ITU-T SERIES K SUPP 5-2016 ITU-T K 81 C Estimation examples of the high-power electromagnetic threat and vulnerability for telecommunication systems (Study Group 5).pdf
《ITU-T SERIES K SUPP 5-2016 ITU-T K 81 C Estimation examples of the high-power electromagnetic threat and vulnerability for telecommunication systems (Study Group 5).pdf》由会员分享,可在线阅读,更多相关《ITU-T SERIES K SUPP 5-2016 ITU-T K 81 C Estimation examples of the high-power electromagnetic threat and vulnerability for telecommunication systems (Study Group 5).pdf(34页珍藏版)》请在麦多课文档分享上搜索。
1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Series K TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Supplement 5 (04/2016) SERIES K: PROTECTION AGAINST INTERFERENCE ITU-T K.81 Estimation examples of the high-power electromagnetic threat and vulnerability for telecom
2、munication systems ITU-T K-series Recommendations Supplement 5 K series Supplement 5 (04/2016) i Supplement 5 to ITU-T K-series Recommendations ITU-T K.81 Estimation examples of the high-power electromagnetic threat and vulnerability for telecommunication systems Summary When information security is
3、 managed, it is necessary to evaluate and mitigate the threat to either the equipment or the site. This threat is related to “vulnerability“ and “confidentiality“ in information security management system (ISMS). Supplement 5 to ITU-T K-series Recommendations presents evaluation and calculation exam
4、ples for the threat of an intentional high-altitude electromagnetic pulse (HPEM) attack. The HPEM sources considered are those presented in IEC 61000-2-13, as well as some additional sources that have emerged more recently. This Supplement also provides information on the vulnerability of telecom eq
5、uipment, and presents the example of vulnerability. It is desirable that the equipment meets the immunity requirements presented in Recommendation ITU-T K.48 and relevant resistibility requirements, such as those described in Recommendations ITU-T K.20, ITU-T K.21 and ITU-T K.45. History Edition Rec
6、ommendation Approval Study Group Unique ID* 1.0 ITU-T K Suppl. 5 2016-04-27 5 11.1002/1000/12965 Keywords Electromagnetic security, electrostatic discharge, high-altitude electromagnetic pulse, HPEM, IEMI, immunity, resistibility. * To access the Recommendation, type the URL http:/handle.itu.int/ in
7、 the address field of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/ 11830-en. ii K series Supplement 5 (04/2016) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommun
8、ications, information and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunic
9、ations on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedur
10、e laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this publication, the expression “Administration“ is used for conciseness to indicate both a telecommuni
11、cation administration and a recognized operating agency. Compliance with this publication is voluntary. However, the publication may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the publication is achieved when all of these mandatory p
12、rovisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the publication is required of any party. INTELLECTUAL PROPERTY RIGHTSITU draws attention t
13、o the possibility that the practice or implementation of this publication may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside
14、of the publication development process. As of the date of approval of this publication, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this publication. However, implementers are cautioned that this may not represent the latest informat
15、ion and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2016 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. K series Supplement 5 (04/2016) iii Table of Con
16、tents Page 1 Scope . 1 2 References . 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Supplement 2 4 Abbreviations and acronyms 2 5 Conventions 3 6 Calculating HPEM threat 3 6.1 Impulse radiating antenna (IRA) and JOLT . 3 6.2 Commercial radar . 7 6.3 Navigation radar . 8 6
17、.4 Magnetron generator 9 6.5 Illegal citizen band radio 11 6.6 Amateur radio . 12 6.7 Stun gun 14 6.8 Lightning-surge generator 16 6.9 CW generator 17 6.10 Commercial power supply 18 7 Vulnerability of IT equipment 18 7.1 Vulnerability to an electromagnetic wave attack . 18 7.2 Vulnerability evaluat
18、ion of a sample device 21 7.3 Vulnerability to electrostatic discharge 24 Bibliography. 25 iv K series Supplement 5 (04/2016) Introduction In order to establish the sufficient mitigation to HPEM attacks, it is extremely important that the threat level (electric field strength) and the vulnerability
19、of telecom equipment are adequately estimated. This Supplement provides the calculation examples of threat level from various sources presented in IEC 61000-2-13. The vulnerability examples of telecom equipment are also provided. K series Supplement 5 (04/2016) 1 Supplement 5 to ITU-T K-series Recom
20、mendations ITU-T K.81 Estimation examples of the high-power electromagnetic threat and vulnerability for telecommunication systems 1 Scope This document is a supplement to ITU-T K.81. This Supplement presents evaluation and calculation examples for the threat of an intentional HPEM attack. 2 Referen
21、ces ITU-T K.20 Recommendation ITU-T K.20 (2016), Resistibility of telecommunication equipment installed in a telecommunications centre to overvoltages and overcurrents. ITU-T K.21 Recommendation ITU-T K.21 (2016), Resistibility of telecommunication equipment installed in customer premises to overvol
22、tages and overcurrents. ITU-T K.43 Recommendation ITU-T K.43 (2009), Immunity requirements for telecommunication network equipment. ITU-T K.45 Recommendation ITU-T K.45 (2016), Resistibility of telecommunication equipment installed in the access and trunk networks to overvoltages and overcurrents. I
23、TU-T K.48 Recommendation ITU-T K.48 (2006), EMC requirements for telecommunication equipment Product family Recommendation. ITU-T K.81 Recommendation ITU-T K.81 (2016), High-power electromagnetic immunity guide for telecommunication systems. IEC 61000-2-13 IEC 61000-2-13 (2005), Electromagnetic comp
24、atibility (EMC) Part 2-13: Environment High-power electromagnetic (HPEM) environments Radiated and conducted. IEC CISPR 24 CISPR 24 (2010), Information technology equipment Immunity characteristics Limits and methods of measurement. 3 Definitions 3.1 Terms defined elsewhere This Supplement uses the
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ITUTSERIESKSUPP52016ITUTK81CESTIMATIONEXAMPLESOFTHEHIGHPOWERELECTROMAGNETICTHREATANDVULNERABILITYFORTELECOMMUNICATIONSYSTEMSSTUDYGROUP5PDF

链接地址:http://www.mydoc123.com/p-803327.html