GB/T 30269.808-2018 English PDFUS$1319.00 ยท In stock
Delivery: <= 10 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 30269.808-2018: Information technology -- Sensor network -- Part 808: Testing: Network layer and application support sublayer security for low-rate wireless sensor network Status: Valid
Similar standardsGB/T 31024.3 GB/T 31024.4 GB/T 31024.1 GB/T 30269.809 GB/T 30269.805 GB/T 30269.806Basic dataStandard ID: GB/T 30269.808-2018 (GB/T30269.808-2018)Description (Translated English): Information technology -- Sensor network -- Part 808: Testing: Network layer and application support sublayer security for low-rate wireless sensor network Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L79 Classification of International Standard: 35.110 Word Count Estimation: 66,623 Date of Issue: 2018-12-28 Date of Implementation: 2021-01-01 Regulation (derived from): National Standard Announcement No. 17 of 2018 Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration GB/T 30269.808-2018: Information technology -- Sensor network -- Part 808: Testing: Network layer and application support sublayer security for low-rate wireless sensor network---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information technology--Sensor network--Part 808. Testing. Network layer and application support sublayer security for low--rate wireless sensor network ICS 35.110 L79 National Standards of People's Republic of China Information Technology Sensor Network Part 808. Test. Low Rate Wireless Sensor Network Network layer and application support sublayer security Informationtechnology-Sensornetwork-Part 808. Testing. Networklayerand Published on.2018-12-28 2019-07-01 implementation State market supervision and administration China National Standardization Administration issued ContentForeword III Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and Definitions 1 4 Abbreviations 2 5 Overall description 3 6 NWK Security Test 5 6.1 Environment Configuration 5 6.2 Test Process 5 6.3 Test Decision 6 6.4 Description 7 7 APS Security Test 7 7.1 TC_APS_SE01 Trust Center Configuration Distributing Initialization Key Material to Terminal Equipment 7 7.2 TC_APS_SE02 Trust Center Configuration Distribution Initialization Value to Terminal Device 8 7.3 TC_APS_SE03 Handheld Device Distributes Initialization Key Material to Terminal Device 10 7.4 TC_APS_SE04 Handheld Device Distributes Initialization Value to Terminal Device 11 7.5 TC_APS_SE05 establishes a direct key based on the random key pool method 13 7.6 TC_APS_SE06 establishes direct key based on the method of polynomial pool 15 7.7 TC_APS_SE07 establishes path key 17 based on the method of path key establishment in the same cluster 7.8 TC_APS_SE08 establishes path key 20 based on the method of establishing path key in different clusters 7.9 TC_APS_SE09 update initialization key material 23 7.10 TC_APS_SE10 Update Initialization Value 24 7.11 TC_APS_SE11 Update Shared Key 26 7.12 TC_APS_SE12 Update Session Key 28 7.13 TC_APS_SE13 Revocation Key 29 7.14 TC_APS_SE14 initiates an access control procedure using autonomous access methods for data resources at the gateway. 7.15 TC_APS_SE15 initiates the access control procedure by using the autonomous access method for the node resources at the gateway. 7.16 TC_APS_SE16 uses the mandatory access method for data resources at the gateway to initiate access control procedures. 7.17 TC_APS_SE17 uses the mandatory access method for the node resource at the gateway to initiate the access control process. 7.18 TC_APS_SE18 uses the mandatory access method for node resources at the node to initiate the access control process. 7.19 TC_APS_SE19 ID-based algorithm based on XOR algorithm 40 7.20 TC_APS_SE20 Hash-based identity authentication 43 7.21 TC_APS_SE21 identity authentication based on block cipher algorithm 45 7.22 TC_APS_SE22 identity authentication based on asymmetric cryptographic algorithm 48 7.23 TC_APS_SE23 initiates broadcast message authentication 50 7.24 TC_APS_SE24 starts the secure data fusion service 52 7.25 TC_APS_SE25 Security Data Fusion Cancellation 55 Appendix A (Normative) Protocol Implementation Conformance Statement 58ForewordGB/T 30269 "Information Technology Sensor Network" is divided into the following parts. --- Part 1. Reference architecture and general technical requirements; --- Part 2. Terminology; --- Part 301. Communication and information exchange. low-speed wireless sensor network network layer and application support sub-layer specification; --- Part 302. Communication and Information Exchange. High-reliability wireless sensor network media access control and physical layer specifications; --- Part 303. Communication and information exchange. IP-based wireless sensor network network layer specification; --- Part 304. Communication and information exchange. Technical requirements for acoustic wave communication systems; --- Part 401. Collaborative Information Processing. Services and interfaces supporting collaborative information processing; --- Part 501. Identification. Sensing node identifier preparation rules; --- Section 502. Identification. Sensing node identifier resolution; --- Section 503. Identification. Sensing node identifier registration procedures; --- Part 504. Identification. Sensor node identifier management specification; --- Part 601. Information Security. General Technical Specifications; --- Part 602. Information Security. Low-rate wireless sensor network network layer and application support sub-layer security specifications; --- Part 701. Sensor interface. signal interface; --- Part 702. Sensor interface. data interface; --- Section 801. Testing. General requirements; --- Part 802. Testing. Low-speed wireless sensor network media access control and physical layer; --- Part 803. Testing. Low-speed wireless sensor network network layer and application support sub-layer; --- Part 804. Test. Sensor Interface; --- Part 805. Testing. Sensor Gateway; --- Section 806. Test. Sensing node identifier resolution; --- Part 807. Testing. Network transmission security; --- Part 808. Testing. Low-rate wireless sensor network network layer and application support sub-layer security; --- Part 809. Testing. IP-based wireless sensor network network layer protocol; --- Part 901. Gateway. General technical requirements; --- Part 902. Gateway. Remote management technical requirements; --- Section 903. Gateway. Logical interface; --- Part 1001. Middleware. Sensor network node interface. This part is part 808 of GB/T 30269. This part is drafted in accordance with the rules given in GB/T 1.1-2009. Please note that some of the contents of this document may involve patents. The issuing organization of this document is not responsible for identifying these patents. This part is proposed and managed by the National Information Technology Standardization Technical Committee (SAC/TC28). This section is mainly drafted by. China Information Security Certification Center, Shandong Institute of Standardization, China Electronics Technology Standardization Institute, Wuxi Internet of Things Industry Research Institute, Shandong Provincial Computing Center (National Supercomputing Jinan Center), Chongqing University of Posts and Telecommunications, Communication University of China. The main drafters of this section. Gan Jiefu, Gong Wei, Wang Shuguang, Wang Qingsheng, Chen Shuyi, Su Jingru, Qi Chunxiao, Xing Tao, Li Zhao, Zheng Zheng, Wang Fuqiang, Wu Xiaoming, Xie Yufei, Li Hongsheng, Liu Jianbo, Tian Jiayin, Yang Cheng.IntroductionThis part of GB/T 30269 is for GB/T 30269.602-2017 "Information Technology Sensor Network Part 602. Information Security Full. Low-rate wireless sensor network network layer and application support sub-layer security specification describes the low-rate wireless sensor network network layer and should Use test cases that support sublayer security. Since a test case may involve several protocol requirements, a certain protocol requirement may correspond to several tests. For example, the test cases described in this section are not in comparison with the provisions of GB/T 30269.602-2017. Information Technology Sensor Network Part 808. Test. Low Rate Wireless Sensor Network Network layer and application support sublayer security1 ScopeThis part of GB/T 30269 specifies the low-rate wireless sensor network network layer and application for GB/T 30269.602-2017. Test cases that support sublayer security. This section applies to product conformance tests that claim to comply with GB/T 30269.602-2017 and specific test cases for specific products. design.2 Normative referencesThe following documents are indispensable for the application of this document. For dated references, only the dated version applies to this article. Pieces. For undated references, the latest edition (including all amendments) applies to this document. GB/T 17178.1-1997 Information technology - Open system interconnection conformance testing method and framework - Part 1. Basic concepts GB/T 30269.301-2014 Information technology sensor networks - Part 301. Communication and information exchange. Low-speed wireless sensing Network layer and application support sublayer specification GB/T 30269.601-2016 Information technology sensor networks - Part 601. Information security. General technical specifications GB/T 30269.602-2017 Information technology sensor networks - Part 602. Information security. Low-rate wireless sensor networks Network layer and application support sublayer transport security specification GB/T 30269.801-2017 Information technology sensor networks - Part 801. Testing. General requirements3 Terms and definitionsGB/T 17178.1-1997, GB/T 30269.301-2014, GB/T 30269.601-2016 defined and the following terms and conditions The meaning applies to this document. 3.1 Device under test; DUT The device on which the measured implementation is located. [GB/T 30269.803-2017, definition 3.4] 3.2 Key material keyingmaterial The data necessary to establish and maintain a cryptographic key relationship. 3.3 Shared key sharedkey A long-term, commonly used key established between two or more nodes based on the initial key material. 3.4 Session key sessionkey A key randomly generated to ensure secure communication or message authentication between a pair of nodes. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 30269.808-2018_English be delivered?Answer: Upon your order, we will start to translate GB/T 30269.808-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 6 ~ 10 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 30269.808-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 30269.808-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |