Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative.
This standard is developed in accordance with the rules given in GB/T 1.1-2009.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. The issuing body of this document shall not be held responsible for identifying any or all such patent rights.
This standard was proposed by and is under the jurisdiction of China Communications Standards Association.
General technical requirements of security for vehicular communication based on LTE
1 Scope
This standard specifies the general technical requirements, interface security requirements and security procedure of security for vehicular communication based on LTE.
It is applicable to vehicular communication system based on LTE.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced documents (including any amendments) applies.
GB/T 37376-2019 Transportation - Digital certificate format
GB/T 37374-2019 Intelligent transport - Digital certificate application interface
3GPP TS 33.246 3G security; Security of multimedia broadcast / multicast service (MBMS)
IEEE Std 1363 IEEE standard specifications for public-key cryptography
IEEE Std 1363a IEEE standard specifications for public-key cryptography - Amendment 1: Additional techniques
IEEE Std 1609.2-2016 IEEE standard for wireless access in vehicular environments (WAVE) - Security services for applications and management messages
IETF RFC 5639 Elliptic curve cryptography (ECC) brainpool standard curves and curve generation
FIPS-197 Advanced encryption standard
FIPS PUB 180 Secure hash standard
FIPS PUB 186-4 Digital signature standard
GM/T 0002 SM4 block cipher algorithm
GM/T 0003 Public key cryptographic algorithm SM2 based on elliptic curves
GM/T 0004 SM3 cryptographic hash algorithm
GM/T 0015 Digital certificate format based on SM2 algorithm
NIST SP 800-38C Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality
NIST SP 800-56A Recommendation for pair-wise key establishment
3 Abbreviations
For the purposes of this document, the following abbreviations apply.
BM-SC Broadcast-Multicast Service Centre
BSF Bootstrapping Server Function
CA Certificate Authority
E-UTRAN Evolved UTRAN
GCSAS Group Communication System Application Server
LTE Long Term Evolution
MBMS Multimedia Broadcast/Multicast Service
NAF Network Application Function
PLMN Public Land Mobile Network
USS User Security Setting
V2I Vehicle to Infrastructure
V2N Vehicle to Network
V2P Vehicle to Pedestrian
V2V Vehicle to Vehicle
4 Vehicular communication architecture based on LTE
4.1 General
The vehicular communication architecture based on LTE system supports V2V application, V2I application, V2N application and V2P application, which can be used to provide users with various services such as road safety, traffic efficiency improvement and infotainment.
V2X communication is provided with two operation modes: PC5-based V2X communication and LTE-Uu-based V2X communication.
Wherein, the latter may be unicast or broadcast. The V2X equipment may receive and send messages using the two operation modes respectively. Example: a V2X equipment may receive V2X messages using downlink broadcast of LTE-Uu, but send V2X messages without using LTE-Uu. A V2X equipment may also receive V2X messages via LTE-Uu downlink unicast.
The V2X communication is based on PC5 reuses one-to-many ProSe for direct communication transmission procedure. The PC5-U protocol stack as defined in proximity communication is used for the V2X communication transmission based on PC5 interface.
The general technical requirements of security for V2X communication based on PC5 and LTE-Uu are prepared in this standard.
4.2 V2X communication architecture based on PC5 and LTE-Uu
4.2.1 V2X communication architecture based on PC5 and LTE-Uu in non-roaming scenarios
Figure 1 shows the V2X communication architecture based on PC5 and LTE-Uu in non-roaming scenarios.
Figure 1 V2X communication architecture based on PC5 and LTE-Uu in non-roaming scenarios
4.2.2 V2X communication architecture based on PC5 and LTE-Uu in roaming scenarios
Figure 2 shows the V2X architecture based on PC5 and LTE-Uu in roaming scenarios, V2X equipment A home PLMNA, V2X equipment B home PLMNB, V2X equipment A roaming to PLMNB, and V2X equipment B non-roaming.
The V2X application server may be connected to multiple PLMNs. Example: a V2X application server may be connected to V2X control function entities in PLMN A or those in PLMN B.
Figure 1 V2X communication architecture based on PC5 and LTE-Uu in roaming scenarios
4.2.3 V2X communication architecture based on PC5 and LTE-Uu in cross-PLMN scenarios
Figure 3 shows the V2X architecture based on PC5 and LTE-Uu in cross-PLMN roaming scenarios, V2X equipment A home PLMN A, V2X equipment B home PLMN B, V2X equipment A roaming to PLMN C, and V2X equipment B non-roaming.
Figure 3 V2X architecture based on PC5 and LTE-Uu in cross-PLMN scenarios
4.2.4 Reference point
Reference points of V2X communication architecture based on PC5 and LTE-Uu contain:
——V1: the reference point between the V2X application (in the V2X equipment) and the V2X application server.
——V2: the reference point between the V2X application server and V2X control function. The V2X application server may be connected to multiple V2X control functions belonging to PLMN.
——V3: the reference point between the V2X equipment and the V2X control function in home PLMN. It is applicable to V2X communication based on PC5 and LTE-Uu; the V2X communication based on LTE-Uu may support MBMS optionally.
——V4: the reference point between the HSS and the V2X control function in the operator's network.
——V5: the reference point between the V2X applications of different V2X equipment.
——V6: the reference point between the V2X control functions in different PLMNs.
——PC5: the reference point for ProSe direct communication in user plane between the V2X equipment using V2X service.
——S6a: in the V2X scenario, MME can download subscription information related to V2X communication during E-UTRAN attach procedure or to inform the subscription information in the HSS to MME when the information is changed.
——S1-MME: in the V2X scenario, the reference point is used to send the V2X service authorization from MME to eNodeB.
——LTE-Uu: the reference point between the UE and the E-UTRAN.
4.3 V2X communication architecture based on MBMS and LTE-Uu
Figure 4 shows the V2X communication architecture based on MBMS and LTE-Uu.
Figure 4 V2X architecture based on MBMS and LTE-Uu
The reference points of this architecture are as follows:
——MB2: the reference point between V2X application server and BM-SC.
——SGmb/SGi-mb/M1/M3: the SGmb/SGi-mb/M1/M3 reference points in the MBMS system.
4.4 Vehicular communication security architecture based on LTE
4.4.1 Vehicular communication security protocol architecture based on LTE
The vehicular communication security based on LTE contains bearing security (PC5 security or LTE-UU security) and V2X application security. Figure 5 shows the V2X security architecture based on PC5, and Figure 6 shows the V2X security architecture based on LTE-UU.
Foreword i 1 Scope 2 Normative references 3 Abbreviations 4 Vehicular communication architecture based on LTE 4.1 General 4.2 V2X communication architecture based on PC5 and LTE-Uu 4.3 V2X communication architecture based on MBMS and LTE-Uu 4.4 Vehicular communication security architecture based on LTE 5 Requirements of security for vehicular communication based on LTE 5.1 General security requirements 5.2 Security requirements of network elements 6 Security procedure of V5 interface 6.1 General 6.2 Description of basic security elements 6.3 General requirements for security data structure 6.4 Public key certificate format 6.5 Message signature process 6.6 Message encryption process 6.7 Key agreement 7 Other interface security procedures 7.1 V2X communication security procedure between network elements 7.2 Security procedure of V3 interface 7.3 Security procedure of MB2 interface Annex A (Normative) Algorithm description Annex C (Informative) Public key certificate management Annex D (Informative) V5 interface data message Annex E (Informative) Key agreement calculation process Annex F (Informative) Certificate request and response Annex G (Informative) Allocation suggestions on security-related AID value
基于LTE的车联网通信安全技术要求 1 范围 本标准规定了基于LTE的车联网通信安全的总体技术要求、接口安全要求和安全过程。 本标准适用于基于LTE的车联网通信系统。 2 规范性引用文件 下列文件对于本文件的应用是必不可少的。凡是注日期的引用文件,仅注日期的版本适用于本文件。凡是不注日期的引用文件,其最新版本(包括所有的修改单)适用于本文件。 GB/T 37376-2019 交通运输 数字证书格式 GB/T 37374-2019 智能交通 数字证书应用接口规范 3GPP TS 33.210 3G安全;网络域安全;IP网络层安全(3G security;Network Domain Security(NDS);IP network layer security) 3GPP TS 33.223 通用认证架构;通用引导架构推送功能(Generic Authentication Architecture(GAA);Generic Bootstrapping Architecture(GBA)Push function) 3GPP TS 33.246 3G 安全;多媒体广播/多播业务(3G Security;Security of Multimedia Broadcast/Multicast Service(MBMS)) IEEE Std 1363 IEEE公钥加密标准规范(IEEE Standard Specifications for Public-Key Cryptography) IEEE Std 1363a IEEE公钥加密标准规范-修正1:附加技术(IEEE Standard Specifications for Public-Key Cryptography—Amendment 1:Additional Techniques) IEEE Std 1609.2-2016 IEEE车载环境无线接入标准 应用和管理消息的安全服务(IEEE Standard for Wireless Access in Vehicular Environments(WAVE)—Security Services for Applications and Management Messages) IETF RFC 5639 椭圆曲线密码(ECC)Brainpool标准曲线和曲线生成(Elliptic Curve Cryptography(ECC)Brainpool Standard Curves and Curve Generation) FIPS-197 先进的加密标准(ADVANCED ENCRYPTION STANDARD) FIPS PUB 180 安全散列标准(SECURE HASH STANDARD) FIPS PUB 186-4 数字签名标准(Digital Signature Standard) GM/T 0002 SM4分组密码算法 GM/T 0003 SM2椭圆曲线公钥密码算法 GM/T 0004 SM3密码杂凑算法 GM/T 0015 基于SM2密码学算法的数字证书格式规范 NIST SP 800-38C 分组密码操作模式的建议:用于认证和机密性的CCM模式(Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality) NIST SP 800-56A 建立成对密钥的建议(RECOMMENDATION FOR PAIR-WISE KEY ESTABLISHMENT) 3 缩略语 下列缩略语适用于本文件。 BM-SC Broadcast-Multicast Service Centre 广播多播服务中心 BSF Bootstrapping Server Function 引导服务器功能 CA Certificate Authority 证书管理机构 E-UTRAN Evolved UTRAN 演进UTRAN GCSAS Group Communication System Application Server 组通信系统应用服务器 LTE Long Term Evolution 长期演进 MBMS Multimedia Broadcast/Multicast Service 多媒体广播多播业务 NAF Network Application Function 网络应用功能 PLMN Public Land Mobile Network 公众陆地移动网 USS User Security Setting 用户安全设置 V2I Vehicle to Infrastructure 车-路 V2N Vehicle to Network 车-网 V2P Vehicle to Pedestrian 车-人 V2V Vehicle to Vehicle 车-车 4 基于LTE的车联网通信架构 4.1 概述 基于LTE的车联网通信系统支持车-车(V2V)应用、车-路(V2I)应用、车-网(V2N)应用和车-人(V2P)应用,利用这些应用可向用户提供诸如道路安全、交通效率提升和信息娱乐等各类业务。 V2X通信有两种操作模式,基于PC5的V2X通信和基于LTE-Uu的V2X通信。 基于LTE-Uu的操作模式可以是单播或广播方式。V2X设备可以分别使用这两种操作模式进行接收和发送。例如:一个V2X设备可以使用LTE-Uu的下行广播接收V2X消息,但发送V2X消息不使用LTE-Uu。一个V2X设备也可以通过LTE-Uu下行单播来接收V2X消息。 基于PC5的V2X通信重用一对多的ProSe直接通信传输过程,邻近通信中定义的PC5-U协议栈用于基于PC5接口的V2X通信传输。 本标准针对基于PC5的V2X通信和基于LTE-Uu的V2X通信制定安全总体技术要求。 4.2 基于PC5和LTE-Uu的V2X通信架构 4.2.1 非漫游场景下基于PC5和LTE-Uu的V2X通信架构 图1给出了非漫游场景下基于PC5和LTE-Uu的V2X通信架构。