Codeofchina.com is in charge of this English translation. In case of any doubt about the English translation, the Chinese original shall be considered authoritative.
This standard is developed in accordance with the rules given in GB/T 1.1-2009.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. The issuing body of this document shall not be held responsible for identifying any or all such patent rights.
This standard was proposed by and is under the jurisdiction of China Communications Standards Association.
General technical requirements of security for vehicular communication based on LTE
1 Scope
This standard specifies the general technical requirements, interface security requirements and security procedure of security for vehicular communication based on LTE.
It is applicable to vehicular communication system based on LTE.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced documents (including any amendments) applies.
GB/T 37376-2019 Transportation - Digital certificate format
GB/T 37374-2019 Intelligent transport - Digital certificate application interface
3GPP TS 33.210 3G security; Network domain security (NDS); IP network layer security
3GPP TS 33.223 Generic authentication architecture (GAA); Generic bootstrapping architecture (GBA) push function
3GPP TS 33.246 3G security; Security of multimedia broadcast / multicast service (MBMS)
IEEE Std 1363 IEEE standard specifications for public-key cryptography
IEEE Std 1363a IEEE standard specifications for public-key cryptography - Amendment 1: Additional techniques
IEEE Std 1609.2-2016 IEEE standard for wireless access in vehicular environments (WAVE) - Security services for applications and management messages
IETF RFC 5639 Elliptic curve cryptography (ECC) brainpool standard curves and curve generation
FIPS-197 Advanced encryption standard
FIPS PUB 180 Secure hash standard
FIPS PUB 186-4 Digital signature standard
GM/T 0002 SM4 block cipher algorithm
GM/T 0003 Public key cryptographic algorithm SM2 based on elliptic curves
GM/T 0004 SM3 cryptographic hash algorithm
GM/T 0015 Digital certificate format based on SM2 algorithm
NIST SP 800-38C Recommendation for block cipher modes of operation: the CCM mode for authentication and confidentiality
NIST SP 800-56A Recommendation for pair-wise key establishment
3 Abbreviations
For the purposes of this document, the following abbreviations apply.
BM-SC Broadcast-Multicast Service Centre
BSF Bootstrapping Server Function
CA Certificate Authority
E-UTRAN Evolved UTRAN
GCSAS Group Communication System Application Server
LTE Long Term Evolution
MBMS Multimedia Broadcast/Multicast Service
NAF Network Application Function
PLMN Public Land Mobile Network
USS User Security Setting
V2I Vehicle to Infrastructure
V2N Vehicle to Network
V2P Vehicle to Pedestrian
V2V Vehicle to Vehicle
4 Vehicular communication architecture based on LTE
4.1 General
The vehicular communication architecture based on LTE system supports V2V application, V2I application, V2N application and V2P application, which can be used to provide users with various services such as road safety, traffic efficiency improvement and infotainment.
V2X communication is provided with two operation modes: PC5-based V2X communication and LTE-Uu-based V2X communication.
Wherein, the latter may be unicast or broadcast. The V2X equipment may receive and send messages using the two operation modes respectively. Example: a V2X equipment may receive V2X messages using downlink broadcast of LTE-Uu, but send V2X messages without using LTE-Uu. A V2X equipment may also receive V2X messages via LTE-Uu downlink unicast.
The V2X communication is based on PC5 reuses one-to-many ProSe for direct communication transmission procedure. The PC5-U protocol stack as defined in proximity communication is used for the V2X communication transmission based on PC5 interface.
The general technical requirements of security for V2X communication based on PC5 and LTE-Uu are prepared in this standard.
4.2 V2X communication architecture based on PC5 and LTE-Uu
4.2.1 V2X communication architecture based on PC5 and LTE-Uu in non-roaming scenarios
Figure 1 shows the V2X communication architecture based on PC5 and LTE-Uu in non-roaming scenarios.
Figure 1 V2X communication architecture based on PC5 and LTE-Uu in non-roaming scenarios
4.2.2 V2X communication architecture based on PC5 and LTE-Uu in roaming scenarios
Figure 2 shows the V2X architecture based on PC5 and LTE-Uu in roaming scenarios, V2X equipment A home PLMNA, V2X equipment B home PLMNB, V2X equipment A roaming to PLMNB, and V2X equipment B non-roaming.
The V2X application server may be connected to multiple PLMNs. Example: a V2X application server may be connected to V2X control function entities in PLMN A or those in PLMN B.
Figure 1 V2X communication architecture based on PC5 and LTE-Uu in roaming scenarios
4.2.3 V2X communication architecture based on PC5 and LTE-Uu in cross-PLMN scenarios
Figure 3 shows the V2X architecture based on PC5 and LTE-Uu in cross-PLMN roaming scenarios, V2X equipment A home PLMN A, V2X equipment B home PLMN B, V2X equipment A roaming to PLMN C, and V2X equipment B non-roaming.
Figure 3 V2X architecture based on PC5 and LTE-Uu in cross-PLMN scenarios
4.2.4 Reference point
Reference points of V2X communication architecture based on PC5 and LTE-Uu contain:
——V1: the reference point between the V2X application (in the V2X equipment) and the V2X application server.
——V2: the reference point between the V2X application server and V2X control function. The V2X application server may be connected to multiple V2X control functions belonging to PLMN.
——V3: the reference point between the V2X equipment and the V2X control function in home PLMN. It is applicable to V2X communication based on PC5 and LTE-Uu; the V2X communication based on LTE-Uu may support MBMS optionally.
——V4: the reference point between the HSS and the V2X control function in the operator's network.
——V5: the reference point between the V2X applications of different V2X equipment.
——V6: the reference point between the V2X control functions in different PLMNs.
——PC5: the reference point for ProSe direct communication in user plane between the V2X equipment using V2X service.
——S6a: in the V2X scenario, MME can download subscription information related to V2X communication during E-UTRAN attach procedure or to inform the subscription information in the HSS to MME when the information is changed.
——S1-MME: in the V2X scenario, the reference point is used to send the V2X service authorization from MME to eNodeB.
——LTE-Uu: the reference point between the UE and the E-UTRAN.
4.3 V2X communication architecture based on MBMS and LTE-Uu
Figure 4 shows the V2X communication architecture based on MBMS and LTE-Uu.
Figure 4 V2X architecture based on MBMS and LTE-Uu
The reference points of this architecture are as follows:
——MB2: the reference point between V2X application server and BM-SC.
——SGmb/SGi-mb/M1/M3: the SGmb/SGi-mb/M1/M3 reference points in the MBMS system.
4.4 Vehicular communication security architecture based on LTE
4.4.1 Vehicular communication security protocol architecture based on LTE
The vehicular communication security based on LTE contains bearing security (PC5 security or LTE-UU security) and V2X application security. Figure 5 shows the V2X security architecture based on PC5, and Figure 6 shows the V2X security architecture based on LTE-UU.
Foreword i
1 Scope
2 Normative references
3 Abbreviations
4 Vehicular communication architecture based on LTE
4.1 General
4.2 V2X communication architecture based on PC5 and LTE-Uu
4.3 V2X communication architecture based on MBMS and LTE-Uu
4.4 Vehicular communication security architecture based on LTE
5 Requirements of security for vehicular communication based on LTE
5.1 General security requirements
5.2 Security requirements of network elements
6 Security procedure of V5 interface
6.1 General
6.2 Description of basic security elements
6.3 General requirements for security data structure
6.4 Public key certificate format
6.5 Message signature process
6.6 Message encryption process
6.7 Key agreement
7 Other interface security procedures
7.1 V2X communication security procedure between network elements
7.2 Security procedure of V3 interface
7.3 Security procedure of MB2 interface
Annex A (Normative) Algorithm description
Annex C (Informative) Public key certificate management
Annex D (Informative) V5 interface data message
Annex E (Informative) Key agreement calculation process
Annex F (Informative) Certificate request and response
Annex G (Informative) Allocation suggestions on security-related AID value
基于LTE的车联网通信安全技术要求
1 范围
本标准规定了基于LTE的车联网通信安全的总体技术要求、接口安全要求和安全过程。
本标准适用于基于LTE的车联网通信系统。
2 规范性引用文件
下列文件对于本文件的应用是必不可少的。凡是注日期的引用文件,仅注日期的版本适用于本文件。凡是不注日期的引用文件,其最新版本(包括所有的修改单)适用于本文件。
GB/T 37376-2019 交通运输 数字证书格式
GB/T 37374-2019 智能交通 数字证书应用接口规范
3GPP TS 33.210 3G安全;网络域安全;IP网络层安全(3G security;Network Domain Security(NDS);IP network layer security)
3GPP TS 33.223 通用认证架构;通用引导架构推送功能(Generic Authentication Architecture(GAA);Generic Bootstrapping Architecture(GBA)Push function)
3GPP TS 33.246 3G 安全;多媒体广播/多播业务(3G Security;Security of Multimedia Broadcast/Multicast Service(MBMS))
IEEE Std 1363 IEEE公钥加密标准规范(IEEE Standard Specifications for Public-Key Cryptography)
IEEE Std 1363a IEEE公钥加密标准规范-修正1:附加技术(IEEE Standard Specifications for Public-Key Cryptography—Amendment 1:Additional Techniques)
IEEE Std 1609.2-2016 IEEE车载环境无线接入标准 应用和管理消息的安全服务(IEEE Standard for Wireless Access in Vehicular Environments(WAVE)—Security Services for Applications and Management Messages)
IETF RFC 5639 椭圆曲线密码(ECC)Brainpool标准曲线和曲线生成(Elliptic Curve Cryptography(ECC)Brainpool Standard Curves and Curve Generation)
FIPS-197 先进的加密标准(ADVANCED ENCRYPTION STANDARD)
FIPS PUB 180 安全散列标准(SECURE HASH STANDARD)
FIPS PUB 186-4 数字签名标准(Digital Signature Standard)
GM/T 0002 SM4分组密码算法
GM/T 0003 SM2椭圆曲线公钥密码算法
GM/T 0004 SM3密码杂凑算法
GM/T 0015 基于SM2密码学算法的数字证书格式规范
NIST SP 800-38C 分组密码操作模式的建议:用于认证和机密性的CCM模式(Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality)
NIST SP 800-56A 建立成对密钥的建议(RECOMMENDATION FOR PAIR-WISE KEY ESTABLISHMENT)
3 缩略语
下列缩略语适用于本文件。
BM-SC Broadcast-Multicast Service Centre 广播多播服务中心
BSF Bootstrapping Server Function 引导服务器功能
CA Certificate Authority 证书管理机构
E-UTRAN Evolved UTRAN 演进UTRAN
GCSAS Group Communication System Application Server 组通信系统应用服务器
LTE Long Term Evolution 长期演进
MBMS Multimedia Broadcast/Multicast Service 多媒体广播多播业务
NAF Network Application Function 网络应用功能
PLMN Public Land Mobile Network 公众陆地移动网
USS User Security Setting 用户安全设置
V2I Vehicle to Infrastructure 车-路
V2N Vehicle to Network 车-网
V2P Vehicle to Pedestrian 车-人
V2V Vehicle to Vehicle 车-车
4 基于LTE的车联网通信架构
4.1 概述
基于LTE的车联网通信系统支持车-车(V2V)应用、车-路(V2I)应用、车-网(V2N)应用和车-人(V2P)应用,利用这些应用可向用户提供诸如道路安全、交通效率提升和信息娱乐等各类业务。
V2X通信有两种操作模式,基于PC5的V2X通信和基于LTE-Uu的V2X通信。
基于LTE-Uu的操作模式可以是单播或广播方式。V2X设备可以分别使用这两种操作模式进行接收和发送。例如:一个V2X设备可以使用LTE-Uu的下行广播接收V2X消息,但发送V2X消息不使用LTE-Uu。一个V2X设备也可以通过LTE-Uu下行单播来接收V2X消息。
基于PC5的V2X通信重用一对多的ProSe直接通信传输过程,邻近通信中定义的PC5-U协议栈用于基于PC5接口的V2X通信传输。
本标准针对基于PC5的V2X通信和基于LTE-Uu的V2X通信制定安全总体技术要求。
4.2 基于PC5和LTE-Uu的V2X通信架构
4.2.1 非漫游场景下基于PC5和LTE-Uu的V2X通信架构
图1给出了非漫游场景下基于PC5和LTE-Uu的V2X通信架构。
V2AX应用服务器
V2X控制功能
V2X设备C(pedestrian)
V2X应用
V2X设备D(stationary)
V2X设备B(Vehicle)
V2X设备A(Vehicle)
图1 非漫游场景下基于PC5和LTE-Uu的V2X通信架构
4.2.2 漫游场景下基于PC5和LTE-Uu的V2X通信架构
图2给出漫游场景下基于PC5和LTE-Uu的V2X架构,V2X设备A归属PLMNA,V2X设备B归属PLMNB,V2X设备A漫游至PLMNB,V2X设备B非漫游。
V2X应用服务器也可以连接多个PLMN,例如一个V2X应用服务器可以连接PLMNA中的V2X控制功能实体,也可以连接PLMNB中V2X控制功能实体。
V2X应用服务器
V2X控制功能(PLMN A)
V2X控制功能(PLMN B)
V2X应用
V2X设备B
V2X设备A
图1 漫游场景下基于PC5和LTE-Uu的V2X通信架构
4.2.3 跨PLMN场景下基于PC5和LTE-Uu的V2X通信架构
图3给出跨PLMN漫游场景下基于PC5和LTE-Uu的V2X架构,V2X设备A归属PLMNA,V2X设备B归属PLMN B,V2X设备A漫游至PLMNC,V2X设备B非漫游。