfigurable Radio Systems (RRS) Security related use cases and threats in Reconfigurable Radio Systems (V1 1 1)《可重构无线电系统(RRS) 可重构无线电系统中的安全相关用例和威胁(V1 1 1)》.pdf(80页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 103 087 V1.1.1 (2016-06) Reconfigurable Radio Systems (RRS); Security related use cases and threats in Reconfigurable Radio Systems TECHNICAL REPORT ETSI ETSI TR 103 087 V1.1.1 (2016-06) 2 Reference DTR/RRS-03010 Keywords radio, safety, security ETSI 650 Route des Lucioles F-06921 Sophia An
2、tipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present
3、 document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions
4、 and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the curre
5、nt status of this and other ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No par
6、t may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the forego
7、ing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2016. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the be
8、nefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 103 087 V1.1.1 (2016-06) 3 Contents Intellectual Property Rights 6g3Foreword . 6g3Modal verbs terminology 6g3Introduction 6g31 Scope 7g32 Refer
9、ences 7g32.1 Normative references 7g32.2 Informative references . 7g33 Definitions and abbreviations . 8g33.1 Definitions . 8g33.2 Abbreviations 9g34 Method of analysis . 10g35 Security objectives . 15g35.1 Overview . 15g35.2 Assumptions and assertions of RRS 17g35.3 Objectives arising from RED anal
10、ysis . 18g35.4 Objectives arising from ComSec analysis . 18g35.5 Objectives arising from the analysis of the RAP as ToE#2 . 19g35.6 Objectives arising from the analysis of the DoC as ToE#3 . 19g36 Stakeholders and assets 20g36.1 Use cases . 20g36.1.1 Introduction 20g36.1.2 Timing dependencies betwee
11、n use cases . 23g36.2 Assets 24g36.2.1 Mobile Device Reconfiguration Classes 24g36.2.2 Radio Application operating environment . 25g36.2.3 Radio Application and Radio Application Package . 27g36.2.4 Declaration of Conformity and CE marking 27g36.2.5 External assets . 27g36.3 Cardinalities 28g37 Iden
12、tification of ToE for RRS App deployment 29g37.1 Overview . 29g37.2 ToE#1: communication between the RadioApp Store and the RE 30g37.2.1 Introduction 30g37.2.2 Threats . 31g37.2.3 Risk assessment . 32g37.3 ToE#2: Radio Application Package 32g37.3.1 Introduction 32g37.3.2 Lifecycle starting from the
13、availability on the RadioApp Store 32g37.3.3 Other aspects of the lifecycle . 34g37.3.3.1 Withdrawal of a Radio Application from the Radio Market Platform . 34g37.3.3.2 Development and pre-distribution phase 34g37.3.3.3 RE and RA lifetime 34g37.3.3.4 Identification of rogue or compromised Radio Appl
14、ications . 35g37.3.4 ToE#2 environment . 35g37.3.5 Out-of-scope aspects of ToE#2 35g37.3.6 Threats . 35g37.4 ToE#3: Declaration of Conformity and CE marking 35g37.4.1 DoC characteristics 35g37.4.2 Consequences drawn from characteristics . 37g37.4.3 DoC usage from a market surveillance perspective .
15、37g37.4.4 ToE#3 environment . 38g3ETSI ETSI TR 103 087 V1.1.1 (2016-06) 4 7.4.5 Out-of-scope aspects of ToE#3 38g37.4.6 Threats . 38g37.5 Conceptual countermeasure framework for RRS to address ToE#1, ToE#2 and ToE#3 38g37.5.1 Introduction 38g37.5.2 Framework elements 38g37.5.3 Revised risk calculati
16、ons . 39g37.5.3.1 Application of identity management framework 39g37.5.3.1.1 Identities in RRS. 39g37.5.3.2 Application of non-repudiation framework 42g37.5.3.3 Application of integrity verification framework 42g37.5.4 Summary of threats introduced by countermeasures . 42g38 Modifications applicable
17、 to the RRS architecture 42g38.1 Additional elements . 42g38.2 Additional flow diagrams 44g38.2.1 RAP endorsement, distribution, and validation . 44g38.2.2 DoC endorsement, distribution, and validation 45g3Annex A: Impact on RRS Security of European Radio Equipment Directive . 48g3A.1 Introduction 4
18、8g3A.2 Summary of applicable requirements . 48g3A.2.1 Applicability 48g3A.2.2 General principles 48g3A.2.3 Technical and security considerations . 49g3A.3 Declaration of Conformity (DoC) 49g3A.3.1 Introduction . 49g3A.3.2 Technical and security considerations . 50g3A.4 Safekeeping of the Declaration
19、 of Conformity 50g3A.4.1 Introduction . 50g3A.4.2 Technical and security considerations . 50g3A.5 Affixing of Declaration of Conformity 51g3A.5.1 Overview . 51g3A.5.2 Technical and security considerations . 51g3A.6 Pre-market actors and roles from the RED perspective . 52g3A.7 Other information to i
20、ndicate on the RE 53g3A.7.1 Introduction . 53g3A.7.2 Technical and security considerations . 53g3A.8 Actions in case of formal non-compliance, or with compliant radio equipment that presents a risk 53g3A.8.1 Introduction . 53g3A.8.2 Technical and security considerations . 53g3A.9 Post-market actors
21、and roles from the RED perspective 54g3A.10 Actions in case of RE presenting a risk 54g3A.10.1 Introduction . 54g3A.10.2 Technical and security considerations . 55g3A.10.3 Additional considerations 55g3Annex B: Summary of security objectives . 56g3Annex C: Summary of high level security requirements
22、 58g3Annex D: Completed TVRA pro forma for RRS security 59g3Annex E: TVRA Risk Calculation for selected RRS aspects . 61g3Annex F: Void 65g3ETSI ETSI TR 103 087 V1.1.1 (2016-06) 5 Annex G: Trust models in RRS app deployment 66g3G.1 Overview of trust 66g3G.2 Role of trust in RRS . 66g3G.3 Public Key
23、Infrastructures and Trust 67g3G.4 Models of trust . 69g3G.4.1 Overview . 69g3G.4.2 Directly delegated trust . 70g3G.4.3 Collaborative trust . 71g3G.4.4 Transitive trust . 72g3G.4.5 Reputational trust 72g3Annex H: Wireless Innovation Forum security considerations for SDRD . 73g3H.1 Introduction 73g3H
24、.2 Identification of assets 73g3H.3 Actors (stakeholders) 74g3H.4 Threat analysis 75g3H.4.1 Vulnerability classes 75g3H.4.2 Threat classes 76g3H.4.3 Attacks and exploits 76g3H.5 Identification of security critical processes 76g3H.6 Security services . 77g3H.7 Other considerations . 79g3H.7.1 Downloa
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1030872016RECONFIGURABLERADIOSYSTEMSRRSSECURITYRELATEDUSECASESANDTHREATSINRECONFIGURABLERADIOSYSTEMSV111

链接地址:http://www.mydoc123.com/p-736308.html