Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 33.885  Word version:  14.1.0

Top   Top   None   None   Next
1…   4…

 

1  Scopep. 8

The present document contains a study of the security aspects of V2X services and an evaluation of possible technical solutions needed to support such services. The Stage 1 requirements for these services are defined in TS 22.185. Potential stage 2 solutions for V2X Services are being studied in TR 23.785.

2  Referencesp. 8

The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
  • References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
  • For a specific reference, subsequent revisions do not apply.
  • For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1]
TR 21.905: "Vocabulary for 3GPP Specifications".
[2]
TS 22.185: "Service requirements for V2X services".
[3]
TR 23.785: "Study on architecture enhancements for LTE support of V2X services".
[4]
TR 22.885: "Study on LTE support for Vehicle to Everything (V2X) services".
[5]
Angermeier, Daniel, Alexander Kiening and Frederic Stumpf. "PAL - Privacy Augmented LTE: A Privacy-Preserving Scheme for Vehicular LTE Communication". The Tenth ACM International Workshop on VehiculAr Inter-NETworking, Systems, and Applications (ACM VANET), 2013.
[6]
ETSI TS 102 940: "Intelligent Transport Systems (ITS); Security; ITS communications security architecture and security management".
[7]
TS 33.210: "3G security; Network Domain Security (NDS); IP network layer security".
[8]
TS 33.310: "Network Domain Security (NDS); Authentication Framework (AF)".
[9]
TS 23.303: "Proximity-based Services (ProSe); Stage 2".
[10]
TS 23.246: "Multimedia Broadcast/Multicast Service (MBMS); Architecture and functional description".
[11]
TS 23.285: "Architecture enhancements for V2X services, stage 2".
[12]
TS 33.303: "Proximity-based Services(ProSe); Security aspects"
[13]
TS 33.401: "3GPP System Architecture Evolution; Security architecture".
[14]
TS 33.402: "3GPP System Architecture Evolution; Security aspects of non-3GPP accesses".
[15]
RFC 6507:  "Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI)".
[16]
RFC 6508:  "Sakai-Kasahara Key Encryption (SAKKE)".
[17]
RFC 6509:  "MIKEY-SAKKE: Sakai-Kasahara Key Encryption in Multimedia Internet KEYing (MIKEY)".
[18]
IEEE Std.1609.2: "Wireless Access in Vehicular Environments-Security Services for Applications and Managements Messages".
[19]
NHTSA, report number DOT HS 812 014: "Vehicle-to-Vehicle Communications: Readiness of V2V Technology for Application"
[20]
ETSI TS 102 225: "Smart Cards; Secured packet structure for UICC based applications".
[21]
ETSI TS 102 226: "Smart cards; Remote APDU structure for UICC based applications".
[22]
TS 31.115: "Secured packet structure for (Universal) Subscriber Identity Module (U)SIM Toolkit applications".
[23]
TS 31.116: "Remote APDU Structure for (U)SIM Toolkit applications ".
[24]
TS 33.222: "Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS)".
[25]
TS 33.220: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)".
[26]
TS 23.003: "Numbering, addressing and identification".
[27]
TS 33.223: "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function".
[28]
TS 23.468: "Group Communication System Enablers for LTE (GCSE_LTE); Stage 2".
[29]
TR 33.888: "Study on security issues to support Group Communication System Enabler (GCSE) for LTE".
[30]
Up

3  Definitions, symbols and abbreviationsp. 9

3.1  Definitionsp. 9

For the purposes of the present document, the terms and definitions given in TR 21.905 and the following apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TR 21.905.
LTE-V system entity:
A cellular network entity or V2X communication entity.
Personally identifiable information (PII):
Any information that (a) can be used to identify a subscriber to whom such information relates, or (b) is or might be directly or indirectly linked to a subscriber.
Pseudonymity:
The condition when the processing of personally identifiable information (PII) is such the data can no longer be attributed to a specific subscriber without the use of additional information, as long as such additional information is kept separately and subject to technical and organisational measures to ensure non-attribution to an identified or identifiable subscriber.
The following terms defined in TR 22.885 are used in the present document:
Road Side Unit
V2I Service
V2N Service
V2P Service
V2V Service
V2X Service
Up

3.2  Abbreviationsp. 10

For the purposes of the present document, the abbreviations given in TR 21.905 and the following apply.
An abbreviation defined in the present document takes precedence over the definition of the same abbreviation, if any, in TR 21.905.
AS
Application Server
CA
Certificate Authority
CME
Certificate Management Entity
CRL
Certificate Revocation List
DSA
Digital Signature Algorithm
DSRC
Dedicated Short Range Communication
LTE-V
LTE V2X
ECIES
Elliptic Curve Integrated Encryption Scheme
ECDSA
Elliptic Curve DSA
ECCSI
Elliptic Curve-based Certificateless Signatures for Identity-based Encryption
GPS
Global Positioning System
ID
Identity
ITS
Intelligent Transportation System
KMS
Key Management System
KMF
Key Management Function
LME
Local MBMS Entity
MIKEY
Multimedia Internet Keying
OEM
Original Equipment manufacturer
PSSME
Provider Service Security Management Entity
PDU
Protocol Data Unit
PCA
Pseudonym Certificate Authority
ProSe
Proximity-based Services
PMK
ProSe MIKEY Key
PVT
Public Validation Token
PMSI
Pseudonymous Mobile Subscriber ID
RSU
Road Side Unit
RSK
Receiver Secret Key
SAKKE
Sakai-Kasahara Key Encryption
SSK
Secret Signing Key
SAP
Service Access Point
TIMF
Temporary Identity Management Function
V2I
Vehicle-to-Infrastructure
V2N
Vehicle-to-Network
V2P
Vehicle-to-Pedestrian
V2V
Vehicle-to-Vehicle
V2X
Vehicle-to-Everything
VCF
V2X Control Function
WAVE
Wireless Access in Vehicular Environments
Up

Up   Top   ToC