ITU-R M 1078-1994 Security Principles for International Mobile Telecommunications-2000 (IMT-2000)《国际移动通信-2000(IMT-2000)的安全性原则》.pdf
《ITU-R M 1078-1994 Security Principles for International Mobile Telecommunications-2000 (IMT-2000)《国际移动通信-2000(IMT-2000)的安全性原则》.pdf》由会员分享,可在线阅读,更多相关《ITU-R M 1078-1994 Security Principles for International Mobile Telecommunications-2000 (IMT-2000)《国际移动通信-2000(IMT-2000)的安全性原则》.pdf(27页珍藏版)》请在麦多课文档分享上搜索。
1、ITU-R RECMN*M* LO78 94 4855232 05235b7 05T 1 . 2 . 3 . 4 . 5 . 6 . 7 . 8 . Kec . ITU-R M.1078 109 RECOMMENDATION ITU-R M.1078 SECURITY PRINCIPLES POR FUTURE PUBLIC LAND MOBILE TELECOMMUNICATION SYSTEMS (FPLMTS) (Question ITU-R 3918) (1994) TABLE OF CONTENTS Introduction Scope . . Structure of the Re
2、commendation Related documents Definitions System overview 6.1 System assumptions relevant to security 6.2 Operational scenario and logically involved parties (logical parties) . Consideratiois Recommendations 8.1 8.2 8.4 Security management 8.5 Security architecture and procedures General objective
3、s for security . System requirements on security 8.3 Security provided by FPL. MTS . . 8.6 Security algorithms . Annex 1 . Vocabulary . Annex 2 - Threat and risk analysis . Annex 3 - Potential security procedures Page i10 110 111 111 112 112 112 113 118 118 118 119 121 124 124 124 124 126 135 COPYRI
4、GHT International Telecommunications Union/ITU RadiocommunicationsLicensed by Information Handling Services110 Rec. ITU-R M.1078 1. Introduction Future public land mobile telecommunications systems (FPLMTS) are third generation mobile systems (TGMS) which are scheduled to start service around the ye
5、ar 2000 subject to market considerations. They will provide access, by means of one or more radio links, to a wide range of telecommunication services supported by the fixed telecommunication networks (e.g. PSTNASDN), and to other services which are specific to mobile users. A range of mobile termin
6、al types is encompassed, linking to terrestrial or satellite-based networks, and the terminals may be designed for mobile or fixed use. Key features of FPLMTS are: - high degree of commonality of design worldwide, - compatibility of services within FPLMTS and with the fixed networks, - high quality,
7、 - use of a small pocket-terminal worldwide. FPLMTS are defined by a set of interdependent ITU Recommendations, of which this one on security principles is a member. The subject matter of FPLMTS is complex and its representation in the form of Recommendations is evolving. To maintain the pace of pro
8、gress on the subject it is necessary to produce a sequence of Recommendations on a variety of aspects. The Recommendations strive to avoid apparent conflicts between themselves. Nevertheless, future Recommendations, or revisions, will be used to resolve any discrepancies. Due to the particular radia
9、ting nature of wireless communications, FPLMTS needs to incorporate some security measures to prevent easy reception by more parties than the intended recipient. In addition, the nature of mobile communication of FPLMTS requires security measures to prevent fraudulent access to the services. 2. Scop
10、e The scope of this Recommendation is to provide the principles and framework for the security provided by FPLMTS. The Recommendation covers all aspects of security for FPLMTS, and is intended as a basis for more detailed aspects of FPLMTS security to be integrated in various ITU-R or ITU-T Recommen
11、dations including FPLMTS requirements at a later stage. The Recommendation identifies the security requirements for FPLMTS and defines security features for FPLMTS. An informative Annex to the Recommendation contains a threat and risk analysis including the justification for the various security fea
12、tures defined. The system requirements on security in this Recommendation do not imply any legal responsibilities of involved parties concerning the security of the communication and associated information as this will be in accordance with a countrys national law. Possible security mechanisms, impl
13、ementation requirements for FPLMTS security mechanisms as procedures between the different parties involved in the FPLMTS operation and security algorithms are, however, not covered in this Recommendation, as these will be covered in the future ITU-R Recommendation on FPLMTS security procedures. The
14、 management of security features will be dealt with in the future ITU-R Recommendation on FPLMTS Network Management. The security provisions recommended for FPLMTS are defined with the objective of ensuring interoperability with roaming across international and national network boundaries. Flexibili
15、ty is left for implementation within these constraints. Although there are security requirements and features which are clearly considered to be specific to the radio access, there are those which may not be directly related to the radio access but may still have some relevance to the radio access.
16、They are included in this Recommendation with an indication of “possibly not directly related to the radio in terface”. COPYRIGHT International Telecommunications Union/ITU RadiocommunicationsLicensed by Information Handling ServicesRec. ITU-R M.1078 3. Structure of the Recommendation 111 Figure 1 g
17、ives an overview of the methodology and structure of this Recommendation. Section 6 gives a system overview of FPLMTS and identifies the involved parties in the FPLMTS service. Section 8.1 lists the general objectives for security. Section 8.2 gives system requirements on security and 0 8.3 identifi
18、es the security features provided by FPLMTS, and makes reference to the future Recommendation on FPLMTS security mechanisms. Section 8.4 is a reference to future Recommendations on FPLMTS network management. Sections 8.5 and 8.6 are reference to the future Recommendation on FPLMTS security procedure
19、s and security algorithms, respectively. Finally, Annex 1 lists the vocabulary used in this Recommendation and Annex 2 gives the threat and risk analysis leading up to the security defined for FPLMTS. Annex 3 lists potential security procedures to be considered for the future Recommendation on FPLMT
20、S security procedures. FIGURE 1 Methodology and recommendation structure Security objectives l System overview Threats . .- Threats associated -11 Annex2 with system entities Threatsassociated . . .a with FPLMTS services I -._._ Procedures 0 8.5 0 8.6 . . . . . . . . Algorithms I . . . . . . . . . 0
21、 8.4 *W! 4. Related documents The following ITU documents contain information on FPLMTS relating to this Recommendation: - Recommendation ITU-R M.687: Future Public Land Mobile Telecommunication Systems (FPLMTS) - Recommendation ITU-R M.816: Framework for services supported on Future Public Land Mob
22、ile Telecommunication Systems (FPLMTS) COPYRIGHT International Telecommunications Union/ITU RadiocommunicationsLicensed by Information Handling Services ITU-R RECMN*M. LO78 94 I 4855232 0523570 b44 112 Rec. ITU-R M.1078 - Recommendation ITU-R M.817: Future Public Land Mobile Telecommunication System
23、s (FPLMTS) Network architectures - Recommendation ITU-R M.818: Satellite operation within Future Public Land Mobile Telecom- munication Systems (FPLMTS) - Recommendation ITU-R M.819: Future Public Land Mobile Telecommunication Systems (FPLMTS) for developing countries - Draft ITU-T Recommendation F.
24、115: Operational and service provisions for FPLMTS - Recommendation ITU-R M.1034: Requirements for the radio interface(s) for Future Public Land Mobile Telecommunication Systems (FPLMTS) - Recommendation ITU-R M.1035: Framework for radio interface(s) and radio sub-system functionality for Future Pub
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITURM10781994SECURITYPRINCIPLESFORINTERNATIONALMOBILETELECOMMUNICATIONS2000IMT2000 国际 移动 通信 2000 IMT2000

链接地址:http://www.mydoc123.com/p-791561.html