HOME   Cart(1)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

YD/T 3594-2019 PDF English

US$755.00 · In stock · Download in 9 seconds
YD/T 3594-2019: General technical requirements of Security for Vehicular Communication based on LTE
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
YD/T 3594-2019English755 Add to Cart 0-9 seconds. Auto-delivery General technical requirements of Security for Vehicular Communication based on LTE Valid

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: YD/T 3594-2019
      

Similar standards

YD/T 3708   CNCA 07C-031   YD/T 3596   

YD/T 3594-2019: General technical requirements of Security for Vehicular Communication based on LTE


---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/YDT3594-2019
YD COMMUNICATION INDUSTRY STANDARD ICS 33.060.99 M30 General technical requirements of security for vehicular communication based on LTE Issued on. NOVEMBER 11, 2019 Implemented on. JANUARY 01, 2020 Issued by. Ministry of Industry and Information Technology of PRC

Table of Contents

Foreword... 4 1 Scope... 5 2 Normative references... 5 3 Abbreviations... 6 4 LTE-based vehicular communication architecture... 7 4.1 Overview... 7 4.2 PC5 and LTE-Uu based V2X communication architecture... 7 4.3 MBMS and LTE-Uu based V2X communication architecture... 11 4.4 LTE-based vehicular communication security architecture... 11 5 Requirements for LTE-based vehicular communication security... 13 5.1 General security requirements... 13 5.2 Security requirements for network elements... 14 6 Security process of V5 interface... 17 6.1 Overview... 17 6.2 Description of security basic elements... 18 6.3 General requirements for security data structure... 21 6.4 Public key certificate format... 22 6.5 Message signing process... 23 6.6 Message encryption process... 28 6.7 Key negotiation... 34 7 Security procedures of other interfaces... 36 7.1 V2X communication security process between network elements... 36 7.2 Security process of V3 interface... 36 7.3 Security process of MB2 interface... 38 Appendix A (Normative) Algorithm description... 39 Appendix B (Informative) Device authorization management... 41 Appendix C (Informative) Public key certificate management... 55 Appendix D (Informative) Data message of V5 interface... 70 Appendix E (Informative) Key negotiation calculation process... 84 Appendix F (Informative) Certificate request and response... 86 Appendix G (Informative) Recommendations on allocation of security-related AID value... 96

1 Scope

This standard specifies the overall technical requirements, interface security requirements, security procedures for LTE-based vehicular communication security. This standard applies to LTE-based vehicular communication systems.

2 Normative references

The following documents are essential to the application of this document. For the dated documents, only the versions with the dates indicated are applicable to this document; for the undated documents, only the latest version (including all the amendments) is applicable to this standard. GB/T 37376-2019 Transportation - Digital certificate format GB/T 37374-2019 Intelligent transport - Digital certificate application interface 3GPP TS 33.210 3G security; Network Domain Security (NDS); IP network layer security) 3GPP TS 33.223 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function) 3GPP TS 33.246 3G Security; Security of Multimedia Broadcast/Multicast Service (MBMS)

3 Abbreviations

The following abbreviations apply to this document BM-SC. Broadcast-Multicast Service Center BSF. Bootstrapping Server Function CA. Certificate Authority E-UTRAN. Evolved UTRAN GCS AS. Group Communication System Application Server LTE. Long Term Evolution MBMS. Multimedia Broadcast / Multicast Service NAF. Network Application Function PLMN. Public Land Mobile Network USS. User Security Settings

4 LTE-based vehicular communication architecture

4.1 Overview The LTE-based vehicular communication system supports vehicle-to- Vehicle (V2V) applications, vehicle-to-infrastructure (V2I) applications, vehicle-to- network (V2N) applications, vehicle-to-pedestrian (V2P) applications. These applications can provide users with various businesses, such as road security, transportation efficiency improvement, infotainment. 4.2 PC5 and LTE-Uu based V2X communication architecture 4.2.1 PC5 and LTE-Uu based V2X communication architecture in non- roaming scenarios Figure 1 shows the PC5 and LTE-Uu based V2X communication architecture in 4.2.2 PC5 and LTE-Uu based V2X communication architecture in roaming scenarios 4.2.3 PC5 and LTE-Uu based V2X communication architecture in cross- PLMN scenarios 4.2.4 Reference point The reference points of the PC5 and LTE-Uu based V2X communication architecture include the following points. 4.4 LTE-based vehicular communication security architecture 4.4.1 Security protocol architecture of LTE-based vehicular communication 4.4.2 Communication security architecture of LTE-based Internet of Vehicles application layer Figure 7 shows the communication security architecture of LTE-based Internet of Vehicles application layer. The functions of each functional entity, in the security subsystem, include the following points.

5 Requirements for LTE-based vehicular

communication security 5.1 General security requirements - When a V2X device uses the service, which is provided by E-UTRAN that supports V2X communication, the 3GPP network shall provide a method 5.2 Security requirements for network elements 5.2.1 V2X device For PC5 communication, V2X devices shall support certificate-based application layer security mechanisms. See V5 interface security for details. For the Uu communication, V2X devices shall support LTE communication security mechanisms, including EPS-AKA-based mutual authentication, air interface encryption, integrity protection of signaling messages. Among the, for the air interface encryption, the V2X device and the LTE network shall, through negotiation, determine whether to enable it. For MBMS-based Uu 5.2.2 V2X control function The V2X control function shall support the security mechanism, which is defined in Chapter 7.2, to protect the security of the V3 interface. The V2X control function shall support the security mechanism, which is defined in Chapter 7.1, to protect the security of the interface with other network elements. 5.2.3 V1 interface security requirements The security of the V1 interface is outside the scope of this standard. 5.2.4 V2 interface security requirements The security of the V2 interface is outside the scope of this standard. 5.2.5 V3 interface security requirements

6 Security process of V5 interface

6.1 Overview In V2X services, V2X devices interact through V5 interfaces; secure communication is handled by the application layer. V2X device includes V2X vehicles (OBU), V2X roadside units (RSU), etc. The communication integrity protection architecture, which is provided through the V5 interface, is as shown in Figure 8.The typical security process is as follows. 6.2 Description of security basic elements 6.2.1 Encoding rules This standard uses ASN.1 to describe the data structure; uses octet encoding rules (OER) to encode various information, in the digital certificate format. 6.2.2 Definition of data structure The atomic types, which are used in the data structure definition, shall meet the relevant requirements of GB/T 37376-2019. The synonyms of the octet string, which are used in the data structure definition, shall meet the relevant requirements of GB/T 37376-2019. The structure, which is used to clarify the definition, shall meet the relevant requirements of GB/T 37376-2019. 6.2.3 Hash Algorithm The hash algorithm is defined as the HashAlgorithm type. The structure shall meet the relevant requirements of GB/T 37376-2019. 6.2.4 Elliptic curve The elliptic curve is defined as the EccCurve type. The structure shall meet the relevant requirements of GB/T 37376-2019. 6.2.5 Symmetric encryption algorithm The symmetric encryption algorithm is defined as the SymmetricAlgorithm type. The structure shall meet the relevant requirements of GB/T 37376-2019. 6.2.6 Signature public key The signature public key is defined as the PublicVerifyKey type. The structure shall meet the relevant requirements of GB/T 37376-2019. The point on the ECC elliptic curve is defined as the ECCPoint type. The structure shall meet the relevant requirements of GB/T 37376-2019. 6.3 General requirements for security data structure When carrying out security data communication, through the PC5 interface, the security data structure shall be unified; its content shall include at least the information in Table 1. 6.4 Public key certificate format 6.4.1 Message certificate 6.4.1.1 Certificate structure The definition of V2X device certificate structure shall meet the relevant requirements of GB/T 37376-2019. 6.5 Message signing process 6.5.1 Overview The signature algorithm is used to confirm the integrity and non-repudiation of the information, which is sent by the sender. The signature algorithm is used in but not limited to the following scenarios. 6.5.2 Signature data structure requirements The signature data shall follow the data structure of 6.2, in which the data type shall be the signature data type. The information content shall at least contain the information as shown in Table 2.

7 Security procedures of other interfaces

7.1 V2X communication security process between network elements For all interfaces between network elements. 7.2 Security process of V3 interface 7.2.1 Overview In the V2X service, the V2X device interacts with the V2X control function, through the V3 interface. The security mechanism of the V3 interface can use the security mechanism of the PC3 interface (3GPP TS 33.303 5.3). 7.2.2 Security process of UICC configuration transmission After the V2X device is deployed, the configuration parameters saved on the UICC can be updated, to reflect the configuration changes. 7.2.3 Security process of data transmission This article defines the protection process for data transmission, between V2X device and V2X control functions. Between the V2X device and the network function, for the message which is initiated by the V2X device. 7.3 Security process of MB2 interface It shall use the security mechanism, which is defined in Appendix N of 3GPP TS 33.246.The V2X application server serves as the role of GCS AS in this mechanism. ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of YD/T 3594-2019 be delivered?

Answer: The full copy PDF of English version of YD/T 3594-2019 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of YD/T 3594-2019_English with my colleagues?

Answer: Yes. The purchased PDF of YD/T 3594-2019_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- YD/T 3594-2019 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

How to buy and download a true PDF of English version of YD/T 3594-2019?

A step-by-step guide to download PDF of YD/T 3594-2019_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "YD/T 3594-2019".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9