ETSI TR 103 087-2017 Reconfigurable Radio Systems (RRS) Security related use cases and threats (V1 2 1).pdf
《ETSI TR 103 087-2017 Reconfigurable Radio Systems (RRS) Security related use cases and threats (V1 2 1).pdf》由会员分享,可在线阅读,更多相关《ETSI TR 103 087-2017 Reconfigurable Radio Systems (RRS) Security related use cases and threats (V1 2 1).pdf(119页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 103 087 V1.2.1 (2017-11) Reconfigurable Radio Systems (RRS); Security related use cases and threats TECHNICAL REPORT ETSI ETSI TR 103 087 V1.2.1 (2017-11) 2 Reference RTR/RRS-0313 Keywords radio, safety, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33
2、4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The present document may be made available i
3、n electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevai
4、ling document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI
5、documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized i
6、n any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reprodu
7、ction in all media. ETSI 2017. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are trademarks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are trademarks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. oneM2M logo is p
8、rotected for the benefit of its Members. GSM and the GSM logo are trademarks registered and owned by the GSM Association. ETSI ETSI TR 103 087 V1.2.1 (2017-11) 3 Contents Intellectual Property Rights 8g3Foreword . 8g3Modal verbs terminology 8g3Introduction 8g31 Scope 9g32 References 9g32.1 Normative
9、 references 9g32.2 Informative references . 9g33 Definitions and abbreviations . 11g33.1 Definitions . 11g33.2 Abbreviations 12g34 Method of analysis . 14g35 Security objectives . 19g35.1 Overview . 19g35.2 Assumptions and assertions of RRS 21g35.3 Objectives arising from RED analysis . 22g35.4 Obje
10、ctives arising from ComSec analysis . 22g35.5 Objectives arising from the analysis of the RAP as ToE#2 . 23g35.6 Objectives arising from the analysis of the DoC as ToE#3 . 23g36 Stakeholders and assets 24g36.1 Use cases . 24g36.1.1 Introduction 24g36.1.2 Timing dependencies between use cases . 27g36
11、.2 Assets 28g36.2.1 Mobile Device Reconfiguration Classes 28g36.2.2 Radio Application operating environment . 29g36.2.3 Radio Application and Radio Application Package . 31g36.2.4 Declaration of Conformity and CE marking 31g36.2.5 External assets . 31g36.3 Cardinalities 32g37 Identification of ToE f
12、or RRS App deployment 33g37.1 Overview . 33g37.2 ToE#1: communication between the RadioApp Store and the RE 34g37.2.1 Introduction 34g37.2.2 Threats . 35g37.2.3 Risk assessment . 36g37.3 ToE#2: Radio Application Package 36g37.3.1 Introduction 36g37.3.2 Lifecycle starting from the availability on the
13、 RadioApp Store 36g37.3.3 Other aspects of the lifecycle . 38g37.3.3.1 Withdrawal of a Radio Application from the Radio Market Platform . 38g37.3.3.2 Development and pre-distribution phase 38g37.3.3.3 RE and RA lifetime 38g37.3.3.4 Identification of rogue or compromised Radio Applications . 39g37.3.
14、4 ToE#2 environment . 39g37.3.5 Out-of-scope aspects of ToE#2 39g37.3.6 Threats . 39g37.4 ToE#3: Declaration of Conformity and CE marking 39g37.4.1 DoC characteristics 39g37.4.2 Consequences drawn from characteristics . 41g37.4.3 DoC usage from a market surveillance perspective . 41g37.4.4 ToE#3 env
15、ironment . 42g3ETSI ETSI TR 103 087 V1.2.1 (2017-11) 4 7.4.5 Out-of-scope aspects of ToE#3 42g37.4.6 Threats . 42g37.5 Conceptual countermeasure framework for RRS to address ToE#1, ToE#2 and ToE#3 42g37.5.1 Introduction 42g37.5.2 Framework elements 42g37.5.3 Revised risk calculations . 43g37.5.3.1 A
16、pplication of identity management framework 43g37.5.3.1.0 Introduction 43g37.5.3.1.1 Identities in RRS. 43g37.5.3.2 Application of non-repudiation framework 46g37.5.3.3 Application of integrity verification framework 46g37.5.4 Summary of threats introduced by countermeasures . 46g38 Modifications ap
17、plicable to the RRS architecture 46g38.1 Additional elements . 46g38.2 Additional flow diagrams 47g38.2.1 RAP endorsement, distribution, and validation . 47g38.2.2 DoC endorsement, distribution, and validation 48g39 Remote attestation of the Reconfigurable Equipment status (installed RA and DoC) . 5
18、0g39.1 Overview of remote attestation use case . 50g39.2 Actors and relationships 51g39.2.1 The platform 51g39.2.2 The attesting entity. 51g39.2.3 The verifying entity . 51g39.2.4 The requestor . 52g39.3 Considerations for remote attestation solutions in RRS 53g39.3.1 Relation to the non-repudiation
19、 framework . 53g39.3.2 Implementation 53g39.4 Direct Anonymous Attestation 53g310 Configuration enforcement of reconfigurable equipment 54g310.1 Introduction and scenario 54g310.2 Scope . 54g310.2.1 Background 54g310.2.2 Core Command set. 55g310.2.3 Extended Command Set . 55g310.2.4 Actors . 56g310.
20、3 Technical considerations . 57g310.3.1 RAT capabilities 57g310.3.2 Access control 57g310.3.3 Default control channel 57g310.4 Technical implementation . 58g310.4.1 Introduction 58g310.4.2 Data model and data flows . 58g310.4.3 Delivery mechanisms in selected RAT 59g310.5 Security objectives 60g310.
21、6 Threats . 60g311 Long-term management of reconfigurable equipment . 61g311.1 Introduction and scenario 61g311.2 Scope . 62g311.3 Architecture and Actors . 62g311.3.1 Introduction 62g311.3.2 The RRS Configuration Profile . 63g311.3.3 The RRS-CP Profile. 63g311.3.4 Transfer of Authority Document (TA
22、D) 63g311.3.5 Effective transfer of authority 64g311.4 Verification of profiles and actors, profile updates . 64g311.5 Message flows . 65g311.5.1 Transfer of authority between two RRS-CA 65g311.5.2 Designation of legitimate RRS-CP by the RRS-CA 66g311.5.3 Distribution of a new RRS Configuration Prof
23、ile 67g3ETSI ETSI TR 103 087 V1.2.1 (2017-11) 5 11.6 Security objectives 67g311.7 Threats and limitations 69g312 Device root of trust for RRS . 70g312.1 Introduction . 70g312.2 Services . 71g312.2.1 Immutable pre-provisioned data 71g312.2.2 Measurement 71g312.2.3 Secure cryptographic primitives and
24、execution environment 71g312.2.4 Secure boot 71g312.2.5 Secure storage 72g312.2.6 Policy-based access control . 74g312.2.7 Random number generation . 74g312.2.8 Trusted time . 74g312.2.9 Trusted environmental information . 74g312.2.10 Audit 74g312.2.11 Mutual authentication and secure communications
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1030872017RECONFIGURABLERADIOSYSTEMSRRSSECURITYRELATEDUSECASESANDTHREATSV121PDF

链接地址:http://www.mydoc123.com/p-736309.html