{"id":431453,"date":"2024-10-20T07:28:19","date_gmt":"2024-10-20T07:28:19","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-211772023-tc\/"},"modified":"2024-10-26T14:12:14","modified_gmt":"2024-10-26T14:12:14","slug":"bs-en-iso-211772023-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-211772023-tc\/","title":{"rendered":"BS EN ISO 21177:2023 – TC"},"content":{"rendered":"
This document contains specifications for a set of ITS station security services required to ensure the authenticity of the source and integrity of information exchanged between trusted entities, i.e.: \u2014 between devices operated as bounded secured managed entities, i.e. “ITS Station Communication Units” (ITS-SCU) and “ITS station units” (ITS-SU) as specified in ISO 21217; and \u2014 between ITS-SUs (composed of one or several ITS-SCUs) and external trusted entities such as sensor and control networks. These services include the authentication and secure session establishment which are required to exchange information in a trusted and secure manner. These services are essential for many intelligent transport system (ITS) applications and services including time-critical safety applications, automated driving, remote management of ITS stations (ISO 24102-2), and roadside\/infrastructure-related services.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | 30473294 <\/td>\n<\/tr>\n | ||||||
153<\/td>\n | A-30419842 <\/td>\n<\/tr>\n | ||||||
154<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
156<\/td>\n | European foreword Endorsement notice <\/td>\n<\/tr>\n | ||||||
160<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
161<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
167<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
168<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
170<\/td>\n | 5 Overview 5.1 General description, relationship to transport layer security (TLS) and relationship to application specifications <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | 5.2 Goals 5.3 Architecture and functional entities <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | 5.4 Cryptomaterial handles 5.5 Session IDs and state <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | 5.6 Access control and authorization state 5.7 Application level non-repudiation 5.8 Service primitive conventions <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | 6 Process flows and sequence diagrams 6.1 General 6.2 Overview of process flows <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | 6.3 Sequence diagram conventions <\/td>\n<\/tr>\n | ||||||
180<\/td>\n | 6.4 Configure <\/td>\n<\/tr>\n | ||||||
181<\/td>\n | 6.5 Start session <\/td>\n<\/tr>\n | ||||||
184<\/td>\n | 6.6 Send data <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | 6.7 Send access control PDU <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | 6.8 Receive PDU <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | 6.9 Extend session 6.9.1 Goals <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | 6.9.2 Processing 6.10 Secure connection brokering 6.10.1 Goals 6.10.2 Prerequisites <\/td>\n<\/tr>\n | ||||||
195<\/td>\n | 6.10.3 Overview <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | 6.10.4 Detailed specification <\/td>\n<\/tr>\n | ||||||
204<\/td>\n | 6.11 Force end session <\/td>\n<\/tr>\n | ||||||
206<\/td>\n | 6.12 Session terminated at session layer 6.13 Deactivate <\/td>\n<\/tr>\n | ||||||
207<\/td>\n | 6.14 Secure session example <\/td>\n<\/tr>\n | ||||||
209<\/td>\n | 7 Security subsystem: interfaces and data types 7.1 General <\/td>\n<\/tr>\n | ||||||
210<\/td>\n | 7.2 Access control policy and state <\/td>\n<\/tr>\n | ||||||
211<\/td>\n | 7.3 Enhanced authentication 7.3.1 Definition and possible states 7.3.2 States for owner role enhanced authentication <\/td>\n<\/tr>\n | ||||||
213<\/td>\n | 7.3.3 State for accessor role enhanced authentication 7.3.4 Use by access control 7.3.5 Methods for providing enhanced authentication 7.3.6 Enhanced authentication using SPAKE2 <\/td>\n<\/tr>\n | ||||||
214<\/td>\n | 7.4 Extended authentication <\/td>\n<\/tr>\n | ||||||
215<\/td>\n | 7.5 Security Management Information Request 7.5.1 Rationale <\/td>\n<\/tr>\n | ||||||
216<\/td>\n | 7.5.2 General <\/td>\n<\/tr>\n | ||||||
217<\/td>\n | 7.6 Data types 7.6.1 General 7.6.2 Imports 7.6.3 \u201cHelper\u201d data types <\/td>\n<\/tr>\n | ||||||
218<\/td>\n | 7.6.4 Iso21177AccessControlPdu 7.6.5 AccessControlResult 7.6.6 ExtendedAuthPdu <\/td>\n<\/tr>\n | ||||||
219<\/td>\n | 7.6.7 ExtendedAuthRequest 7.6.8 InnerExtendedAuthRequest 7.6.9 AtomicExtendedAuthRequest <\/td>\n<\/tr>\n | ||||||
220<\/td>\n | 7.6.10 ExtendedAuthResponse 7.6.11 ExtendedAuthResponsePayload 7.6.12 EnhancedAuthPdu <\/td>\n<\/tr>\n | ||||||
221<\/td>\n | 7.6.13 SpakeRequest 7.6.14 SpakeResponse 7.6.15 SpakeRequesterResponse 7.6.16 SecurityMgmtInfoPdu 7.6.17 SecurityMgmtInfoRequest <\/td>\n<\/tr>\n | ||||||
222<\/td>\n | 7.6.18 EtsiCrlRequest 7.6.19 CertChainRequest 7.6.20 SecurityMgmtInfoResponse <\/td>\n<\/tr>\n | ||||||
223<\/td>\n | 7.6.21 SecurityMgmtInfoErrorResponse 7.6.22 EtsiCrlResponse 7.6.23 EtsiCtlResponse 7.6.24 IeeeCrlResponse <\/td>\n<\/tr>\n | ||||||
224<\/td>\n | 7.6.25 CertChainResponse 7.6.26 SessionExtensionPdu <\/td>\n<\/tr>\n | ||||||
226<\/td>\n | 7.7 App-Sec Interface 7.7.1 App-Sec-Configure.request <\/td>\n<\/tr>\n | ||||||
227<\/td>\n | 7.7.2 App-Sec-Configure.confirm 7.7.3 App-Sec-StartSession.indication 7.7.4 App-Sec-Data.request <\/td>\n<\/tr>\n | ||||||
228<\/td>\n | 7.7.5 App-Sec-Data.confirm 7.7.6 App-Sec-Incoming.request <\/td>\n<\/tr>\n | ||||||
229<\/td>\n | 7.7.7 App-Sec-Incoming.confirm <\/td>\n<\/tr>\n | ||||||
230<\/td>\n | 7.7.8 App-Sec-EndSession.request 7.7.9 App-Sec-EndSession.indication <\/td>\n<\/tr>\n | ||||||
231<\/td>\n | 7.7.10 App-Sec-Deactivate.request 7.7.11 App-Sec-Deactivate.confirm 7.7.12 App-Sec-Deactivate.indication <\/td>\n<\/tr>\n | ||||||
232<\/td>\n | 7.8 Security subsystem internal interface 7.8.1 General 7.8.2 Sec-AuthState.request 7.8.3 Sec-AuthState.confirm <\/td>\n<\/tr>\n | ||||||
233<\/td>\n | 8 Adaptor layer: interfaces and data types 8.1 General <\/td>\n<\/tr>\n | ||||||
234<\/td>\n | 8.2 Data types 8.2.1 General 8.2.2 Iso21177AdaptorLayerPDU <\/td>\n<\/tr>\n | ||||||
235<\/td>\n | 8.2.3 Apdu 8.2.4 AccessControl 8.2.5 TlsClientMsg1 8.2.6 TlsServerMsg1 8.3 App-AL Interface 8.3.1 App-AL-Data.request <\/td>\n<\/tr>\n | ||||||
236<\/td>\n | 8.3.2 App-AL-Data.confirm 8.3.3 App-AL-Data.indication <\/td>\n<\/tr>\n | ||||||
237<\/td>\n | 8.3.4 App-AL-EnableProxy.request <\/td>\n<\/tr>\n | ||||||
239<\/td>\n | 8.4 Sec-AL Interface 8.4.1 Sec-AL-AccessControl.request 8.4.2 Sec-AL-AccessControl.confirm 8.4.3 Sec-AL-AccessControl.indication <\/td>\n<\/tr>\n | ||||||
240<\/td>\n | 8.4.4 Sec-AL-EndSession.request 8.4.5 Sec-AL-EndSession.confirm 9 Secure session Services 9.1 General 9.2 App-Sess interfaces 9.2.1 App-Sess-EnableProxy.request <\/td>\n<\/tr>\n | ||||||
241<\/td>\n | 9.3 Sec-Sess interface 9.3.1 Sec-Sess-Configure.request <\/td>\n<\/tr>\n | ||||||
243<\/td>\n | 9.3.2 Sec-Sess-Configure.confirm 9.3.3 Sec-Sess-Start.indication <\/td>\n<\/tr>\n | ||||||
244<\/td>\n | 9.3.4 Sec-Sess-EndSession.indication 9.3.5 Sec-Sess-Deactivate.request <\/td>\n<\/tr>\n | ||||||
245<\/td>\n | 9.3.6 Sec-Sess-Deactivate.confirm 9.4 AL-Sess interface 9.4.1 AL-Sess-Data.request 9.4.2 AL-Sess-Data.confirm <\/td>\n<\/tr>\n | ||||||
246<\/td>\n | 9.4.3 AL-Sess-Data.indication 9.4.4 AL-Sess-EndSession.request 9.4.5 AL-Sess-EndSession.confirm <\/td>\n<\/tr>\n | ||||||
247<\/td>\n | 9.4.6 AL-Sess-ClientHelloProxy.request 9.4.7 AL-Sess-ClientHelloProxy.indication <\/td>\n<\/tr>\n | ||||||
248<\/td>\n | 9.4.8 AL-Sess-ServerHelloProxy.request 9.4.9 AL-Sess-ServerHelloProxy.indication <\/td>\n<\/tr>\n | ||||||
249<\/td>\n | 9.5 Permitted mechanisms 9.5.1 TLS 1.3 <\/td>\n<\/tr>\n | ||||||
250<\/td>\n | 9.5.2 DTLS 1.3 <\/td>\n<\/tr>\n | ||||||
251<\/td>\n | Annex A (informative) Usage scenarios <\/td>\n<\/tr>\n | ||||||
259<\/td>\n | Annex B (normative) ASN.1 module <\/td>\n<\/tr>\n | ||||||
260<\/td>\n | Annex C (normative) Session extension PDU functional type <\/td>\n<\/tr>\n | ||||||
261<\/td>\n | Annex D (normative) Owner authorization <\/td>\n<\/tr>\n | ||||||
265<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Intelligent transport systems. ITS station security services for secure session establishment and authentication between trusted devices<\/b><\/p>\n |