Technical Specification Intelligent Transport Systems (ITS); Security; Trust and Privacy Management
|
|
|
- Hope Turner
- 10 years ago
- Views:
Transcription
1 TS V1.1.1 ( ) Technical Specification Intelligent Transport Systems (ITS); Security; Trust and Privacy Management
2 2 TS V1.1.1 ( ) Reference DTS/ITS Keywords interoperability, ITS, management, security 650 Route des Lucioles F Sophia Antipolis Cedex - FRANCE Tel.: Fax: Siret N NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on printers of the PDF version kept on a specific network drive within Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other documents is available at If you find errors in the present document, please send your comment to one of the following services: Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute All rights reserved. DECT TM, PLUGTESTS TM, UMTS TM and the logo are Trade Marks of registered for the benefit of its Members. 3GPP TM and LTE TM are Trade Marks of registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association.
3 3 TS V1.1.1 ( ) Contents Intellectual Property Rights... 4 Foreword Scope References Normative references Informative references Definitions and abbreviations Definitions Abbreviations ITS authority hierarchy Overview ITS authorities Enrolment Authority Authorization Authority Root CA Privacy in ITS Trust and privacy management ITS-S Security Lifecycle Manufacture Enrolment Authorization Maintenance Public Key Infrastructure Assumption and requirements Message Sequences Introduction Enrolment Request Authorization Request Security association and key management between ITS Stations Broadcast SAs Multicast SAs Unicast SAs Annex A (informative): ITS security messages specified in ASN A.1 ITS trust and privacy messages specified in ASN A.2 Enrolment and authorization message structures Annex B (informative): Secret-key use cases and application categories Annex C (informative): Extensions to IEEE to support additional security functions C.1 Rationale C.2 Use of a cryptographic digest of the signer identifier C.3 Encryption of the signer identifier in an authorization certificate request C.4 Request and transmission of multiple authorization certificates Annex D (informative): Bibliography History... 30
4 4 TS V1.1.1 ( ) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to. The information pertaining to these essential IPRs, if any, is publicly available for members and non-members, and can be found in SR : "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to in respect of standards", which is available from the Secretariat. Latest updates are available on the Web server ( Pursuant to the IPR Policy, no investigation, including IPR searches, has been carried out by. No guarantee can be given as to the existence of other IPRs not referenced in SR (or the updates on the Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification (TS) has been produced by Technical Committee Intelligent Transport System (ITS).
5 5 TS V1.1.1 ( ) 1 Scope The present document specifies the trust and privacy management for Intelligent Transport System (ITS) communications. Based upon the security services defined in TS [1] and the security architecture define in TS [5], it identifies the trust establishment and privacy management required to support security in an ITS environment and the relationships that exist between the entities themselves and the elements of the ITS reference architecture defined in EN [2]. The present document identifies and specifies security services for the establishment and maintenance of identities and cryptographic keys in an Intelligent Transport System (ITS). Its purpose is to provide the functions upon which systems of trust and privacy can be built within an ITS. 2 References References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at NOTE: While any hyperlinks included in this clause were valid at the time of publication cannot guarantee their long term validity. 2.1 Normative references The following referenced documents are necessary for the application of the present document. [1] TS : "Intelligent Transport Systems (ITS); Security; Security Services and Architecture". [2] EN : "Intelligent Transport Systems (ITS); Communications Architecture". [3] TS : "Intelligent Transport Systems (ITS); Security; Stage 3 mapping for IEEE ". [4] TS : "Intelligent Transport Systems (ITS); Security; Access control". [5] TS : "Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management". [6] ISO/IEC :2008: "Information technology -- Abstract Syntax Notation One (ASN.1): Specification of basic notation". [7] ISO/IEC :2008: "Information technology -- ASN.1 encoding rules: Specification of Packed Encoding Rules (PER)". [8] IEEE P1609.2/D12 (January 2012): "IEEE Draft Standard for Wireless Access in Vehicular Environments - Security Services for Applications and Management Messages". NOTE: Available from [9] TS : "Intelligent Transport Systems (ITS); Security; Confidentiality services".
6 6 TS V1.1.1 ( ) 2.2 Informative references The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area. [i.1] [i.2] [i.3] [i.4] [i.5] [i.6] ISO/IEC : "Information technology - Security techniques - Evaluation criteria for IT security; Part 2: Security functional components". TR : "Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Definitions". IETF RFC 4046: "Multicast Security (MSEC) Group Key Management Architecture". IETF RFC 4301: "Security Architecture for the Internet Protocol". IETF RFC 4302: "IP Authentication Header". IETF RFC 4303: "IP Encapsulating Security Payload (ESP)". [i.7] IETF RFC 5246: "The Transport Layer Security (TLS) Protocol Version 1.2". [i.8] [i.9] [i.10] IETF RFC 3547: "The Group Domain of Interpretation". IETF RFC 3830: "MIKEY: Multimedia Internet KEYing". IETF RFC 4535: "GSAKMP: Group Secure Association Key Management Protocol". 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: anonymity: ability of a user to use a resource or service without disclosing the user's identity authorization authority: authority that provides an ITS-S with permission to invoke ITS applications and services canonical identifier: structured identifier that is globally unique enrolment authority: authority that validates that an ITS-S can be trusted to function correctly pseudonymity: ability of a user to use a resource or service without disclosing its user identity while still being accountable for that use unlinkability: ability of a user to make multiple uses of resources or services without others being able to link these uses together unobservability: ability of a user to use a resource or service without others, especially third parties, being able to observe that the resource or service is being used 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: AA CA CAM CRL CSR DENM EA Authorization Authority Certification Authority Cooperative Awareness Message Certificate Revocation List Certificate Signing Request Decentralized Environmental Notification Message Enrolment Authority
7 7 TS V1.1.1 ( ) ITS ITS-AID ITS-S MSEC PKI PSID SA SSP TLS Intelligent Transport System ITS Application ID ITS Station Multicast Security Public Key Infrastructure Provider Service Identifier Security Association Service Specific Permissions Transport Layer Security 4 ITS authority hierarchy 4.1 Overview Trust and privacy management requires secure distribution and maintenance (including revocation when applicable) of trust relationships, which may be enabled by specific security parameters that include 3 rd party certificates of proof of identity or other attributes such as pseudonym certificates. Public key certificates and Public Key Infrastructure (PKI) are used to establish and maintain trust between the ITS-S and other ITS stations and authorities. TS [1] defines the security management roles taken by: manufacturers: - insert an ITS authoritative identity (canonical identifier) into each ITS-S; Enrolment Authorities (EA): - verify an ITS Station (ITS-S) as a whole; and Authorization Authorities (AA): - authorize an ITS-S to use a particular application, service, or privilege. Separation of enrolment (identification and authentication) and authorization has been shown in TS [1] as an essential component of privacy management and provides protection against attacks on a user's privacy. However, it is possible for the EA role to be delegated to the manufacturer and for the EA and AA roles to be assumed by a single authority. NOTE: EN [2] defines an ITS registration authority role to protect against the distribution of malicious ITS applications. Registration authorities are responsible for registering and managing ITS applications exclusively and are not involved in operational security management. 4.2 ITS authorities Enrolment Authority The EA issues a proof of identity authenticating the canonical identifier issued to the ITS-S. The proof of identity does not reveal the canonical identifier to a 3 rd party and may be used by the ITS-S to request authorization of services from an AA. The functions provided by the EA are as follows: the authentication of the canonical identifier of an ITS-S; the provision of proof of authentication of the ITS-S.
8 8 TS V1.1.1 ( ) Authorization Authority An ITS-S that has enrolled with, and been authenticated by, an EA may apply to an AA for specific permissions within the enrolment authority's domain and the AA's authorization context. These privileges are denoted by means of authorization credentials in the form of IEEE [8] authorisation certificates. Each authorization certificate specifies a particular authorization context which comprises a set of permissions. EXAMPLE 1: An authorization certificate might grant permission to an ITS-S to broadcast messages from a particular message set. Alternatively, it might grant permission to claim certain privileges. The authorization context is specified either by explicitly encoding the permissions granted or by including a reference to a known policy that specifies the context. NOTE: An AA will normally be responsible for a particular set of contexts which may be specified by one or more of the following: application (for example, cooperative awareness applications for personal user vehicles, emergency service vehicles or tolling); time period; geographic region (nation, state, locality); or any other criteria that can be encoded. The authorization system may comprise a hierarchy of authorization authorities with lower-layer authorities authorizing ITS stations and higher-layer authorities authorizing lower-level authorities. EXAMPLE 2: The following three layer structure might be appropriate for official use vehicles: a) ITS global (National) authorization authority; b) ITS regional authorization authority; and c) ITS local authorization authority. EXAMPLE 3: For personal user vehicles, it might be appropriate to have a single authorization authority (either national or system-wide) for CAMs and DENMs, because short certificate chains reduce the packet size associated with authorization data. An AA should be unable to link the proof of authentication to the canonical identifier of an ITS-S without the collusion of the EA that performed the verification of the canonical identifier of the ITS-S Root CA Each CA hierarchy (for EA or AA) has at its summit a Root Certificate, which is the ultimate root of trust for all certificates within that hierarchy. In order to trust an incoming message, an ITS-S must have access at least to the root certificate at the summit of the hierarchy for the authorization certificate attached to the message. The ITS-S may obtain root certificates during the manufacture or maintenance lifecycle stages described in clauses to respectively. In principle root certificate information may be distributed over the air through a cross-certification process, but the present document does not specify messages to support this use case. 5 Privacy in ITS ISO/IEC [i.1] identifies 4 key attributes that relate to privacy: anonymity; pseudonymity; unlinkability; and unobservability.
9 9 TS V1.1.1 ( ) Anonymity alone is insufficient for protection of an ITS user's privacy and unsuitable as a solution for ITS, as one of the main requirements of ITS is that the ITS-S should be observable in order to provide improved safety. Consequently, pseudonymity and unlinkability offer the appropriate protection of the privacy of a sender of basic ITS safety messages (CAM and DENM). Pseudonymity ensures that an ITS-S may use a resource or service without disclosing its identity but can still be accountable for that use [i.1]. Unlinkability ensures that an ITS-S may make multiple uses of resources or services without others being able to link them together [i.1]. Pseudonymity shall be provided by using temporary identifiers in ITS safety messages, and never transmitting the station's canonical identifier in communications between ITS stations. Unlinkability can be achieved by limiting the amount of detailed immutable (or slowly changing) information carried in the ITS safety message, thus preventing the possible association of transmissions from the same vehicle over a long time period (such as two similar transmissions broadcast on different days). ITS Privacy is provided in two dimensions: (i) privacy of ITS registration and authorisation signalling: - ensured by permitting knowledge of the canonical identifier of an ITS-S to only a limited number of authorities; - provided by the separation of the duties and roles of ITS authorities into an entity verifying the canonical identifier known as the Enrolment Authority (EA) and an entity responsible for authorising and managing services known as the Authorization Authority (AA); (ii) privacy of communications between ITS-Ss. 6 Trust and privacy management 6.1 ITS-S Security Lifecycle The ITS-S Security Lifecycle includes the following stages: manufacture; enrolment; authorization; maintenance Manufacture As part of the ITS-S manufacturing process, the following information elements associated with the identity of the station shall be established within the ITS-S itself and within the Enrolment Authority (EA). in the ITS-S, the following information elements shall be established using a physically secure process. The specification of this physically secure process is out of scope for the present document. - a canonical identifier which is globally unique (see note 1); - contact information for the EA and AA which will issue certificates for the ITS-S: network address; public key certificate; - the set of current known trusted EA certificates which the ITS-S may use to initiate the enrolment process; - the set of current known trusted AA certificates which the ITS-S may use to trust communications from other ITS-S;
10 10 TS V1.1.1 ( ) - a public/private key pair for cryptographic purposes; and - optionally, a canonical certificate which associates the canonical identifier with the public key of the ITS-S and the certificate chain back the root authority. NOTE 1: the management of the canonical identifier and the means to guarantee uniqueness are not addressed in the present document. in the EA, the following four items of information, all associated with each other (see note 2): - the permanent canonical identifier of the ITS-S; - the enrolment identifier issued in the enrolment certificate; - the location of profile information for the ITS-S; and - the public key from the key pair belonging to the ITS-S. NOTE 2: The process for establishing this information within the ITS-S and the EA is beyond the scope of the present document Enrolment The ITS-S requests its enrolment certificate from the EA (see clause ) Authorization Having received the enrolment credentials, the ITS-S requests its authorization certificate(s) from the AA (see clause ) Maintenance If an EA or AA is added to or removed from the system, the associated authority (not defined by the present document) should inform enrolled ITS-Ss of this change. The process for achieving this is beyond the scope of the present document but possible methods include: sending a certificate revocation list as specified in IEEE [8] across a wireless interface; or providing information to a trusted maintenance entity to enable it to update an individual ITS-S in a controlled environment. 6.2 Public Key Infrastructure Assumption and requirements The present document assumes the ITS security reference model that is described in TS [5] Message Sequences Introduction The message sequences specified in clauses and for ITS-S enrolment and authorization are based on the protocol messages defined in TS [3] and IEEE [8]. Each of the messages shall be encoded into a 1609Dot2Data (see clause 6 in IEEE [8]) with the appropriate enumeration set into its "type" field to indicate whether it is encrypted, signed or unsecured. Figure 1 shows an example of the use of 1609Dot2Data structure to provide enrolment/authorization requests and responses.
11 11 TS V1.1.1 ( ) ITS-S Authority Enrolment / Authorization Request (Request) Enrolment / Authorization Request (Indication) 1609Dot2Data structure Figure 1: illustration of using 1609Dot2Data structure Enrolment Request The Enrolment Request message shall be sent by an ITS-S to the Enrolment Authority (EA) across the interface at reference point S 3 (see Figure 7 in TS [5]) to request an enrolment certificate to be used in a subsequent authorization request. Figure 2 shows an example of a message sequence for a successful or unsuccessful enrolment request. Figure 2: Message sequence for enrolment request and response The contents of the ITS-S Enrolment Request message shall be as described in Table 1 and shall be implemented as an IEEE ToBeEncrypted message of type certificate_request [8]. For information only, the content of the ITS-S Enrolment request message is described using ASN.1 [6], [7] in clause A.2.
12 12 TS V1.1.1 ( ) Table 1: Contents of ITS-S EnrolmentRequest message Field name Description Contents (see note) IEEE [8] mapping signerenrolrequest The canonical certificate or the public/private key A certificate or certificate chain that allows the EA to Field: info Type: SignerIdentifier pair that uniquely identifies determine which keying the ITS-S (initially provided during the bootstrap process) material to use to verify the request type shall be set to a value of either certificate or certificate_chain enrolcertrequest The certificate request Start time End time ITS-S' public key Certificate specific data signature NOTE: Signature of the enrolment request The cryptographic signature over all fields of the enrolment request created using the private key belonging to the ITS-S Field: unsigned_csr Type: ToBeSignedCertificateRequest subject_type shall be set to the value sec_data_exch_csr cf shall not be set to include the encryption_key flag CertSpecificData. SecDataExchCaScope.permitted_subject_types shall be set to either sec_data_exch_anonymous or sec_data_exch_identified_localized. CertSpecificData. SecDataExchCaScope.name shall be structured as the country code plus ITS service provider code plus ITS-S identifier CertSpecificData.SecDataExchCaScope.region shall be an identifier for the requested area of validity of the enrolment credentials CertSpecificData.SecDataExchCaScope.PsidArray.type shall be set to specified. CertSpecificData. SecDataExchCaScope.PsidArray.permissions_list shall contain a list of the ITS- AIDs to be supported. Field: signature Type: Signature shall not be set to the value unknown The whole EnrolmentRequest message shall be encrypted using an IEEE [8] approved algorithm and the public key provided by the enrolment authority. The EnrolmentResponse message shall be sent by the EA to the ITS-S across the interface at reference point S 3 in response to a received EnrolmentRequest message. The contents of the successful ITS-S Enrolment Response message shall be as described in Table 2 and shall be implemented as an IEEE ToBeEncrypted message of type certificate_response [8]. For information only, the content of the ITS-S Enrolment Response message is described using ASN.1 in clause A.2.
13 13 TS V1.1.1 ( ) Table 2: Contents of a successful ITS-S EnrolmentResponse message Field name Description Contents (see note 1) IEEE [8] mapping ackrequest An indication of whether an acknowledgement is requested by the Enrolment Authority (see note 2) Field: f Type: flags Shall be set to the value Not signedcertchain crlpath The enrolment certificate chain The CRLs required to validate a certificate The enrolment certificate containing the pseudonymous identifier to be used by the ITS-S; and the chain of certificates back to the originating enrolment CA Empty as public certificates are not listed in CRLs. (see note 2) requested. Field: certificate_chain Type: Certificate None Field: crl_path Type: Crl Shall be set to the value empty NOTE 1: The whole EnrolmentResponse message shall be encrypted using an IEEE [8] approved algorithm. NOTE 2: This element is included only for compatibility with IEEE [8]. The contents of the unsuccessful ITS-S Enrolment Response message shall be as described in Table 3 and shall be implemented as an IEEE ToBeEncrypted message of type certificate_request_error [8]. For information only, the content of the ITS-S Enrolment Request message is described using ASN.1 in clause A.2. Table 3: Contents of an unsuccessful ITS-S EnrolmentResponse message Field name Description Contents (see note) IEEE [8] mapping signerenrolresp The enrolment authority identified as signer of this error message requesthash enrolresult signature NOTE: Allows the requester to link this response to the request The error code of the unsuccessful enrolment response The enrolment authority's signature over the response A certificate or certificate chain that allows the ITS-S to determine which keying material to use to verify the response The first 10 bytes of the SHA-256 hash calculated over the plaintext EnrolmentRequest before the request is encrypted The cryptographic signature of the unsuccessful EnrolmentResponse created using the private key belonging to the enrolment authority Field: signer Type: SignerIdentifier Contraints: type shall be set to a value of either certificate or certificate_chain Field: request_hash Type: opaque Shall be of length 10 octets Field: reason Type: CertificateRequestErrorCode None Field: signature Type: Signature shall not be set to the value unknown The whole EnrolmentResponse message shall be encrypted using an IEEE [8] approved algorithm Authorization Request The Authorization Request message shall be sent by an ITS-S to the Authorization Authority (AA) across the interface at reference point S 2 (see Figure 7 in [5]) to request an authorization certificate to be used in a subsequent ITS communications. Figure 3 shows an example of a message sequence for a successful or unsuccessful authorization request.
14 14 TS V1.1.1 ( ) Figure 3: Message sequence for authorization request and response The contents of the ITS-S Authorization Request message shall be as described in Table 4 and shall be implemented as an IEEE ToBeEncrypted message of type certificate_request [8]. For information only, the content of the ITS-S Authorization Request message is described using ASN.1 [6], [7] in clause A.2. Table 4: Contents of ITS-S AuthorizationRequest message Field name Description Contents (note 1) IEEE [8] mapping signerauthrequest The enrolment certificate chain authcertrequest signature The certificate request Signature of the authorization request The enrolment certificate containing the pseudonymous identifier to be used by the ITS-S; and the chain of certificates back to the originating enrolment CA Start time End time ITS-S' authorization certificate public key Subject name - Optional (note 2) Additional data - Optional (note 3) Permissions Region of validity - Optional (note 4) The cryptographic signature over all fields of the enrolment request created using the private enrolment certificate key Field: info Type: SignerIdentifier type shall be set to a value of either certificate or certificate_chain Field: unsigned_csr Type: ToBeSignedCertificateRequest subject_type shall be set to the value sec_data_exch_anonymous, sec_data_exch_identified_not_localized, or sec_data_exch_identified_localized cf shall not be set to include the encryption_key flag PsidSspArray.type shall be set to specified Field: signature Type: Signature shall not be set to the value unknown belonging to the ITS-S NOTE 1: The whole AuthorizationRequest message shall be encrypted using an IEEE [8] approved algorithm and the public key provided by the authorization authority. NOTE 2: Shall be included if subject_type in the IEEE unsigned_csr field is set to either sec_data_exch_identified_not_localized or sec_data_exch_identified_localized. NOTE 3: Shall be included if subject_type in the IEEE unsigned_csr field is set to sec_data_exch_anonymous. NOTE 4: Shall be included if subject_type in the IEEE unsigned_csr field is set to either sec_data_exch_anonymous or sec_data_exch_identified_localized. The AuthorizationResponse message shall be sent by the AA to the ITS-S across the interface at reference point S 2 in response to a received AuthorizationRequest message. The contents of the successful ITS-S Authorisation Response message shall be as described in Table 5 and shall be implemented as an IEEE ToBeEncrypted message of type certificate_response [8]. For information only, the content of the ITS-S Authorisation Response message is described using ASN.1 in clause A.2.
15 15 TS V1.1.1 ( ) Table 5: Contents of a successful ITS-S AuthorizationResponse message Field name Description Contents (see note 1) IEEE [8] mapping ackrequest An indication of whether an acknowledgement is requested by Authorization Authority (see note 2) Field: f Type: flags Shall be set to the value Not signedcertchain The authorization certificate chain reconprivatevalue The reconstruction private value to derive the private key crlpath The CRLs required to validate a certificate The authorization certificate; and the chain of certificates back to the top authorization CA Optional field CRL requested. Field: certificate_chain Type: Certificate Shall be set to comply with AuthorizationRequest's authcertrequest. Field: recon_priv Type: opaque Only available if version_and_type equals implicit certificate (3) Field: crl_path Type: Crl None NOTE 1: The whole AuthorizationResponse message shall be encrypted using an IEEE approved algorithm. NOTE 2: This element is included only for compatibility with IEEE [8]. The contents of the unsuccessful ITS-S Authorization Response message shall be described in Table 6 and shall be implemented as an IEEE ToBeEncrypted message of type certificate_request_error [8]. For information only, the content of the ITS-S Authorization Request message is described using ASN.1 in clause A.2. Table 6: Contents of an unsuccessful ITS-S AuthorizationResponse message Field name Description Contents (see note) IEEE [8] mapping signerauthresp The authorization authority identified as signer of this error message A certificate or certificate chain that allows the ITS-S to determine which keying material to use to verify the response Field: signer Type: SignerIdentifier Contraints: type shall be set to a value of either certificate requesthash authresult signature NOTE: Allows the requester to link this response to the request The error code of the unsuccessful enrolment response The authorization authority's signature over the response The first 10 bytes of the SHA-256 hash calculated over the plaintext AuthorizationRequest before the request is encrypted The cryptographic signature of the unsuccessful AuthorizationResponse created using the private key belonging to the authorization authority or certificate_chain Field: request_hash Type: opaque Shall be of length 10 octets Field: reason Type: CertificateRequestErrorCode None Field: signature Type: Signature shall not be set to the value unknown The whole AuthorizationResponse message shall be encrypted using an IEEE approved algorithm.
16 16 TS V1.1.1 ( ) 7 Security association and key management between ITS Stations A detailed set of use case examples for ITS applications is presented in TR [i.2]. In addition, TS [5] categorizes the application communication (addressing) patterns used as: Broadcast; Multicast; Unicast. In contrast to the strictly safety-related broadcast applications (CAM and DENM), multicast and unicast applications are assumed to be offered by several providers and, possibly, to be commercially sensitive. Therefore, the requirements depend heavily on the specific application and the respective business model. With the exception of broadcast applications, all other multicast and unicast communications can use either asymmetric or symmetric key systems to provide for Security Association (SA) lifecycle and the related key management (registration, key establishment, updates and removal). Unicast and multicast applications shall use link layer encryption and regular changes of the ITS MAC addresses to protect the privacy of the ITS-S (and its user) as well as all higher layer information from radio channel eavesdropping. Further details can be found in TS [4] and TS [9]. 7.1 Broadcast SAs Broadcast applications such as CAM and DENM require authentication, authorisation and integrity but not confidentiality. Senders of CAM and DENM shall obtain this service by signing with an authorization certificate using the mechanisms of IEEE [8] (see clause and Table 5, as well as TS [3]). Figure 4 illustrates the use of the authorization certificate to sign a CAM or DENM between ITS stations. The "SignerInfo" field in Figure 4 is a field that contains either the certificate or a reference to it. Signer Info fields (1) CAM/DEMN payload fields (2) Signature Signature scope Figure 4: CAM and DENM signed using authorization certificates 7.2 Multicast SAs Multicast applications such as public transport information and Point of Interest notification services require secure group communications with message authentication, authorisation and encryption depending on that group's particular security policy. An ITS-S may join a multicast group using an authorisation certificate (see clause and Table 5) followed, possibly, by further registration steps. The key management for multicast applications can be controlled by the multicast service provider or a separate security manager. Such key management may be application-specific or it may use a standard multicast key management system such as the IETF Multicast Security (MSEC) Group Key Management Architecture [i.3], [i.8], [i.9] and [i.10].
17 17 TS V1.1.1 ( ) 7.3 Unicast SAs Unicast applications such as automatic access control, parking management and media downloading services require secure unicast communications with message authentication, authorisation and encryption. An ITS-S may join such services using its authorisation certificate (see clause and Table 5) followed, possibly, by further registration protocol steps. Unicast key management may be application-specific or it may use a standard key management systems such as network layer security using IPsec as defined by the IETF [i.4], [i.5] and [i.6]. Also, security in the transport layer can be provided using methods such as the IETF Transport Layer Security (TLS) [i.7].
18 18 TS V1.1.1 ( ) Annex A (informative): ITS security messages specified in ASN.1 A.1 ITS trust and privacy messages specified in ASN.1 The ASN.1 [6] modules in this annex specify data types for ITS trust and privacy services together with useful ASN.1 value notations. The ASN.1 is included here only for guidance. Messages associated with ITS security services should comply with the structures specified here but the definitive encoding of messages in an implementation of the present document is specified in clause 5 of IEEE [8]. A.2 Enrolment and authorization message structures ITStandp0v0 { itu-t(0) identified-organization(4) etsi(0) itsdomain(5) wg5(5) itstandp(2941) operation(0) version0(0) DEFINITIONS AUTOMATIC TAGS ::= BEGIN EnrolmentRequest -- corresponds to the CertificateRequest in signerenrolrequest SignerIdentifier, enrolcertrequest ToBeSignedEnrolmentCertificateRequest, signature Signature -- The Enrolment Request message shall be encrypted using an IEEE approved algorithm and the public key provided by the EAS EnrolmentResponse ::= CHOICE { successfulenrolment SuccesfulEnrolment, failedenrolment FailedEnrolment AuthorizationRequest signerauthrequest SignerIdentifier, authcertrequest CHOICE { anonrequest idnonlocrequest idlocrequest, ToBeSignedAuthCertReq-anon, ToBeSignedAuthCertReq-idNonLoc, ToBeSignedAuthCertReq-idLoc signature Signature -- The Authorization Request message shall be encrypted using an IEEE approved algorithm and the public key provided by the ITS-S AuthorizationResponse ::= CHOICE { successfulexplicitauthorization SuccessfulExplicitAuthorization, successfulimplicitauthorization SuccessfulImplicitAuthorization, failedauthorization FailedAuthorization ToBeSignedEnrolmentCertificateRequest versionandtype ImplicitOrExplicit, requesttime ItsTime, subjecttype SecDataExchCsr, cf UseStartVal-AndOr-Lifetime, enrolcertspecificdata SecDataExchCaCertSpecificData, expiration ItsTime, startvalidity ItsTime OPTIONAL, lifetime CertificateDuration OPTIONAL, verificationkey PublicKey, responseencryptionkey PublicKey ToBeSignedAuthCertReq-anon
19 19 TS V1.1.1 ( ) versionandtype ImplicitOrExplicit, requesttime ItsTime, subjecttype SecDataExchAnon, cf UseStartVal-AndOr-Lifetime, authcertspecificdata SecDataExchAnonymousCertSpecificData, startvalidity ItsTime OPTIONAL, lifetime CertificateDuration OPTIONAL, responseencryptionkey PublicKey ToBeSignedAuthCertReq-idNonLoc versionandtype ImplicitOrExplicit, requesttime ItsTime, subjecttype SecDataExchIdNonLoc, cf UseStartVal-AndOr-Lifetime, authcertspecificdata SecDataExchIdentifiedNotLocalizedCertSpecificData, startvalidity ItsTime OPTIONAL, lifetime CertificateDuration OPTIONAL, responseencryptionkey PublicKey ToBeSignedAuthCertReq-idLoc versionandtype ImplicitOrExplicit, requesttime ItsTime, subjecttype SecDataExchIdLoc, cf UseStartVal-AndOr-Lifetime, authcertspecificdata SecDataExchIdentifiedLocalizedCertSpecificData, startvalidity ItsTime OPTIONAL, lifetime CertificateDuration OPTIONAL, responseencryptionkey PublicKey SuccesfulEnrolment ackrequest signedcertchain crlpath FailedEnrolment ::= FailedCertResponse NotRequested, CertificateChain, NullCrl SuccessfulExplicitAuthorization ackrequest signedcertchain crlpath NotRequested, CertificateChain, Crl SuccessfulImplicitAuthorization ackrequest NotRequested, CertificateChain, signedcertchain reconprivatevalue OCTET STRING, crlpath Crl FailedAuthorization ::= FailedCertResponse FailedCertResponse signerenrolresp SignerIdentifier, requesthash OCTET STRING (SIZE (10)), enrolresult CertificateRequestErrorCode, signature Signature PublicKey algorithm public-key EcdsaNistWithShaAlgorithms, EccPublicKey PKAlgorithm ::= INTEGER ecdsanistp224withsha224 PKAlgorithm ::= 0 ecdsanistp256withsha256 PKAlgorithm ::= 1 eciesnistp256 PKAlgorithm ::= 2
20 20 TS V1.1.1 ( ) unknownalgorithm PKAlgorithm ::= 3 EcdsaNistWithShaAlgorithms ::= PKAlgorithm ( ecdsanistp224withsha224 ecdsanistp256withsha256 ) AcknowledgeRequest ::= BOOLEAN requested AcknowledgeRequest ::= TRUE notrequested AcknowledgeRequest ::= FALSE Requested ::= AcknowledgeRequest (requested) NotRequested ::= AcknowledgeRequest (notrequested) SignerIdentifier type SignerIdType, digest CertId8, id OCTET STRING SignerIdentifierType ::= Integer8 self SignerIdentifierType ::= 0 certificatedigestwithecdsap224 SignerIdentifierType ::= 1 certificatedigestwithecdsap256 SignerIdentifierType ::= 2 certificate SignerIdentifierType ::= 3 certificatechain SignerIdentifierType ::= 4 unknownsigner SignerIdentifierType ::= 5 Self ::= SignerIdentifierType (self) CertificateDigestWithEcdsap224 ::= SignerIdentifierType (certificatedigestwithecdsap224) CertificateDigestWithEcdsap256 ::= SignerIdentifierType (certificatedigestwithecdsap256) Cert ::= SignerIdentifierType (certificate) CertChain ::= SignerIdentifierType (certificatechain) UnknownSignerIdType ::= SignerIdentifierType (unknownsigner) SignerIdType ::= SignerIdentifierType (certificate certificatechain) CertId8 ::= OCTET STRING (SIZE (8)) Time32 ::= INTEGER ( ) CertificateDuration TimeUnit ::= Integer3 seconds TimeUnit ::= 0 minutes TimeUnit ::= 1 hours TimeUnit ::= 2 sixtyhours TimeUnit ::= 3 years TimeUnit ::= 4 ExplicitCertificate ImplicitCertificate timeunit TimeUnit, timevalue INTEGER ( ) versionandtype ExplicitCert, unsignedcertificate CHOICE { rootcert UnsignedRootCertificate, intermediatecert UnsignedIntermediateCertificate, signature Signature versionandtype unsignedcertificate reconstructionvalue RootCertificate ::= ExplicitCertificate ImplicitCert, UnsignedIntermediateCertificate, EccPublicKey IntermediateCertificate ::= CHOICE { explicitcertificate ExplicitCertificate, implicitcertificate ImplicitCertificate CertificateChain intermediatecerts rootcertificate SEQUENCE OF IntermediateCertificate, RootCertificate
21 21 TS V1.1.1 ( ) Certificate ::= CHOICE { ToBeSignedCertificate rootcertificate RootCertificate, intermediatecertificate IntermediateCertificate ::= CHOICE { unsignedintermediatecert IntermediateCertificate, unsignedrootcert RootCertificate UnsignedIntermediateCertificate subjecttype IntermediateCert, cf UseStartVal-AndOr-Lifetime, scope CHOICE { secdataexchcascope SecDataExchCaScope, anonymousscope AnonymousScope, identifiednotlocalizedscope IdentifiedNotLocalizedScope, identifiedscope IdentifiedScope, expiration ItsTime, lifetime CertificateDuration OPTIONAL, start-validity ItsTime OPTIONAL, crl-series CrlSeries, verification-key PublicKey OPTIONAL UnsignedRootCertificate subjecttype RootCa, cf UseStartVal-AndOr-Lifetime, scope RootCaScope, expiration ItsTime, lifetime CertificateDuration OPTIONAL, start-validity ItsTime OPTIONAL, crl-series CrlSeries, verification-key PublicKey RootCaScope name IA5String (SIZE (0..31)), permittedsubjecttypes SubjectTypeFlags, securedatapermissions PsidArray, region GeographicRegion SecDataExchCaScope eaid IA5String (SIZE (0..32)), -- name of EA permittedsubjecttypes SecDataExchCaTypes, permissions PsidArray, region GeographicRegion IdentifiedScope subject-name permissions region IdentifiedNotLocalizedScope subject-name permissions AnonymousScope additional-data permissions region OCTET STRING, PsidSspArray, GeographicRegion OCTET STRING, PsidSspArray OCTET STRING, PsidSspArray, GeographicRegion CertificateRequestErrorCode
22 22 TS V1.1.1 ( ) ::= ENUMERATED { verification-failure(0), csr-cert-expired(1), csr-cert-revoked(2), csr-cert-unauthorized(3), request-denied(4), csr-cert-unknown (5), canonical-identity-unknown (6) PsidArray type permissions-list SpecifiedArray, PsidList Psid ::= CHOICE { its-aid port ITS-AID, Port PsidList ::= SEQUENCE OF Psid ITS-AID ::= OCTET STRING (SIZE (1..4)) Port portindicator PortIndicator, portnumber PortNumber PortIndicatorType ::= OCTET STRING (SIZE (1)) portindicator PortIndicatorType ::= 'DF'H PortIndicator ::= PortIndicatorType (portindicator) PortNumber ::= OCTET STRING (SIZE (2)) PsidSspArray type permissions-list SpecifiedArray, PsidSspList PsidSsp its-aid ssp ITS-AID, SSP PsidSspList ::= SEQUENCE OF PsidSsp SSP ::= OCTET STRING ArrayType ::= Integer8 fromissuer ArrayType ::= 0 specified ArrayType ::= 1 unknowntype ArrayType ::= 2 SpecifiedArray ::= ArrayType (specified) Signature ::= EcdsaSignature EcdsaSignature r EccPublicKey, s CHOICE { ecdsa-nistp224-with-sha224-s Integer28, ecdsa-nistp256-with-sha256-s Integer32 EccPublicKey type EccPublicKeyType, x CHOICE { ecdsa-nistp224-with-sha224-x Integer28, ecdsa-nistp256-with-sha256-x Integer32, y CHOICE {
23 23 TS V1.1.1 ( ) ecdsa-nistp224-with-sha224-y Integer28, ecdsa-nistp256-with-sha256-y Integer32 OPTIONAL EccPublicKeyType ::= ENUMERATED { xcoordinateonly (0), compressedlsby0 (2), compressedlsby1 (3), uncompressed (4) XCoordinateOnly ::= EccPublicKeyType (xcoordinateonly) CompressedLsbY0 ::= EccPublicKeyType (compressedlsby0) CompressedLsbY1 ::= EccPublicKeyType (compressedlsby1) Uncompressed ::= EccPublicKeyType (uncompressed) SecDataExchCaCertSpecificData ::= SecDataExchCaScope SecDataExchAnonymousCertSpecificData ::= AnonymousScope SecDataExchIdentifiedNotLocalizedCertSpecificData ::= IdentifiedNotLocalizedScope SecDataExchIdentifiedLocalizedCertSpecificData ::= IdentifiedScope VersionAndType ::= Integer8 explicitcert VersionAndType ::= 2 implicitcert VersionAndType ::= 3 ExplicitCert ::= VersionAndType (explicitcert) ImplicitCert ::= VersionAndType (implicitcert) ImplicitOrExplicit ::= VersionAndType ( explicitcert implicitcert ) SubjectType ::= Integer8 secdataexchanonymoussubj SubjectType ::= 0 secdataexchidentifiednotlocalizedsubj SubjectType ::= 1 secdataexchidentifiedlocalizedsubj SubjectType ::= 2 secdataexchcsrsubj SubjectType ::= 3 wsasubj SubjectType ::= 4 wsacsrsubj SubjectType ::= 5 secdataexchcasubj SubjectType ::= 6 rootcasubj SubjectType ::= 255 SecDataExchCa ::= SubjectType (secdataexchcasubj) RootCa ::= SubjectType (rootcasubj) SecDataExchCsr ::= SubjectType (secdataexchcsrsubj) SecDataExchAnon ::= SubjectType (secdataexchanonymoussubj) SecDataExchIdNonLoc ::= SubjectType (secdataexchidentifiednotlocalizedsubj) SecDataExchIdLoc ::= SubjectType (secdataexchidentifiedlocalizedsubj) SecDataExchCaTypes ::= SubjectType (secdataexchanonymoussubj secdataexchidentifiedlocalizedsubj) IntermediateCert ::= SubjectType (ALL EXCEPT (rootcasubj)) SubjectTypeFlags ::= BIT STRING { CertificateContentFlags ::= BIT STRING { messageanonymous (0), messageidentifiednotlocalized (1), messageidentifiedlocalized (2), messagecsr (3), wsa (4), wsacsr (5), messageca (6), wsaca (7), crlsigner (8) usestartvalidity (0), lifetimeisduration (1), encryptionkey (2) UseStartValidity ::= CertificateContentFlags ({usestartvalidity) LifetimeIsDuration ::= CertificateContentFlags ({lifetimeisduration) UseStartVal-AndOr-Lifetime ::= CertificateContentFlags ({usestartvalidity (ALL EXCEPT {encryptionkey) ) GeographicRegion region-type circlular-region RegionType, CircularRegion OPTIONAL,
24 24 TS V1.1.1 ( ) rectangular-region polygonial-region other-region RectangularRegion OPTIONAL, PolygonialRegion OPTIONAL, OCTET STRING OPTIONAL RegionType ::= Integer8 from-issuer RegionType ::= 0 circle RegionType ::= 1 rectangle RegionType ::= 2 polygon RegionType ::= 3 none RegionType ::= 4 CircularRegion center radius RectangularRegion upper-left lower-right TwoDLocation, Integer16 TwoDLocation, TwoDLocation PolygonialRegion ::= SEQUENCE OF TwoDLocation TwoDLocation latitude longitude Sint32, Sint32 Crl ::= CHOICE { validcrl ValidCrl, nullcrl NullCrl ValidCrl version signercrl unsignedcrl signature Integer8, SignerIdentifier, ToBeSignedCrl, Signature ToBeSignedCrl ::= CHOICE { IdOnlyCrl IdAndExpiryCrl CrlType ::= ENUMERATED { idonlycrl IdOnlyCrl, idandexpirycrl IdAndExpiryCrl type IdOnly, crlseries CrlSeries, caid OCTET STRING (SIZE (8)), crlserial Integer8, startperiod ItsTime, issuedate ItsTime, nextcrl ItsTime, entries IdList type IdAndExpiry, crlseries CrlSeries, caid OCTET STRING (SIZE (8)), crlserial Integer8, startperiod ItsTime, issuedate ItsTime, nextcrl ItsTime, entries IdAndExpiryList idonly (0), idandexpiry (1)
25 25 TS V1.1.1 ( ) IdOnly ::= CrlType (idonly) IdAndExpiry ::= CrlType (idandexpiry) CrlSeries ::= Integer32 IdList ::= SEQUENCE OF CrlEntryId IdAndExpiryList crlid expiry CrlEntryId, ItsTime END CrlEntryId ::= OCTET STRING (SIZE (10)) NullCrl ::= NULL Integer3 ::= INTEGER (0..7) Integer8 ::= INTEGER (0..255) Integer16 ::= INTEGER ( ) Integer28 ::= INTEGER ( ) Integer32 ::= INTEGER ( ) Sint32 ::= INTEGER ( ) ItsTime ::= Integer32 --number of seconds since 00:00:00 UTC 1st January 2004
26 26 TS V1.1.1 ( ) Annex B (informative): Secret-key use cases and application categories Clause in TS [5] categorizes application communications patterns as: Broadcast; Groupcast; Unicast with local participants; Unicast with remote infrastructure entity; Unicast with remote infrastructure entity, communications session needed to persist across multiple contacts with infrastructure entity. With the exception of broadcast applications, all other controlled multicast and unicast communication may use symmetric key systems to provide trust management and enrolment and authorisation services similar to those of clause 5.2. In addition, detailed use case examples are presented annex C in TR [i.2]. The symmetric key systems can be used in all the use cases in clause C.3 and electronic payment use cases such as Electronic toll collect (clause C.2.9).
27 27 TS V1.1.1 ( ) Annex C (informative): Extensions to IEEE to support additional security functions C.1 Rationale In order to be able to offer ITS security standards which are truly global, the present document and its related specifications (TS [5], TS [4] and TS [9]) have been developed as profiles of IEEE [8]. However, there are some capabilities that are not included in IEEE [8] but could usefully be included in a future edition of C.2 Use of a cryptographic digest of the signer identifier If the requester of an enrolment certificate is already known to the certificate authority then the authority will be able to correctly interpret a signer identifier with a digest type. Consequently, it would be beneficial for IEEE [8] to allow the signer field to take the value certificate_digest_with_ecdsap224 or certificate_digest_with_ecdsap256 in a ToBeEncrypted message of type certificate_request. C.3 Encryption of the signer identifier in an authorization certificate request In order to support the presence of an encrypted signer identifier in an authorization certificate request, make the following changes: SignerIdentifierType ContentType SignerIdentifier ToBeEncrypted (see note) NOTE: Table C.1: Encryption of Signer Identifier in IEEE [8] Add new enumerated value, encrypted Add new enumerated value, certificate_request_signer Add a new SignerIdentifierType case, thus: case encrypted ToBeEncrypted encryptedsigner Add a new ContentType case, thus: case certificate_request_signer SignerIdentifier signer The SignerIdentifier within the ToBeEncrypted data type should not be of the type encrypted.
28 28 TS V1.1.1 ( ) C.4 Request and transmission of multiple authorization certificates In order to save processing and communications bandwidth, it would be useful to be able to request and receive multiple authorization certificates using a single request and a single response. This can be achieved with the following changes to the data types: Modify ToBeSignedCertificate such that more than one PublicKey can be included, as follows:... PublicKey... verification_key<var>; Move all elements except the Crl element from ToBeEncryptedCertificateResponse to a new type, CertificateResponse Add a new element to ToBeEncryptedCertificateReponse, as follows: ToBeEncryptedCertificateResponse { CertificateResponse certificate_info<var>; Crl crl_path<var>; ToBeEncryptedCertificateResponse
29 29 TS V1.1.1 ( ) Annex D (informative): Bibliography ISO/IEC : "Road vehicles -- Communication between vehicle and external equipment for emissions-related diagnostics -- Part 3: Diagnostic connector and related electrical circuits, specification and use".
30 30 TS V1.1.1 ( ) History Document history V1.1.1 June 2012 Publication
ETSI SR 003 091 V1.1.2 (2013-03)
SR 003 091 V1.1.2 (2013-03) Special Report Electronic Signatures and Infrastructures (ESI); Recommendations on Governance and Audit Regime for CAB Forum Extended Validation and Baseline Certificates 2
ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification
TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)
ETSI TS 182 024 V3.0.0 (2015-10)
TS 182 024 V3.0.0 (2015-10) TECHNICAL SPECIFICATION Network Technologies (NTECH); Hosted Enterprise Services; Architecture, functional description and signalling 2 TS 182 024 V3.0.0 (2015-10) Reference
ETSI TS 102 778-3 V1.1.2 (2009-12) Technical Specification
TS 102 778-3 V1.1.2 (2009-12) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 3: PAdES Enhanced - PAdES-BES and PAdES-EPES Profiles
ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification
TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security
ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification
TS 102 640-3 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management
ETSI TR 103 123 V1.1.1 (2012-11)
TR 103 123 V1.1.1 (2012-11) Technical Report Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on TS 102 042 for Issuing Publicly-Trusted TLS/SSL Certificates 2 TR 103 123
ETSI TR 183 070 V3.1.1 (2009-08) Technical Report
TR 183 070 V3.1.1 (2009-08) Technical Report Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Resource and Admission Control Sub-System (); Rr interface
ETSI TS 102 640-3 V2.1.2 (2011-09)
TS 102 640-3 V2.1.2 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management
Technical Specifications (GPGPU)
TS 131 116 V6.7.0 (2005-03) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Remote APDU Structure for (Universal) Subscriber
ETSI TS 102 723-10 V1.1.1 (2012-11)
TS 102 723-10 V1.1.1 (2012-11) Technical Specification Intelligent Transport Systems (ITS); OSI cross-layer topics; Part 10: Interface between access layer and networking & transport layer 2 TS 102 723-10
ETSI TS 102 640-4 V2.1.1 (2010-01) Technical Specification
TS 102 640-4 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM) Part 4: REM-MD Conformance Profiles 2 TS 102 640-4 V2.1.1 (2010-01)
ETSI TS 184 009 V2.0.0 (2008-06) Technical Specification
TS 184 009 V2.0.0 (2008-06) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Rules covering the use of TV URIs for the Identification
ETSI TS 102 639-5 V1.1.1 (2009-04) Technical Specification
TS 102 639-5 V1.1.1 (2009-04) Technical Specification Access and Terminals, Transmission and Multiplexing (ATTM); Third Generation Transmission Systems for Interactive Cable Television Services - IP Cable
ETSI TS 102 778-1 V1.1.1 (2009-07) Technical Specification
TS 102 778-1 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 1: PAdES Overview - a framework document for PAdES
ETSI TS 102 280 V1.1.1 (2004-03)
TS 102 280 V1.1.1 (2004-03) Technical Specification X.509 V.3 Certificate Profile for Certificates Issued to Natural Persons 2 TS 102 280 V1.1.1 (2004-03) Reference DTS/ESI-000018 Keywords electronic signature,
ETSI TS 102 640-5 V2.1.1 (2010-01) Technical Specification
TS 102 640-5 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 5: REM-MD Interoperability Profiles 2 TS 102 640-5 V2.1.1 (2010-01)
TECHNICAL REPORT End to End Network Architectures (E2NA); Location of Transcoders for voice and video communications
TR 103 279 V1.1.1 (2014-08) TECHNICAL REPORT End to End Network Architectures (E2NA); Location of Transcoders for voice and video communications 2 TR 103 279 V1.1.1 (2014-08) Reference DTR/E2NA-00006-Loc-Transcoders
ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification
TS 129 119 V9.0.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) (3GPP TS 29.119
ETSI TS 132 454 V10.0.0 (2011-04) Technical Specification
TS 132 454 V10.0.0 (2011-04) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Telecommunication management; Key Performance Indicators (KPI) for the IP Multimedia Subsystem
ETSI TS 184 011 V3.1.1 (2011-02) Technical Specification
TS 184 011 V3.1.1 (2011-02) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Requirements and usage of E.164 numbers in NGN and
ETSI TS 124 423 V8.4.0 (2012-01)
TS 124 423 V8.4.0 (2012-01) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; TISPAN; PSTN/ISDN simulation services;
ETSI TS 131 221 V9.0.0 (2010-02) Technical Specification
TS 131 221 V9.0.0 (2010-02) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Contact Manager Application Programming Interface (API); Contact Manager API for Java Card (3GPP
ETSI TS 101 735 V1.1.1 (2000-07)
TS 101 735 V1.1.1 (2000-07) Technical Specification Digital Audio Broadcasting (DAB); Internet Protocol (IP) datagram tunnelling European Broadcasting Union Union Européenne de Radio-Télévision EBU UER
ETSI GS NFV 003 V1.1.1 (2013-10)
GS NFV 003 V1.1.1 (2013-10) Group Specification Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV Disclaimer This document has been produced and approved by the Network Functions
ETSI TR 102 678 V1.2.1 (2011-05) Technical Report
TR 102 678 V1.2.1 (2011-05) Technical Report Speech and multimedia Transmission Quality (STQ); QoS Parameter Measurements based on fixed Data Transfer Times 2 TR 102 678 V1.2.1 (2011-05) Reference RTR/STQ-00184m
ETSI TR 102 071 V1.2.1 (2002-10)
TR 102 071 V1.2.1 (2002-10) Technical Report Mobile Commerce (M-COMM); Requirements for Payment Methods for Mobile Commerce 2 TR 102 071 V1.2.1 (2002-10) Reference RTR/M-COMM-007 Keywords commerce, mobile,
Technical Specification Electronic Signatures and Infrastructures (ESI); ASiC Baseline Profile
TS 103 174 V2.2.1 (2013-06) Technical Specification Electronic Signatures and Infrastructures (ESI); ASiC Baseline Profile 2 TS 103 174 V2.2.1 (2013-06) Reference RTS/ESI-0003174v221 Keywords ASiC, electronic
How To Understand And Understand The Certificate Authority (Ca)
TS 102 042 V1.1.1 (2002-04) Technical Specification Policy requirements for certification authorities issuing public key certificates 2 TS 102 042 V1.1.1 (2002-04) Reference DTS/SEC-004006 Keywords e-commerce,
ETSI TR 133 919 V6.1.0 (2004-12)
TR 133 919 V6.1.0 (2004-12) Technical Report Universal Mobile Telecommunications System (UMTS); Generic Authentication Architecture (GAA); System description (3GPP TR 33.919 version 6.1.0 Release 6) 1
ETSI TS 124 238 V8.2.0 (2010-01) Technical Specification
TS 124 238 V8.2.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; Session Initiation Protocol (SIP) based user configuration; Stage 3 (3GPP TS 24.238 version 8.2.0
ETSI TS 102 176-2 V1.2.1 (2005-07)
TS 102 176-2 V1.2.1 (2005-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Algorithms and Parameters for Secure Electronic Signatures; Part 2: Secure channel protocols and algorithms
ETSI TS 102 588 V7.1.0 (2007-07) Technical Specification
TS 102 588 V7.1.0 (2007-07) Technical Specification Smart Cards; Application invocation Application Programming Interface (API) by a UICC webserver for Java Card platform; (Release 7) 2 TS 102 588 V7.1.0
ETSI TS 182 023 V2.1.1 (2009-01) Technical Specification
TS 182 023 V2.1.1 (2009-01) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Core and enterprise NGN interaction scenarios; Architecture
ETSI EN 301 002-1 V1.3.1 (2001-06)
EN 301 002-1 V1.3.1 (2001-06) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Security tools (SET) procedures; Digital Subscriber Signalling System No. one (DSS1)
DraftETSI EN 301 691 V1.1.1 (2000-03)
Draft EN 301 691 V1.1.1 (2000-03) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Remote Control (RC) service; Service description 2 Draft EN 301 691 V1.1.1 (2000-03)
ETSI TS 101 456 V1.4.3 (2007-05)
TS 101 456 V1.4.3 (2007-05) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing qualified certificates 2 TS 101 456 V1.4.3
ETSI TS 124 147 V6.8.0 (2008-04) Technical Specification
TS 124 147 V6.8.0 (2008-04) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Conferencing using the IP Multimedia (IM) Core
Draft ETSI EN 319 401 V1.1.1 (2012-03)
Draft EN 319 401 V1.1.1 (2012-03) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 Draft EN
ETSI TS 124 088 V5.0.0 (2002-06)
TS 124 088 V5.0.0 (2002-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); Call Barring (CB) Supplementary Service; Stage
ETSI TS 101 329-2 V1.1.1 (2000-07)
TS 101 329-2 V1.1.1 (2000-07) Technical Specification Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); End to End Quality of Service in TIPHON Systems; Part 2: Definition
www.its.dot.gov/index.htm Draft Report April 13, 2012 publication number
Security Credential Management System Design Security system design for cooperative vehicleto-vehicle crash avoidance applications using 5.9 GHz Dedicated Short Range Communications (DSRC) wireless communications
ETSI EN 319 401 V1.1.1 (2013-01)
EN 319 401 V1.1.1 (2013-01) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 EN 319 401 V1.1.1
Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS 36.314 version 11.1.
TS 136 314 V11.1.0 (2013-02) Technical Specification LTE; Evolved Universal Terrestrial Radio Access (E-UTRA); Layer 2 - Measurements (3GPP TS 36.314 version 11.1.0 Release 11) 1 TS 136 314 V11.1.0 (2013-02)
ETSI TR 101 480 V1.1.2 (1999-12)
TR 101 480 V1.1.2 (1999-12) Technical Report Integrated Services Digital Network (ISDN); Public Switched Telephone Network (PSTN); Framework for the provision of calling party name information 2 TR 101
ETSI TS 119 403 V2.1.1 (2014-11)
TS 119 403 V2.1.1 (2014-11) TECHNICAL SPECIFICATION Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing
ETSI TR 102 893 V1.1.1 (2010-03) Technical Report. Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA)
TR 102 893 V1.1.1 (2010-03) Technical Report Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA) 2 TR 102 893 V1.1.1 (2010-03) Reference DTR/ITS-0050005 Keywords
ETSI ES 201 915-12 V1.3.1 (2002-10)
ES 201 915-12 V1.3.1 (2002-10) Standard Open Service Access (OSA); Application Programming Interface (API); Part 12: Charging SCF 2 ES 201 915-12 V1.3.1 (2002-10) Reference RES/SPAN-120094-12 Keywords
ETSI TR 101 303 V1.1.2 (2001-12)
TR 101 303 V1.1.2 (2001-12) Technical Report Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 3; Requirements definition study; Introduction to service and network
ETSI TR 101 643 V8.0.0 (2000-06)
TR 101 643 V8.0.0 (2000-06) Technical Report Digital cellular telecommunications system (Phase 2+); General network interworking scenarios (GSM 09.01 version 8.0.0 Release 1999) GLOBAL SYSTEM FOR MOBILE
ETSI TS 102 042 V2.4.1 (2013-02)
TS 102 042 V2.4.1 (2013-02) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates 2 TS 102 042 V2.4.1
Final draft ETSI EN 300 440-2 V1.3.1 (2008-11)
Final draft EN 300 440-2 V1.3.1 (2008-11) Harmonized European Standard (Telecommunications series) Electromagnetic compatibility and Radio spectrum Matters (ERM); Short range devices; Radio equipment to
ETSI TS 101 903 V1.4.2 (2010-12) Technical Specification. Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES)
TS 101 903 V1.4.2 (2010-12) Technical Specification Electronic Signatures and Infrastructures (ESI); XML Advanced Electronic Signatures (XAdES) 2 TS 101 903 V1.4.2 (2010-12) Reference RTS/ESI-000112 Keywords
ETSI EN 300 328-2 V1.1.1 (2000-07)
EN 300 328-2 V1.1.1 (2000-07) Candidate Harmonized European Standard (Telecommunications series) Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband Transmission systems; data transmission
TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1)
TR 118 525 V1.0.0 (2016-03) TECHNICAL REPORT onem2m; Application Developer Guide (onem2m TR-0025 version 1.0.0 Release 1) 2 TR 118 525 V1.0.0 (2016-03) Reference DTR/oneM2M-000025 Keywords application,
ETSI EN 319 403 V2.2.2 (2015-08)
EN 319 403 V2.2.2 (2015-08) EUROPEAN STANDARD Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing Trust
How To Understand Gsm (Gsm) And Gsm.Org (Gms)
TSG-SA Working Group 1 (Services) meeting #2 Edinburgh, Scotland 9 th -12 th March 1999 TSGS1#2(99)116 Agenda Item: 9.4 Source: Coordinator Title: Document for: Information I Universal Mobile Telecommunications
ETSI TS 131 220 V13.0.0 (2016
TS 131 220 V13.0.0 (2016 16-02) TECHNICAL SPECIFICATIONION Universal Mobile Telecommunications System (UMTS); LTE; Characteristics of the Contact Manager for 3GPP UICC applications (3GPP TS 31.220 version
Final draft ETSI ES 202 913 V1.2.1 (2004-05)
Final draft ES 202 913 V1.2.1 (2004-05) Standard Access and Terminals (AT); POTS requirements applicable to ADSL modems when connected to an analogue presented PSTN line 2 Final draft ES 202 913 V1.2.1
ETSI TS 102 124 V6.1.0 (2004-12)
TS 102 124 V6.1.0 (2004-12) Technical Specification Smart Cards; Transport rotocol for ICC based Applications; Stage 1 (Release 6) 2 TS 102 124 V6.1.0 (2004-12) Reference RTS/SC-R0008r1 Keywords protocol,
Technical Report Electronic Signatures and Infrastructures (ESI); Data Preservation Systems Security; Part 2: Guidelines for Assessors
TR 101 533-2 V1.2.1 (2011-12) Technical Report Electronic Signatures and Infrastructures (ESI); Data Preservation Systems Security; Part 2: Guidelines for Assessors 2 TR 101 533-2 V1.2.1 (2011-12) Reference
ETSI EN 300 440-2 V1.4.1 (2010-08) Harmonized European Standard (Telecommunications series)
EN 300 440-2 V1.4.1 (2010-08) Harmonized European Standard (Telecommunications series) Electromagnetic compatibility and Radio spectrum Matters (ERM); Short range devices; Radio equipment to be used in
ETSI EN 300 356-7 V4.1.2 (2001-07)
EN 300 356-7 V4.1.2 (2001-07) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Signalling System No.7 (SS7); ISDN User Part (ISUP) version 4 for the international
ETSI EN 319 412-2 V2.1.1 (2016-02)
EN 319 412-2 V2.1.1 (2016-02) EUROPEAN STANDARD Electronic Signatures and Infrastructures (ESI); Certificate Profiles; Part 2: Certificate profile for certificates issued to natural persons 2 EN 319 412-2
ETSI TS 102 778-5 V1.1.1 (2009-07) Technical Specification
TS 102 778-5 V1.1.1 (2009-07) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; Part 5: PAdES for XML Content - Profiles for XAdES signatures
ETSI ES 203 069 V1.2.1 (2011-09)
ES 203 069 V1.2.1 (2011-09) Standard Access, Terminals, Transmission and Multiplexing (ATTM); Remote management of CPE over broadband networks; CPE WAN Management Protocol (CWMP) 2 ES 203 069 V1.2.1 (2011-09)
Draft EN 301 068-1 V1.1.1 (1997-12)
European Standard (Telecommunications series) Broadband Integrated Services Digital Network (B-ISDN); Digital Subscriber Signalling System No. two (DSS2) protocol; Connection characteristics; ATM transfer
ETSI TS 101 903 V1.3.2 (2006-03)
TS 101 903 V1.3.2 (2006-03) Technical Specification XML Advanced Electronic Signatures (XAdES) 2 TS 101 903 V1.3.2 (2006-03) Reference RTS/ESI-000034 Keywords e-commerce, electronic signature, security
ETSI TR 101 891 V1.1.1 (2001-02)
TR 101 891 V1.1.1 (2001-02) Technical Report Digital Video Broadcasting (DVB); Professional Interfaces: Guidelines for the implementation and usage of the DVB Asynchronous Serial Interface (ASI) European
ETSI TS 124 303 V8.9.0 (2012-07)
TS 124 303 V8.9.0 (2012-07) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Mobility management based on Dual-Stack
ETSI TS 102 484 V8.1.0 (2010-10) Technical Specification. Smart Cards; Secure channel between a UICC and an end-point terminal (Release 8)
TS 102 484 V8.1.0 (2010-10) Technical Specification Smart Cards; Secure channel between a UICC and an end-point terminal (Release 8) 2 TS 102 484 V8.1.0 (2010-10) Reference RTS/SCP-T0312v810 Keywords security,
Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture
IEEE GLOBECOM Design and Developers Forum Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture Tim Weil CISSP, CISA Booz Allen Hamilton
ETSI EN 302 774 V1.2.1 (2012-02)
EN 302 774 V1.2.1 (2012-02) Harmonized European Standard Broadband Wireless Access Systems (BWA) in the 3 400 MHz to 3 800 MHz frequency band; Base Stations; Harmonized EN covering the essential requirements
ETSI TS 102 164 V1.3.1 (2006-09)
TS 102 164 V1.3.1 (2006-09) Technical Specification Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Emergency Location Protocols [OMA-TS-MLP-V3_2-20051124-C]
ETSI TS 123 251 V6.5.0 (2005-09)
TS 123 251 V6.5.0 (2005-09) Technical Specification Universal Mobile Telecommunications System (UMTS); Network sharing; Architecture and functional description (3GPP TS 23.251 version 6.5.0 Release 6)
ETSI TS 102 573 V1.1.1 (2007-07)
TS 102 573 V1.1.1 (2007-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for trust service providers signing and/or storing data for digital accounting 2
ETSI EN 302 208-2 V2.1.1 (2015-02)
EN 302 208-2 V2.1.1 (2015-02) HARMONIZED EUROPEAN STANDARD Electromagnetic compatibility and Radio spectrum Matters (ERM); Radio Frequency Identification Equipment operating in the band 865 MHz to 868
Final draft ETSI EN 302 109 V1.1.1 (2003-06)
Final draft EN 302 109 V1.1.1 (2003-06) European Standard (Telecommunications series) Terrestrial Trunked Radio (TETRA); Security; Synchronization mechanism for end-to-end encryption 2 Final draft EN 302
Digital Telephone Network - A Practical Definition
TR 101 633 V7.0.0 (1999-08) Technical Report Digital cellular telecommunications system (Phase 2+); Support of Videotex (GSM 03.43 version 7.0.0 Release 1998) GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS R
ETSI TS 101 903 V1.1.1 (2002-02)
TS 101 903 V1.1.1 (2002-02) Technical Specification XML Advanced Electronic Signatures (XAdES) 2 TS 101 903 V1.1.1 (2002-02) Reference DTS/SEC-004008 Keywords electronic signature, security 650 Route des
3GPP TS 32.372 V8.0.0 (2008-12)
TS 32.372 V8.0.0 (2008-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Security services for Integration
Draft EN 300 426 V1.2.1 (1998-10)
European Standard (Telecommunications series) Private Integrated Services Network (PISN); Inter-exchange signalling protocol; Call intrusion supplementary service [ISO/IEC 14846 (1996), modified] 2 Reference
Quality of Service and Network Performance (UMTS 22.25 version 3.1.0)
TSG-SA Working Group 1 (Services) meeting #2 Edinburgh, Scotland 9 th -12 th March 1999 TSGS1#2(99)118 Agenda Item: 9.6 Source: Coordinator Title: Document for: Information I Quality of Service and Network
ETSI EN 301 489-17 V2.1.1 (2009-05) Harmonized European Standard (Telecommunications series)
EN 301 489-17 V2.1.1 (2009-05) Harmonized European Standard (Telecommunications series) Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for
Universal Mobile Telecommunications System (UMTS); Service aspects; Virtual Home Environment (VHE) (UMTS 22.70 version 3.0.0)
TSG-SA Working Group 1 (Services) meeting #2 Edinburgh, Scotland 9 th -12 th March 1999 TSGS1#2(99)120 Agenda Item: 9.8 Source: Coordinator Title: Document for: Information I Universal Mobile Telecommunications
Draft EN 300 362 V1.2.1 (1998-10)
European Standard (Telecommunications series) Private Integrated Services Network (PISN); Inter-exchange signalling protocol; Call offer supplementary service [ISO/IEC 14843 (1996), modified] 2 Reference
ETSI TS 101 231 V1.3.1 (2002-12)
TS 101 231 V1.3.1 (2002-12) Technical Specification Television systems; Register of Country and Network Identification (CNI), Video Programming System (VPS) codes and Application codes for Teletext based
ETSI TS 102 226 V9.2.0 (2010-04) Technical Specification. Smart Cards; Remote APDU structure for UICC based applications (Release 9)
TS 102 226 V9.2.0 (2010-04) Technical Specification Smart Cards; Remote APDU structure for UICC based applications (Release 9) 2 TS 102 226 V9.2.0 (2010-04) Reference RTS/SCP-T02850v920 Keywords protocol,
DraftETSI EG 201 510 V1.1.2 (2000-02)
Draft EG 201 510 V1.1.2 (2000-02) Guide Intelligent Network (IN); Security aspects of Switching Control Function (SCF) - Service Switching Function (SSF) interconnection between networks; Part 1: Capability
ETSI TS 103 176 V1.1.1 (2012-08)
TS 103 176 V1.1.1 (2012-08) Technical Specification Digital Audio Broadcasting (DAB); Rules of implementation; Service information features European Broadcasting Union Union Européenne de Radio-Télévision
3GPP TS 32.593 V9.0.0 (2009-12)
TS 32.593 V9.0.0 (2009-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Telecommunication management; Home enode B (HeNB) Operations,
ETSI TS 102 637-3 V1.1.1 (2010-09) Technical Specification
TS 102 637-3 V1.1.1 (2010-09) Technical Specification Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Part 3: Specifications of Decentralized Environmental Notification
