Network Security

Available (35)

Showing 13 - 24 per page



ETSI GS QKD 010 V0.4.1 (Draft)

The present document specifies protection of QKD modules against Trojan horse attacks launched against a time-varying phase, polarisation or intensity modulator that encodes or decodes at least one of bit values, basis values or the intensities of signal, decoy or vacuum states from the quantum channel.

GS QKD 010

ITU-T Y.3804

To realize secure, stable, efficient, and robust operations of and services by a quantum key distribution (QKD) network as well as to manage a QKD network (QKDN) as a whole and support user network management, Recommendation ITU-T Y.3804 specifies functions and procedures for QKDN control and management based on the requirements specified in Recommendation ITU-T Y.3801.

Y.3804 (Recommendation)

Methods for Testing and Specification (MTS);Test Specification for MQTT; Part 2: Security Tests

The present document provides general security considerations and guidelines about the Message Queuing Telemetry Transport (MQTT) protocol. The collective ideas presented in the present document are enriched with example Test Purposes (TPs) to outline possible implementation

ETSI TS 103 597-2 V1.1.1

Public transport - Road vehicle scheduling and control systems - Part 7: System and network architecture

This document specifies the general rules for an on-board data communication system between the different systems that may be used within public transport vehicles, based on the Internet Protocol (IPv4, [3] and IPv6, [4]). This includes operational support systems, passenger information systems, fare collection systems, etc. This document describes: - the requirements for an on board IP network; - the overview architecture and components for an IP based on-board network; - the modular structure of the network architecture; - the Service Oriented Architecture (SOA) approach, and approach to defining services. Systems directly related to the safe operation of the vehicle (including propulsion management, brake systems, door opening systems) are excluded from the scope of this document and are dealt with in other standardization bodies. However, the architecture described in this document may be used for support services such as safety information messages. Interfaces to safety-critical systems should be provided through dedicated gateways with appropriate security provisions; for the purposes of this document, these are regarded as simply external information sources. This document is designed primarily for vehicles with a fixed primary structure, where networks can be installed on a permanent basis and the system configuration task consists largely of the integration, adjustment or removal of the functional end systems that produce and/or consume data. Public transport vehicles consisting of units linked temporarily for operational purposes (specifically, trains in which individual engines, cars or consists are routinely connected and disconnected) require additional mechanisms to enable the communications network itself to reconfigure. Such mechanisms are provided through other standards, notably the IEC 61375 series [5].

 

CEN/TS 13149-7:2020

Space - Use of GNSS-based positioning for road Intelligent Transport Systems (ITS) - Field tests definition for basic performance

The purpose is to define the tests to be performed in order to evaluate the performances of road applications’ GNSS-based positioning terminal (GBPT). To fully define the tests, this task will address the test strategy, the facilities to be used, the test scenarios (e.g. environments and characteristics, which shall allow the comparison of different tests), and the test procedures. The defined tests and process will be validated by performing various in-field tests. The defined tests focus essentially on accuracy, integrity and availability as required in the statement of work included in the invitation to tender. This document will benefit to: - The consolidation of EN 16803-1: "Definitions and system engineering procedures for the establishment and assessment of performances" - The elaboration of EN 16803-2: "Assessment of basic performances of GNSS-based positioning terminals" - The elaboration of EN 16803-3: "Assessment of security performances of GNSS based positioning terminals".

CEN/TR 17465:2020

Space - Use of GNSS-based positioning for road Intelligent Transport System (ITS) - Security attacks modelling and definition of performance features and metrics related to security

The objective is to analyse the security issues that can occur at the GNSS SIS level. In order to do so, a full taxonomy of the GNSS SIS attacks are proposed and GNSS SIS attack security model are elaborated and classified. Security metrics for the validation of the GBPT robustness performances are defined. The proposed methodology for this technical report consists in three distinct steps that are described hereunder: I. The first step consists in providing a full taxonomy of the possible GNSS Signal in Space attacks (voluntary or not) to be considered and identify their impact at GBPT level; II. The second step consists in regrouping narrow sets of previouslyidentified GNSS SIS attacks into security attack models. For each security attack model, an assessment of the dangerousness based on beforehand identified key parameters and methodology will be provided; III. The third step consists in providing definition of performance objectives, security control, security metrics, and a specific procedure for a robustness evaluation of a GBPT against the identified security attack models at step II. The results will benefit to the EN16803-3 "Assessment of security performances of GNSS based positioning terminals"

CEN/TR 17464:2020

Biometrics

Standardization of generic biometric technologies pertaining to human beings to support interoperability and data interchange among applications and systems.

Generic human biometric standards include: common f ile frameworks; biometric application programming interfaces; biometric data interchange formats; related biometric profiles; application of evaluation criteria to biometric technologies; methodologies for performance testing and reporting and cross jurisdictional and societal aspects.

Excluded is the work in ISO/IEC JTC 1/SC 17 to apply biometric technologies to cards and personal identification. Excluded is the work in ISO/IEC JTC 1/SC 27 for biometric data protections techniques, biometric security testing, evaluations and evaluations methodologies.

ISO/IEC JTC 1/SC 37

Future networks: Objectives and design goals

Recommendation ITU-T Y.3001 describes objectives and design goals for future networks (FNs). In order to differentiate FNs from existing networks, four objectives have been identified: service awareness, data awareness, environmental awareness, and social and economic awareness. In order to realize these objectives, twelve design goals have been identified: service diversity, functional flexibility, virtualization of resources, data access, energy consumption, service universalization, economic incentives, network management, mobility, optimization, identification, reliability and security. This Recommendation assumes that the target timeframe for FNs falls approximately between 2015 and 2020. Appendix I describes technologies elaborated in recent research efforts that are likely to be used as an enabling technology for each design goal.
ITU-T Y.3001

Cloud computing - Overview of inter-cloud trust management

Recommendation ITU-T Y.3517 provides an overview of inter-cloud trust management by specifying isolation and security management mechanisms, inter-cloud trust management model, reputation-based trust management in an inter-cloud environment, cloud service evaluation framework and the relationship with cloud computing reference architecture. It also provides requirements for inter-cloud trust management derived from the corresponding use cases.

ITU-T Y.3517

Study on the security of Ultra-Reliable Low-Latency Communication (URLLC) for the 5G System (5GS)

The present document:

- Investigates and identifies the security key issues for meeting the low latency requirement.
- Investigates and identifies the security key issues for meeting the ultra-high reliability requirement.
- Provides potential security requirements to address the identified security issues.
- Provides the potential security solutions to support URLLC services.

Standard Document:

https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetai...

33.825

Study on security aspects of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS)

The present document will examine potential security and privacy threat scenarios enabled by PARLOS, evaluate whether solutions need to be found for these and, if required, identify security solutions and approaches which can mitigate the identified security and privacy threat scenarios while meeting the US regulatory obligations spelled out in the referenced regulations. The present document will make recommendations on the solutions considered. The present document will consider user notification regarding security and privacy risks when using PARLOS.

The present document will consider the applicability of external security and privacy standards (e.g. Payment Card Industry Data Security Standard) to PARLOS.

Standard Document:

https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetai...

33.815