WWW.SA.I-PDF.INFO
FREE ELECTRONIC LIBRARY - Abstracts, books, theses
 
<< HOME
CONTACTS



Pages:   || 2 |

«ETSI TR 102 021-7 V1.3.1 (2010-12) Technical Report Terrestrial Trunked Radio (TETRA); User Requirement Specification TETRA Release 2.1; Part 7: Security ...»

-- [ Page 1 ] --

ETSI TR 102 021-7 V1.3.1 (2010-12)

Technical Report

Terrestrial Trunked Radio (TETRA);

User Requirement Specification TETRA Release 2.1;

Part 7: Security

2 ETSI TR 102 021-7 V1.3.1 (2010-12)

Reference

RTR/TETRA-01196

Keywords

security, TETRA, user

ETSI

650 Route des Lucioles

F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C

Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice

Individual copies of the present document can be downloaded from:

http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF).

In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat.

Users of the present document should be aware that the document may be subject to revision or change of status.

Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp

If you find errors in the present document, please send your comment to one of the following services:

http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.

The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2010.

All rights reserved.

TM TM TM TM

–  –  –

Contents Intellectual Property Rights

Foreword

Introduction

1 Scope

2 References

2.1 Normative references

2.2 Informative references

3 Definitions and abbreviations

3.1 Definitions

3.2 Abbreviations

4 User Requirement Specification

4.1 User Requirements from questionnaire

4.2 User Requirements derived from work on TETRA Release 1

4.3 Core requirements

4.4 Work required

4.5 Testing requirements

4.6 Timescales

History

ETSI 4 ETSI TR 102 021-7 V1.3.1 (2010-12) Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http://webapp.etsi.org/IPR/home.asp).

Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document.

Foreword This Technical Report (TR) has been produced by ETSI Technical Committee Terrestrial Trunked Radio (TETRA).

The present document is part 7 of a multi-part deliverable covering the User Requirement Specifications (URSs) for

TETRA Release 2 and Release 2.1, as identified below:

Part 1: "General overview" (Release 2.1);

Part 2: "High Speed Data" (Release 2.1);

Part 3: "Codec" (Release 2);

Part 4: "Air Interface Enhancements" (Release 2.1);

Part 5: "Interworking and Roaming" (Release 2.1);

Part 6: "Subscriber Identity Module (SIM)" (Release 2.1);

Part 7: "Security" (Release 2.1);

Part 8: "Air - Ground - Air services" (Release 2);

Part 9 "Peripheral Equipment Interface" (Release 2.1);

Part 10: "Local Mode Broadband" (Release 2.1);

Part 11: "Over The Air Management" (Release 2.1);

Part 12: "Direct Mode Operation" (Release 2.1).

Introduction The Terms of Reference for TC TETRA approved at ETSI Board meeting #69, November 2008 are to produce ETSI

deliverables (and maintenance thereafter) in accordance with the following requirements:

• The provision of user driven services, facilities and functionality as required by traditional Professional Mobile Radio (PMR) user organizations such as the Emergency Services, Government, Military, Transportation, Utility and Industrial organizations as well as Public Access Mobile Radio (PAMR) Operators.

• The evolution and enhancement of TETRA as required by the market with the provision of new services, facilities and functionality made possible by new technology innovations and standards.

• Further enhancements of the TETRA standard in order to provide increased benefits and optimization in terms of spectrum efficiency, network capacity, system performance, quality of service, security and other relevant parameters.

–  –  –

• The backward compatibility and integration of the new services, facilities and functionality with existing TETRA standards in order to future-proof the existing and future investments of TETRA users.





Technical Objective TETRA is one of a number of digital wireless communication technologies standardized by ETSI.

ETSI TC TETRA produces standards and/or adapts existing standards for efficient digital PMR and PAMR voice and data services, including broadband evolution.

The present document provides the User Requirement Specifications for Security.

The URS is required by TC TETRA to guide the enhancement of the current TETRA standard, mainly the evolution of the HSD standard part towards broadband.

–  –  –

1 Scope The present document contains the User Requirements Specifications (URS) which are described in non-technical terms.

Although high level requirements are proposed by the present document, it is considered restrictive to mandate particular security implementations at this point, until a revised threat analysis has been undertaken.

The present document is applicable to the specification of TETRA Release 2.1 equipment.

2 References

References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the reference document (including any amendments) applies.

Referenced documents which are not found to be publicly available in the expected location might be found at http://docbox.etsi.org/Reference.

NOTE: While any hyperlinks included in this clause were valid at the time of publication ETSI cannot guarantee their long term validity.

2.1 Normative references The following referenced documents are necessary for the application of the present document.

Not applicable.

2.2 Informative references The following referenced documents are not necessary for the application of the present document but they assist the user with regard to a particular subject area.

–  –  –

3.1 Definitions

For the purposes of the present document, the following terms and definitions apply:

TETRA Release 2: Work Programme with new terms of reference within ETSI Project TETRA to enhance the services and facilities of TETRA in order to meet new user requirements, utilize new technology and increase the longevity of TETRA within the traditional market domains of PMR and PAMR TETRA Release 2.1: Work Programme within TC TETRA to enhance the services and facilities of TETRA in order to meet new user requirements, utilize new technology and increase the longevity of TETRA within the traditional market domains of PMR and PAMR

–  –  –

4.1 User Requirements from questionnaire Due to the specialist nature of security requirements and also due in some part to the sensitivity of users to discuss in open forum threats to any current standard, it was not considered appropriate to collect security requirements as part of the wider TETRA Release 2 user questionnaire sent out in 2001.

4.2 User Requirements derived from work on TETRA Release 1 TETRA Release 1, TETRA Release 2, and TETRA Release 2.1 should be maintained at an equal level of security. If further enhancements to the security of TETRA Release 2.1 are required, they should be applicable to all TETRA Releases up to Release 2.1. This is considered fundamental to Public Safety users as current and future systems are required to be implemented such that security accreditation can be achieved. This also applies to possible "stand-alone" developments such as HSD through direct access TEDS. High speed data solutions including evolution towards broadband require further consideration of security aspects.

It should be noted that security requirements apply to the standard as a whole, and individual requirements may not need satisfying with explicit security requirements, e.g. integrity can be checked with non-cryptographic integrity checking error correction schemes when used in conjunction with encryption schemes which may in themselves not provide integrity checks.

NOTE: TETRA is not required to support security protocols derived from other domains (e.g. GSM).

4.3 Core requirements Although system requirements should be derived from the new threat analysis, it is considered probable that as a

minimum the following core requirements will need to be supported by TETRA Release 2.1:

1) The TETRA Release 2.1 security standard should be able to provide authentication of the terminal and the infrastructure or the Smart Card and the infrastructure and should use, as far as possible, the mechanisms used in TETRA Release 1. In addition the standard should provide for authentication of the end user using, as far as possible, mechanisms provided in TETRA Release 1.

NOTE 1: An application level user authentication method is outside the scope of the air interface security standards.

2) The TETRA Release 2.1 security standard should be able to provide confidentiality protection for user plane information over the air interface.

–  –  –

3) The TETRA Release 2.1 security standard should be able to provide confidentiality and integrity protection of control plane information over the air interface. The integrity mechanism should not use strong cryptographic methods but should rely upon the mechanisms inherent in the use of a stream cipher and non-cryptographic checksums (e.g. LLC and L2-CRC) as per TETRA Release 1.

4) The TETRA Release 2.1 security standard should be able to provide confidentiality and integrity protection of all over-the-air management messages over the air interface.

5) The TETRA Release 2.1 security standard should be able to provide replay protection for both user plane and control plane information over the air interface for a sufficient period to meet international Public Safety and commercial markets. The keystream repeat length of the algorithms should remain unchanged at 23 days (approx) to avoid needing different key management principles for TETRA Release 2.1. Any change to the timeslot frequency, or to the use of fixed timeslots, may require fundamental redesign to the TEAx series of algorithms. Therefore in order to maintain the use of the TEAx series with as much backward compatibility as possible the same timeslot frequency should be maintained.

6) The structure of TETRA Release 2.1 keys should be identical to TETRA Release 1 keys. (By "structure" we mean the length of the key, the length of the key number (e.g. GCK-N) and the length of the key version number (e.g. GCK-VN).) TETRA Release 2.1 should use the same encryption algorithms as TETRA Release 1.

7) The authentication and OTAR mechanisms used in TETRA Release 2.1 should be the same as the TETRA Release 1 authentication and OTAR mechanisms. Where TEDS carriers are a part of a TETRA Release 1 network, registration and authentication will be based on an ITSI/K pair which are known on the Release 1 network, and authentication will take place according to TETRA Release 1 standards on the TETRA Release 1 network before TEDS services can be used. In networks where HSD carriers are not part of a TETRA Release 1 network, registration and authentication should be based on a similar ITSI/K pair known to the TETRA Release 2.1 network using same or similar authentication mechanisms as in TETRA Release 1 network.

NOTE 2: The authentication and OTAR protocols will operate on both TETRA Release 1 and TETRA Release 2.1 carriers.

8) The remote enable and disable functions of TETRA Release 1 should apply to TETRA Release 2.1 systems and mobile stations.

9) Where TETRA Release 2.1 systems and mobile stations support TETRA Release 1 circuit-mode calls, it should be possible to provide additional protection for user plane information by means of end-to-end encryption according to ES 202 109 [i.1]. If circuit-mode calls are to be supported in TETRA Release 2.1, it should be possible to provide them with end-to-end encryption according to ES 202 109 [i.1]. If a TETRA Release 2.1 codec is required to operate in a TETRA Release 1 air interface environment, then either the bit rate should be less than the TETRA Release 1 codec air interface and bits allocated for end to end encryption synchronization, or frame stealing should be supported to allow the TETRA Release 1 encryption synchronization mechanisms to be maintained. Where frame stealing is the supported synchronization method the codec should be able to sustain a frame stealing rate compatible with TETRA Release 1 standards requiring a stealing rate of between 1 and 4 stolen frames per second.

10) The system should be able to support a mechanism whereby information held on a removable personalization module (e.g. Smart Card) is protected from unauthorized access. A Smart Card may contain the ITSI/K pair and the authentication algorithms.

11) Any requirement to personalize the TETRA SIM or Smart Card over the air, or to use the SIM or the Smart Card for other security critical applications (e.g. financial transactions) will require an extra application level of security applied in addition to the air interface and the SIM/Smard Card-ME encryption. This is outside the scope of the TETRA standards.

12) The TETRA Release 2.1 security standard should be able to provide end-to-end confidentiality protection of Short Data Services concurrently with TEDS.

13) Any terminal should be authenticated with security parameters established before location services are made operational.

–  –  –

14) All TETRA Release 2.1 elements should be designed with the export license limitations in mind to avoid intentional or unintentional breaking of these rules, e.g. by plugging in an end-to-end encrypting Smart Card into a terminal that is not allowed to work with one.

15) In cases where the authentication function of an ITSI and the related end-to-end encryption OTAK functionality exist in separate but connected physical elements, e.g. some Smart Card implementations, the connecting interface should support (mutual) authentication.

It should be recognized that these requirements may exceed those needed by some commercial operators. In these cases it may be appropriate to allow implementations that provide a lower level of protection as with the different classes that are supported within TETRA Release 1.

4.4 Work required It is considered appropriate that a revised threat analysis is produced to encompass any new services and facilities that become available through TETRA Release 2.1. WG6 should also work with other WGs to ensure that the security requirements are passed through to any new standards that are produced.

4.5 Testing requirements The new security requirements should be traceable to a new threat analysis.



Pages:   || 2 |


Similar works:

«Department of Computer science and Electronics Mälardalen International Master Academy (MIMA) Master Thesis, D-Level Examiner: Peter Funk, peter.funk@mdh.se Supervisor: Mobyen Uddin Ahmed, mobyen.ahmed@mdh.se Textual CBR system using domain specific ontology Author YuLei Xu 810323-3816 yxu05002@student.mdh.se I Abstract Knowledge/Experience sharing and reusing are becoming more and more important due to lots of information and technical knowledge that we used nowadays. Case Base Reasoning...»

«Understanding Human Rights and Climate Change1 Table of Contents Key Messages on Human Rights and Climate Change Part I. Human Rights and Climate Change Why integrate human rights in climate change-related actions? What human rights principles apply in the context of climate change? How can human rights be integrated in climate-change related actions? What actions have been taken by international human rights mechanisms so far? What steps should be taken going forward? Part II: Which human...»

«Lab #2: The Need for Sterile Technique Summary: As a follow up to the lab in which students learn sterile technique, this lab allows students to actually use their Petri dishes in an actual experiment while reinforcing the concepts introduced in the previous lab. Grade Levels: 9-12 Prior Knowledge: Students should be familiar with sterile technique as described in the previous lab. Also, students should know how to develop a hypothesis and explain why they have made the hypothesis they made....»

«COMPARING TECHNIQUES FOR TETRAHEDRAL MESH GENERATION M. A. S. Lizier Instituto de Ciˆ ncias Matem´ ticas e de Computacao Universidade de S˜ o Paulo, Brazil e a ¸˜ a lizier@icmc.usp.br J. F. Shepherd Sandia National Laboratories Albuquerque, NM USA jfsheph@sandia.gov L. G. Nonato Instituto de Ciˆ ncias Matem´ ticas e de Computacao Universidade de S˜ o Paulo, Brazil e a ¸˜ a gnonato@icmc.usp.br J. L. D. Comba Instituto de Inform´ tica Universidade Federal do Rio Grande do Sul, Brazil a...»

«Ewa Szmidt Instytut Transportu Samochodowego MECHANIZM DZIAŁANIA PLATYNOWCÓW ORAZ WĘGLIKÓW NIEKTÓRYCH METALI JAKO MODYFIKATORÓW CHEMICZNYCH W ATOMOWEJ SPEKTROMETRII ABSORPCYJNEJ W artykule przedstawiono cechy i mechanizmy działania modyfikatorów matrycy zawierających metale z grupy platynowców (PGM) oraz węgliki metali trudnotopliwych, w analizach techniką ASA. Modyfikatory mogą być stosowane jako permanentne lub jednorazowe, w kolejnych rozdziałach przedstawiono różnice...»

«A New Capital Regulation For Large Financial Institutions* Oliver Hart Harvard University & NBER and Luigi Zingales* University of Chicago, NBER & CEPR April 2009 [revised September 2009] Abstract We design a new, implementable capital requirement for large financial institutions (LFIs) that are too big to fail. Our mechanism mimics the operation of margin accounts. To ensure that LFIs do not default on either their deposits or their derivative contracts, we require that they maintain an equity...»

«Textual Event Detection using Fuzzy Fingerprints Luís Marujo1,2, Joao Paulo Carvalho1, Anatole Gershman2 Jaime Carbonell2, João P. Neto1, David Martins de Matos1 1 INESC-ID, IST – Universidade de Lisboa, Languages Tecnologies Institute, Carnegie Mellon University lmarujo@cs.cmu.edu, joao.carvalho@inesc-id.pt, anatoleg@cs.cmu.edu jgc@cs.cmu.edu, joao.neto@inesc-id.pt, david.matos@inesc-id.pt Abstract. In this paper we present a method to improve the automatic detection of events in short...»

«Assessing Personal and Social Development Assessing Personal and Social Development: Measuring the Unmeasurable? Edited by Sally Inman, Martin Buck and Helena Burke UK Falmer Press, 1 Gunpowder Square, London, EC4A 3DE USA Falmer Press, Taylor & Francis Inc., 1900 Frost Road, Suite 101, Bristol, PA 19007 © S.Inman, M.Buck and H.Burke 1998 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic,...»

«Strengthening community capacity to undertake conservation work Sharing conservation skills and knowledge Science for conServation 287 Strengthening community capacity to undertake conservation work Sharing conservation skills and knowledge Anna Johnson and Mariska Wouters Science for conServation 287 Published by Science & Technical Publishing Department of Conservation PO Box 10420, The Terrace Wellington 6143, New Zealand Cover: DOC ranger with Te Hapua School pupils. Photo: Carolyn Smith....»

«The Local Brew Myles Chilton paperbytes Other titles in this series Louis Fréchette. On the Threshold (tr. Bernard Kelly) Cary Fagan. What I Learned in Florida A. Colin Wright. The Comedy of Doctor Foster Michael Bryson. Light and Silver Bill MacDonald. A Summer at La Rochelle Forthcoming: Tobias Chapman. Plymouth Mary Frances Coady. Exile Dave Hazzan. The Rise and Fall of Dennis Mitchell Ellen Jaffe. The Accident Lisa Lebedovich. Stories from a Photograph Catharine Leggett. The 401 Robert...»

«Technical Standards The Library of Congress Technical Standards for Digital Conversion Of Text and Graphic Materials 1 Introduction For the general public, the Congress has endorsed the creation of a National Digital Library through a private-public partnership that will create high-quality content in electronic form and thereby provide remote access to the most interesting and educationally valuable core of the Library's Americana collections. Schools, libraries, and homes will have access to...»

«FACTORY ACCEPTANCE TESTING INTRODUCTION FAT refers to a Factory Acceptance Test. This is a way to ensure that equipment/systems being purchased meet the agreed upon design specifications. Ideally this happens before arriving at the customer’s plant, however, for complex systems with high integration, tests may need to be performed at the customer’s location. Factory Acceptance Tests allow any issues to be corrected either at the vendor’s location or before production – leveraging the...»





 
<<  HOME   |    CONTACTS
2017 www.sa.i-pdf.info - Abstracts, books, theses

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.