• TR 102 512 : 1.1.1

    Current The latest, up-to-date edition.

    TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY; SECURITY REQUIREMENTS ANALYSIS FOR MODULATION ENHANCEMENTS TO TETRA

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date: 

    Publisher:  European Telecommunications Standards Institute

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    1 Scope
    2 References
    3 Definitions and abbreviations
      3.1 Definitions
      3.2 Abbreviations
    4 Communications security model
      4.1 Introduction
      4.2 General model identifying security relationships
      4.3 TVRA development model
    5 Security objectives
      5.1 General objectives
      5.2 Objectives from the legislative framework
      5.3 Summary
    6 Vulnerability analysis
      6.1 Introduction
      6.2 TETRA system under evaluation
      6.3 TETRA use cases (security scenarios)
      6.4 Overview of existing TETRA security measures
      6.5 System capabilities not covered by existing TETRA
          security measures
    7 Identification of requirements for countermeasures
      7.1 Overview
      7.2 TETRA air interface modifications
    History

    Abstract - (Show below) - (Hide below)

    Specifies the threat analysis presented in ETR 086-3 with respect to new services and capabilities offered by the enhancements to TETRA that aim to provide alternative modulation schemes with a view to offering higher data transmission rates.

    General Product Information - (Show below) - (Hide below)

    Committee TETRA 06
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    EN 300 092-5 : 1.2.4 INTEGRATED SERVICES DIGITAL NETWORK (ISDN); CALLING LINE IDENTIFICATION PRESENTATION (CLIP) SUPPLEMENTARY SERVICE; DIGITAL SUBSCRIBER SIGNALLING SYSTEM NO. ONE (DSS1) PROTOCOL; PART 5: TEST SUITE STRUCTURE AND TEST PURPOSES (TSS&TP) SPECIFICATION FOR THE NETWORK
    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    TS 100 392-3-6 : 1.1.1 TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 3: INTERWORKING AT THE INTER-SYSTEM INTERFACE (ISI); SUB-PART 6: SPEECH FORMAT IMPLEMENTATION FOR CIRCUIT MODE TRANSMISSION
    TR 101 052 : 1.1.1 SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD AUTHENTICATION AND KEY MANAGEMENT ALGORITHM SET TAA1
    ISO/IEC 9798-2:2008 Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms
    TR 101 053-4 : 1.1.2 SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD ENCRYPTION ALGORITHMS; PART 4: TEA4
    TS 100 392-3-7 : 1.1.1 TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 3: INTERWORKING AT THE INTER-SYSTEM INTERFACE (ISI); SUB-PART 7: SPEECH FORMAT IMPLEMENTATION FOR PACKET MODE TRANSMISSION
    ETR 086-3 : 20001 TRANS EUROPEAN TRUNKED RADIO (TETRA) SYSTEMS - TECHNICAL REQUIREMENTS SPECIFICATION - SECURITY ASPECTS
    TS 101 331 : 1.4.1 LAWFUL INTERCEPTION (LI); REQUIREMENTS OF LAW ENFORCEMENT AGENCIES
    TR 101 053-3 : 1.1.3 SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD ENCRYPTION ALGORITHMS; PART 3: TEA3
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    TR 101 053-1 : 1.1.2 SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD ENCRYPTION ALGORITHMS; PART 1: TEA1
    ETR 332 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)
    EN 300 392-7 : 3.3.1 TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY
    TR 101 053-2 : 2.2.4 SECURITY ALGORITHMS GROUP OF EXPERTS (SAGE); RULES FOR THE MANAGEMENT OF THE TETRA STANDARD ENCRYPTION ALGORITHMS; PART 2: TEA2
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective