ETSI TR 103 167-2011 Machine-to-Machine Communications (M2M) Threat analysis and counter-measures to M2M service layer (V1 1 1)《机器对机器通信(M2M) M2M业务层的威胁分析和对策(版本1 1 1)》.pdf
《ETSI TR 103 167-2011 Machine-to-Machine Communications (M2M) Threat analysis and counter-measures to M2M service layer (V1 1 1)《机器对机器通信(M2M) M2M业务层的威胁分析和对策(版本1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI TR 103 167-2011 Machine-to-Machine Communications (M2M) Threat analysis and counter-measures to M2M service layer (V1 1 1)《机器对机器通信(M2M) M2M业务层的威胁分析和对策(版本1 1 1)》.pdf(62页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 103 167 V1.1.1 (2011-08)Technical Report Machine-to-Machine Communications (M2M);Threat analysis and counter-measures to M2M service layerETSI ETSI TR 103 167 V1.1.1 (2011-08)2Reference DTR/M2M-00012ed111 Keywords M2M, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FR
2、ANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may
3、be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF versi
4、on kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp I
5、f you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to rep
6、roduction in all media. European Telecommunications Standards Institute 2011. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of t
7、he 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 103 167 V1.1.1 (2011-08)3Contents Intellectual Property Rights 6g3Foreword . 6g31 Scope 7g31.1 General . 7g31.2 Specific . 7g32 References 8g32.1 Normative references . 8g3
8、2.2 Informative references 8g33 Definitions and abbreviations . 8g33.1 Definitions 8g33.2 Abbreviations . 9g34 Methodology Used for Analysis of Threats and Risks . 10g35 System Architecture . 13g35.1 High-Level Architecture . 13g35.2 Layered Model for the M2M System . 14g36 Stakeholders . 15g37 Trus
9、t Model 15g38 Type 1 Threats, Specific to the M2M Service Layer and its Interfaces . 16g38.1 Threat 1: Discovery of Long-Term Service-Layer Keys Stored in M2M Devices or M2M Gateways 16g38.1.1 Description 16g38.1.2 Assessment of Risk . 16g38.1.3 Mitigation of Risk. 17g38.1.3.1 Potential Counter-Meas
10、ures 17g38.1.3.2 Responsibility for Counter-Measures 18g38.2 Threat 2: Deletion of Long-Term Service-Layer Keys Stored in M2M Devices or M2M Gateways 18g38.2.1 Description 18g38.2.2 Assessment of Risk . 19g38.2.3 Mitigation of Risk. 19g38.2.3.1 Potential Counter-Measures 19g38.2.3.2 Responsibility f
11、or Counter-Measures 20g38.3 Threat 3: Replacement of Long-Term Service-Layer Keys Stored in M2M Devices or M2M Gateways . 20g38.3.1 Description 20g38.3.2 Assessment of Risk . 20g38.3.3 Mitigation of Risk. 21g38.3.3.1 Potential Counter-Measures 21g38.3.3.2 Responsibility for Counter-Measures 21g38.4
12、Threat 4: Discovery of Long-Term Service-Layer Keys Stored in the SCs of the M2M Core 21g38.4.1 Description 21g38.4.2 Assessment of Risk . 22g38.4.3 Mitigation of Risk. 22g38.4.3.1 Potential Counter-Measures 22g38.4.3.2 Responsibility for Counter-Measures 23g38.5 Threat 5: Deletion of Long-Term Serv
13、ice-Layer Keys Stored in the SCs of an M2M Core 23g38.5.1 Description 23g38.5.2 Assessment of Risk . 23g38.5.3 Mitigation of Risk. 24g38.5.3.1 Potential Counter-Measures 24g38.5.3.2 Responsibility for Counter-Measures 24g38.6 Threat 6: Discovery of Long-Term Service-Layer Keys Stored in MSBF or MAS
14、. 24g38.6.1 Description 24g38.6.2 Assessment of Risk . 24g3ETSI ETSI TR 103 167 V1.1.1 (2011-08)48.6.3 Mitigation of Risk . 25g38.6.3.1 Potential Counter-Measures 25g38.6.3.2 Responsibility for Counter-Measures 25g38.7 Threat 7: Deletion of Long-Term Service-Layer Keys Stored in the MSBF/MAS 25g38.7
15、.1 Description 25g38.7.2 Assessment of Risk . 26g38.7.3 Mitigation of Risk. 26g38.7.3.1 Potential Counter-Measures 26g38.7.3.2 Responsibility for Counter-Measures 26g38.8 Threat 8: Discover Keys by Eavesdropping on Communications Between Entities 27g38.8.1 Description:. 27g38.8.2 Assessment of Risk
16、. 27g38.8.3 Mitigation of Risk. 28g38.8.3.1 Potential Counter-Measures 28g38.8.3.2 Responsibility for Counter-Measures 30g38.9 Threat 9: Modification of Data Stored in the M2M Service Capabilities . 30g38.9.1 Description:. 30g38.9.2 Assessment of Risk . 30g38.9.3 Mitigation of Risk. 31g38.9.3.1 Pote
17、ntial Counter-Measures 31g38.9.3.2 Responsibility for Counter-Measures 32g38.10 Threat 10: Provisioning of non-Legitimate Keys . 32g38.10.1 Description:. 32g38.10.2 Assessment of Risk . 32g38.10.3 Mitigation of Risk . 33g38.10.3.1 Potential Counter-Measures 33g38.10.3.2 Responsibility for Counter-Me
18、asures 33g38.11 Threat 11: Unauthorised or Corrupted Application and Service-Layer Software in M2M Devices/Gateways 33g38.11.1 Description 33g38.11.2 Assessment of Risk . 34g38.11.3 Mitigation of Risk . 34g38.11.3.1 Potential Counter-Measures 35g38.11.3.2 Responsibility for Counter-Measures 35g38.12
19、 Threat 12: Subverting the M2M Device/Gateway Integrity-Checking Procedures 35g38.12.1 Description 35g38.12.2 Assessment of Risk . 36g38.12.3 Mitigation of Risk . 36g38.12.4 Potential Counter-Measures 36g38.12.4.1 Responsibility for Counter-Measures 37g38.13 Threat 13: Unauthorised or Corrupted Soft
20、ware in M2M Core . 37g38.13.1 Description 37g38.13.2 Assessment of Risk . 37g38.13.3 Mitigation of Risk . 38g38.13.3.1 Potential Counter-Measures 38g38.13.3.2 Responsibility for Counter-Measures 38g38.14 Threat 14: Subverting the Integrity-Checking Procedures in the M2M Core . 38g38.14.1 Description
21、 38g38.14.2 Assessment of Risk . 39g38.14.3 Mitigation of Risk . 39g38.14.3.1 Potential Counter-Measures 39g38.14.3.2 Responsibility for Counter-Measures 40g38.15 Threat 15: General Eavesdropping on M2M Service-Layer Messaging Between Entities 40g38.15.1 Description 40g38.15.2 Assessment of Risk . 4
22、0g38.15.3 Mitigation of Risk . 41g38.15.3.1 Required Counter-Measures 41g38.15.3.2 Responsibility for Counter-Measures 41g38.16 Threat 16: Alteration of M2M Service-Layer Messaging Between Entities 41g38.16.1 Description 41g38.16.2 Assessment of Risk . 42g38.16.3 Mitigation of Risk . 42g3ETSI ETSI T
23、R 103 167 V1.1.1 (2011-08)58.16.3.1 Required Counter-Measures 43g38.16.3.2 Responsibility for Counter-Measures 43g38.17 Threat 17: Replay of M2M Service-Layer Messaging Between Entities . 43g38.17.1 Description 43g38.17.2 Assessment of Risk . 43g38.17.3 Mitigation of Risk . 44g38.17.3.1 Potential Co
24、unter-Measures 44g38.17.3.2 Responsibility for Counter-Measures 44g38.18 Threat 18: Breach of Privacy due to Inter-Application Communications 44g38.18.1 Description 44g38.18.2 Assessment of Risk . 45g38.18.3 Mitigation of Risk . 45g38.18.4 Potential Counter-Measures 46g38.18.5 Responsibility for Cou
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1031672011MACHINETOMACHINECOMMUNICATIONSM2MTHREATANALYSISANDCOUNTERMEASURESTOM2MSERVICELAYERV111

链接地址:http://www.mydoc123.com/p-736352.html