YD/T 3594-2019 PDF English
US$755.00 · In stock · Download in 9 secondsYD/T 3594-2019: General technical requirements of Security for Vehicular Communication based on LTE Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
YD/T 3594-2019 | English | 755 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
General technical requirements of Security for Vehicular Communication based on LTE
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: YD/T 3594-2019
YD/T 3594-2019: General technical requirements of Security for Vehicular Communication based on LTE ---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/YDT3594-2019
YD
COMMUNICATION INDUSTRY STANDARD
ICS 33.060.99
M30
General technical requirements of security for
vehicular communication based on LTE
Issued on. NOVEMBER 11, 2019
Implemented on. JANUARY 01, 2020
Issued by. Ministry of Industry and Information Technology of PRC
Table of Contents
Foreword... 4
1 Scope... 5
2 Normative references... 5
3 Abbreviations... 6
4 LTE-based vehicular communication architecture... 7
4.1 Overview... 7
4.2 PC5 and LTE-Uu based V2X communication architecture... 7
4.3 MBMS and LTE-Uu based V2X communication architecture... 11
4.4 LTE-based vehicular communication security architecture... 11
5 Requirements for LTE-based vehicular communication security... 13
5.1 General security requirements... 13
5.2 Security requirements for network elements... 14
6 Security process of V5 interface... 17
6.1 Overview... 17
6.2 Description of security basic elements... 18
6.3 General requirements for security data structure... 21
6.4 Public key certificate format... 22
6.5 Message signing process... 23
6.6 Message encryption process... 28
6.7 Key negotiation... 34
7 Security procedures of other interfaces... 36
7.1 V2X communication security process between network elements... 36
7.2 Security process of V3 interface... 36
7.3 Security process of MB2 interface... 38
Appendix A (Normative) Algorithm description... 39
Appendix B (Informative) Device authorization management... 41
Appendix C (Informative) Public key certificate management... 55
Appendix D (Informative) Data message of V5 interface... 70
Appendix E (Informative) Key negotiation calculation process... 84
Appendix F (Informative) Certificate request and response... 86
Appendix G (Informative) Recommendations on allocation of security-related
AID value... 96
1 Scope
This standard specifies the overall technical requirements, interface security
requirements, security procedures for LTE-based vehicular communication
security.
This standard applies to LTE-based vehicular communication systems.
2 Normative references
The following documents are essential to the application of this document. For
the dated documents, only the versions with the dates indicated are applicable
to this document; for the undated documents, only the latest version (including
all the amendments) is applicable to this standard.
GB/T 37376-2019 Transportation - Digital certificate format
GB/T 37374-2019 Intelligent transport - Digital certificate application
interface
3GPP TS 33.210 3G security; Network Domain Security (NDS); IP network
layer security)
3GPP TS 33.223 Generic Authentication Architecture (GAA); Generic
Bootstrapping Architecture (GBA) Push function)
3GPP TS 33.246 3G Security; Security of Multimedia Broadcast/Multicast
Service (MBMS)
3 Abbreviations
The following abbreviations apply to this document
BM-SC. Broadcast-Multicast Service Center
BSF. Bootstrapping Server Function
CA. Certificate Authority
E-UTRAN. Evolved UTRAN
GCS AS. Group Communication System Application Server
LTE. Long Term Evolution
MBMS. Multimedia Broadcast / Multicast Service
NAF. Network Application Function
PLMN. Public Land Mobile Network
USS. User Security Settings
4 LTE-based vehicular communication architecture
4.1 Overview
The LTE-based vehicular communication system supports vehicle-to- Vehicle
(V2V) applications, vehicle-to-infrastructure (V2I) applications, vehicle-to-
network (V2N) applications, vehicle-to-pedestrian (V2P) applications. These
applications can provide users with various businesses, such as road security,
transportation efficiency improvement, infotainment.
4.2 PC5 and LTE-Uu based V2X communication architecture
4.2.1 PC5 and LTE-Uu based V2X communication architecture in non-
roaming scenarios
Figure 1 shows the PC5 and LTE-Uu based V2X communication architecture in
4.2.2 PC5 and LTE-Uu based V2X communication architecture in roaming
scenarios
4.2.3 PC5 and LTE-Uu based V2X communication architecture in cross-
PLMN scenarios
4.2.4 Reference point
The reference points of the PC5 and LTE-Uu based V2X communication
architecture include the following points.
4.4 LTE-based vehicular communication security architecture
4.4.1 Security protocol architecture of LTE-based vehicular
communication
4.4.2 Communication security architecture of LTE-based Internet of
Vehicles application layer
Figure 7 shows the communication security architecture of LTE-based Internet
of Vehicles application layer. The functions of each functional entity, in the
security subsystem, include the following points.
5 Requirements for LTE-based vehicular
communication security
5.1 General security requirements
- When a V2X device uses the service, which is provided by E-UTRAN that
supports V2X communication, the 3GPP network shall provide a method
5.2 Security requirements for network elements
5.2.1 V2X device
For PC5 communication, V2X devices shall support certificate-based
application layer security mechanisms. See V5 interface security for details.
For the Uu communication, V2X devices shall support LTE communication
security mechanisms, including EPS-AKA-based mutual authentication, air
interface encryption, integrity protection of signaling messages. Among the, for
the air interface encryption, the V2X device and the LTE network shall, through
negotiation, determine whether to enable it. For MBMS-based Uu
5.2.2 V2X control function
The V2X control function shall support the security mechanism, which is defined
in Chapter 7.2, to protect the security of the V3 interface.
The V2X control function shall support the security mechanism, which is defined
in Chapter 7.1, to protect the security of the interface with other network
elements.
5.2.3 V1 interface security requirements
The security of the V1 interface is outside the scope of this standard.
5.2.4 V2 interface security requirements
The security of the V2 interface is outside the scope of this standard.
5.2.5 V3 interface security requirements
6 Security process of V5 interface
6.1 Overview
In V2X services, V2X devices interact through V5 interfaces; secure
communication is handled by the application layer. V2X device includes V2X
vehicles (OBU), V2X roadside units (RSU), etc. The communication integrity
protection architecture, which is provided through the V5 interface, is as shown
in Figure 8.The typical security process is as follows.
6.2 Description of security basic elements
6.2.1 Encoding rules
This standard uses ASN.1 to describe the data structure; uses octet encoding
rules (OER) to encode various information, in the digital certificate format.
6.2.2 Definition of data structure
The atomic types, which are used in the data structure definition, shall meet the
relevant requirements of GB/T 37376-2019.
The synonyms of the octet string, which are used in the data structure definition,
shall meet the relevant requirements of GB/T 37376-2019.
The structure, which is used to clarify the definition, shall meet the relevant
requirements of GB/T 37376-2019.
6.2.3 Hash Algorithm
The hash algorithm is defined as the HashAlgorithm type. The structure shall
meet the relevant requirements of GB/T 37376-2019.
6.2.4 Elliptic curve
The elliptic curve is defined as the EccCurve type. The structure shall meet the
relevant requirements of GB/T 37376-2019.
6.2.5 Symmetric encryption algorithm
The symmetric encryption algorithm is defined as the SymmetricAlgorithm type.
The structure shall meet the relevant requirements of GB/T 37376-2019.
6.2.6 Signature public key
The signature public key is defined as the PublicVerifyKey type. The structure
shall meet the relevant requirements of GB/T 37376-2019.
The point on the ECC elliptic curve is defined as the ECCPoint type. The
structure shall meet the relevant requirements of GB/T 37376-2019.
6.3 General requirements for security data structure
When carrying out security data communication, through the PC5 interface, the
security data structure shall be unified; its content shall include at least the
information in Table 1.
6.4 Public key certificate format
6.4.1 Message certificate
6.4.1.1 Certificate structure
The definition of V2X device certificate structure shall meet the relevant
requirements of GB/T 37376-2019.
6.5 Message signing process
6.5.1 Overview
The signature algorithm is used to confirm the integrity and non-repudiation of
the information, which is sent by the sender. The signature algorithm is used in
but not limited to the following scenarios.
6.5.2 Signature data structure requirements
The signature data shall follow the data structure of 6.2, in which the data type
shall be the signature data type. The information content shall at least contain
the information as shown in Table 2.
7 Security procedures of other interfaces
7.1 V2X communication security process between network elements
For all interfaces between network elements.
7.2 Security process of V3 interface
7.2.1 Overview
In the V2X service, the V2X device interacts with the V2X control function,
through the V3 interface. The security mechanism of the V3 interface can use
the security mechanism of the PC3 interface (3GPP TS 33.303 5.3).
7.2.2 Security process of UICC configuration transmission
After the V2X device is deployed, the configuration parameters saved on the
UICC can be updated, to reflect the configuration changes.
7.2.3 Security process of data transmission
This article defines the protection process for data transmission, between V2X
device and V2X control functions.
Between the V2X device and the network function, for the message which is
initiated by the V2X device.
7.3 Security process of MB2 interface
It shall use the security mechanism, which is defined in Appendix N of 3GPP
TS 33.246.The V2X application server serves as the role of GCS AS in this
mechanism.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of YD/T 3594-2019 be delivered?Answer: The full copy PDF of English version of YD/T 3594-2019 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of YD/T 3594-2019_English with my colleagues?Answer: Yes. The purchased PDF of YD/T 3594-2019_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- YD/T 3594-2019 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of YD/T 3594-2019?A step-by-step guide to download PDF of YD/T 3594-2019_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "YD/T 3594-2019". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|