TR 102 512 : 1.1.1
Current
The latest, up-to-date edition.
TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY; SECURITY REQUIREMENTS ANALYSIS FOR MODULATION ENHANCEMENTS TO TETRA
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Communications security model
4.1 Introduction
4.2 General model identifying security relationships
4.3 TVRA development model
5 Security objectives
5.1 General objectives
5.2 Objectives from the legislative framework
5.3 Summary
6 Vulnerability analysis
6.1 Introduction
6.2 TETRA system under evaluation
6.3 TETRA use cases (security scenarios)
6.4 Overview of existing TETRA security measures
6.5 System capabilities not covered by existing TETRA
security measures
7 Identification of requirements for countermeasures
7.1 Overview
7.2 TETRA air interface modifications
History
Specifies the threat analysis presented in ETR 086-3 with respect to new services and capabilities offered by the enhancements to TETRA that aim to provide alternative modulation schemes with a view to offering higher data transmission rates.
Committee |
TETRA 06
|
DocumentType |
Standard
|
Pages |
23
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
EN 300 092-5 : 1.2.4 | INTEGRATED SERVICES DIGITAL NETWORK (ISDN); CALLING LINE IDENTIFICATION PRESENTATION (CLIP) SUPPLEMENTARY SERVICE; DIGITAL SUBSCRIBER SIGNALLING SYSTEM NO. ONE (DSS1) PROTOCOL; PART 5: TEST SUITE STRUCTURE AND TEST PURPOSES (TSS&TP) SPECIFICATION FOR THE NETWORK |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
TS 100 392-3-6 : 1.1.1 | TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 3: INTERWORKING AT THE INTER-SYSTEM INTERFACE (ISI); SUB-PART 6: SPEECH FORMAT IMPLEMENTATION FOR CIRCUIT MODE TRANSMISSION |
TR 101 052 : 1.1.1 | SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD AUTHENTICATION AND KEY MANAGEMENT ALGORITHM SET TAA1 |
ISO/IEC 9798-2:2008 | Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
TR 101 053-4 : 1.1.2 | SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD ENCRYPTION ALGORITHMS; PART 4: TEA4 |
TS 100 392-3-7 : 1.1.1 | TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 3: INTERWORKING AT THE INTER-SYSTEM INTERFACE (ISI); SUB-PART 7: SPEECH FORMAT IMPLEMENTATION FOR PACKET MODE TRANSMISSION |
ETR 086-3 : 20001 | TRANS EUROPEAN TRUNKED RADIO (TETRA) SYSTEMS - TECHNICAL REQUIREMENTS SPECIFICATION - SECURITY ASPECTS |
TS 101 331 : 1.4.1 | LAWFUL INTERCEPTION (LI); REQUIREMENTS OF LAW ENFORCEMENT AGENCIES |
TR 101 053-3 : 1.1.3 | SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD ENCRYPTION ALGORITHMS; PART 3: TEA3 |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
TR 101 053-1 : 1.1.2 | SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD ENCRYPTION ALGORITHMS; PART 1: TEA1 |
ETR 332 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) |
EN 300 392-7 : 3.3.1 | TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY |
TR 101 053-2 : 2.2.4 | SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD ENCRYPTION ALGORITHMS; PART 2: TEA2 |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.