EG 201 620 : 1.1.1
Current
The latest, up-to-date edition.
INTELLIGENT NETWORKS (IN) - SECURITY STUDIES FOR CORDLESS TERMINAL MOBILITY (CTM)
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Security Objectives
4.1 Customers' (Subscribers') Objectives
4.2 CTM Service Providers' and Network Providers'
Objectives
4.3 Manufacturers' Objectives
4.4 Objectives Derived from the CTM Service Descriptions
4.5 Main Objectives
5 Legislation Issues
5.1 Privacy
5.2 Security Order
5.3 Lawful Interception
5.4 Contract
6 Architecture
6.1 Functional Architecture
6.2 Network Procedures
6.3 Management Procedures
7 Threat Analysis and Risk Assessment
7.1 Threats
7.2 Threats Related to CTM Network Procedures
7.3 Risk Measurement
7.4 Risk Assessment for the CTM Network Procedures
7.5 Consolidated Risk Assessment
7.6 Conclusion
8 Security Requirements and Security Services
8.1 Authentication
8.2 Access Control
8.3 Confidentiality
8.4 Integrity
8.5 General Security Policy
8.6 Threats and counteracting security measures
9 Resulting Security Architecture
9.1 Radio access part
9.2 Service data access part
9.3 Network part
9.4 Policy part
9.5 Concluding remarks
10 Security Mechanisms
10.1 Radio Access Part
10.2 Service Data Access Part
10.3 Network part
Annex A (informative): Use of CT2 for CTM
A.1 Portable Part (PP) authentication
A.2 Fixed Part (FP) authentication
A.3 Identities and associated parameters
A.4 Registration
A.5 On-air (de)-registration acknowledgement
A.6 ZAP facility
A.7 Ciphering
A.8 Comparison of CT2 and DECT regarding security for CTM
A.9 Conclusions
Annex B (informative): Threats with minor risk and
countermeasures
Bibliography
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.