ETSI TS 100 392-7-2006 Terrestrial Trunked Radio (TETRA) Voice Plus Data (V+D) Part 7 Security《陆地集群无线电(TETRA) 语音加数据(V+D) 第7部分 安全性(版本2 4 1)》.pdf
《ETSI TS 100 392-7-2006 Terrestrial Trunked Radio (TETRA) Voice Plus Data (V+D) Part 7 Security《陆地集群无线电(TETRA) 语音加数据(V+D) 第7部分 安全性(版本2 4 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI TS 100 392-7-2006 Terrestrial Trunked Radio (TETRA) Voice Plus Data (V+D) Part 7 Security《陆地集群无线电(TETRA) 语音加数据(V+D) 第7部分 安全性(版本2 4 1)》.pdf(177页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TS 100 392-7 V2.4.1 (2006-10)Technical Specification Terrestrial Trunked Radio (TETRA);Voice plus Data (V+D);Part 7: SecurityETSI ETSI TS 100 392-7 V2.4.1 (2006-10) 2 Reference RTS/TETRA-06177 Keywords security, TETRA, V+D ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel
2、.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made
3、available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept
4、on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you fi
5、nd errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproductio
6、n in all media. European Telecommunications Standards Institute 2006. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered by ETSI for the benefit of its Members.
7、3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TS 100 392-7 V2.4.1 (2006-10) 3 Contents Intellectual Property Rights9 Foreword.9 Introduction 9 1 Scope 10 1.1 Security classes 10 1.2 Document layout 11 2 References 11 3 Def
8、initions and abbreviations.12 3.1 Definitions12 3.2 Abbreviations .14 4 Air Interface authentication and key management mechanisms 15 4.1 Air interface authentication mechanisms .15 4.1.1 Overview 15 4.1.2 Authentication of an MS.16 4.1.3 Authentication of the infrastructure 17 4.1.4 Mutual authenti
9、cation of MS and infrastructure .17 4.1.5 The authentication key19 4.1.6 Equipment authentication .19 4.2 Air Interface key management mechanisms.20 4.2.1 The DCK.20 4.2.2 The GCK.21 4.2.3 The CCK.22 4.2.4 The SCK .23 4.2.4.1 SCK association for DMO use24 4.2.4.1.1 DMO SCK subset grouping.24 4.2.5 T
10、he GSKO 26 4.2.5.1 SCK distribution to groups with OTAR27 4.2.5.2 GCK distribution to groups with OTAR .27 4.2.5.3 Rules for MS response to group key distribution27 4.2.6 Encrypted Short Identity (ESI) mechanism 28 4.2.7 Encryption Cipher Key .28 4.2.8 Summary of AI key management mechanisms.29 4.3
11、Service description and primitives .30 4.3.1 Authentication primitives .30 4.3.2 SCK transfer primitives 31 4.3.3 GCK transfer primitives32 4.3.4 GSKO transfer primitives .33 4.4 Authentication protocol33 4.4.1 Authentication state transitions.33 4.4.2 Authentication protocol sequences and operation
12、s .36 4.4.2.1 MSCs for authentication .37 4.4.2.2 MSCs for authentication Type-3 element .43 4.4.2.3 Control of authentication timer T354 at MS .46 4.5 OTAR protocols .47 4.5.1 CCK delivery - protocol functions47 4.5.1.1 SwMI-initiated CCK provision .47 4.5.1.2 MS-initiated CCK provision with U-OTAR
13、 CCK demand.48 4.5.1.3 MS-initiated CCK provision with announced cell reselection 49 4.5.2 OTAR protocol functions - SCK 50 4.5.2.1 MS requests provision of SCK(s)51 4.5.2.2 SwMI provides SCK(s) to individual MS .52 4.5.2.3 SwMI provides SCK(s) to group of MSs 54 4.5.2.4 SwMI rejects provision of SC
14、K 56 ETSI ETSI TS 100 392-7 V2.4.1 (2006-10) 4 4.5.3 OTAR protocol functions - GCK56 4.5.3.1 MS requests provision of GCK .56 4.5.3.2 SwMI provides GCK to an individual MS59 4.5.3.3 SwMI provides GCK to a group of MSs.61 4.5.3.4 SwMI rejects provision of GCK62 4.5.4 Cipher key association to group a
15、ddress.63 4.5.4.1 SCK association for DMO 64 4.5.4.2 GCK association .67 4.5.5 Notification of key change over the air.69 4.5.5.1 Change of DCK.71 4.5.5.2 Change of CCK.71 4.5.5.3 Change of GCK.71 4.5.5.4 Change of SCK for TMO71 4.5.5.5 Change of SCK for DMO .72 4.5.5.6 Synchronization of Cipher Key
16、 Change72 4.5.6 Security class change 72 4.5.6.1 Change of security class to security class 1 73 4.5.6.2 Change of security class to security class 2 73 4.5.6.3 Change of security class to security class 3 73 4.5.6.4 Change of security class to security class 3 with GCK .74 4.5.7 Notification of key
17、 in use74 4.5.8 Notification of GCK Activation/Deactivation 74 4.5.9 Deletion of SCK, GCK and GSKO.74 4.5.10 Air Interface Key Status Enquiry76 4.5.11 Crypto management group78 4.5.12 OTAR retry mechanism79 5 Enable and disable mechanism.79 5.1 General relationships79 5.2 Enable/disable state transi
18、tions.80 5.3 Mechanisms81 5.3.1 Disable of MS equipment .82 5.3.2 Disable of an subscription.82 5.3.3 Disable of subscription and equipment.82 5.3.4 Enable an MS equipment82 5.3.5 Enable an MS subscription .82 5.3.6 Enable an MS equipment and subscription.82 5.4 Enable/disable protocol 83 5.4.1 Gene
19、ral case83 5.4.2 Status of cipher key material.84 5.4.2.1 Permanently disabled state84 5.4.2.2 Temporarily disabled state 84 5.4.3 Specific protocol exchanges .84 5.4.3.1 Disabling an MS with mutual authentication 84 5.4.3.2 Enabling an MS with mutual authentication .85 5.4.3.3 Enabling an MS with n
20、on-mutual authentication86 5.4.3.4 Disabling an MS with non-mutual authentication.88 5.4.4 Enabling an MS without authentication89 5.4.5 Disabling an MS without authentication.90 5.4.6 Rejection of enable or disable command 90 5.4.7 MM service primitives91 5.4.7.1 TNMM-DISABLING primitive91 5.4.7.2
21、TNMM-ENABLING primitive.92 6 Air Interface (AI) encryption .92 6.1 General principles.92 6.2 Security class93 6.2.0 Notification of security class 94 6.2.0.1 Security Class of Neighbouring Cells .94 6.2.0.2 Identification of MS security capabilities .95 6.2.1 Constraints on LA arising from cell clas
22、s.95 6.3 Key Stream Generator (KSG) 95 ETSI ETSI TS 100 392-7 V2.4.1 (2006-10) 5 6.3.1 KSG numbering and selection 95 6.3.2 Interface parameters96 6.3.2.1 Initial Value (IV).96 6.3.2.2 Cipher Key 96 6.4 Encryption mechanism.97 6.4.1 Allocation of KSS to logical channels 97 6.4.2 Allocation of KSS to
23、 logical channels with PDU association 98 6.4.3 Synchronization of data calls where data is multi-slot interleaved.99 6.4.4 Recovery of stolen frames from interleaved data .100 6.5 Use of cipher keys 100 6.5.1 Identification of encryption state of downlink MAC PDUs .101 6.5.1.1 Class 1 cells.101 6.5
24、.1.2 Class 2 cells.102 6.5.1.3 Class 3 cells.102 6.5.2 Identification of encryption state of uplink MAC PDUs 102 6.6 Mobility procedures .103 6.6.1 General requirements103 6.6.1.1 Additional requirements for class 3 systems.103 6.6.2 Protocol description103 6.6.2.1 Negotiation of cipher parameters 1
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITS10039272006TERRESTRIALTRUNKEDRADIOTETRAVOICEPLUSDATAVDPART7SECURITY 陆地 集群 无线电 TETRA 语音 数据 VD 部分

链接地址:http://www.mydoc123.com/p-737361.html