Security
Introduction
The increasing complexity and rapid development of new systems present a real challenge for securing ICT systems.
Today ETSI's standardization activities cover a broad spectrum of security issues, from lawful interception (LI) to algorithms, from electronic signatures to smart cards, and they relate to every aspect of ICT. In addition, ETSI is working towards the establishment of effective telecommunications systems to protect citizens in an emergency and on security issues in Next Generation Networks, Machine to Machine, Intelligent Transport Systems and Quantum Cryptography among others.
A Security White Paper is available free of charge, outlining all of the Security work being carried out by ETSI.
ETSI Security Workshops
Each year ETSI brings together Security Standards experts. The event traditionnally takes place in January.
Speakers are selected from a call for contributions, which is announced at http://www.etsi.org/events. The 7th edition took place on 18-19 January 2012 in Sophia Antipolis, France. Details of the 2013 event will be provided in the course of the summer. Please visit http://www.etsi.org/SECURITYWORKSHOP.
In the first 7 editions of the ETSI Security Workshop speakers from ETSI Member companies, as well as the European Commission, ISO, IEC, ITU, ENISA, CEN & CENELEC addressed the workshop (look at the past event section for more details and access to presentations given).
Our Role & Activities
A white paper is available free of charge, outlining all of the Security work being carried out by ETSI.
GSMâ„¢
Security has been a major driver for the success of GSM. Specifications have been developed to prevent terminal equipment theft, to allow encryption and authentication, to control payment for copyright material downloading and to respond to many other security threats. The general description of the security functions can be found in ETSI TS 143 020 (3GPPâ„¢ TS 43.020).
UMTSâ„¢
The Third Generation Partnership Project (3GPPâ„¢) is also responsible for the maintenance and evolution of the specifications for GSM, and for transitional technologies such as GPRS and EDGE.
The UMTSâ„¢ security specifications developed in 3GPPâ„¢ build on the mechanisms used in GSM. In addition, they offer numerous security enhancements, including : Authentication, Public Safety, Location services, Cell broadcast services, IP Multimedia Subsystem (IMS) and Selective disabling of user equipment.
TETRA
ETSI technical committee TETRA is responsible for producing specifications for TErrestrial Trunked RAdio (TETRA), designed for Private Mobile Radio (PMR) and Public Access Mobile Radio (PAMR) markets. ETSI TETRA Working Group 6 is dedicated to Security.
DECTâ„¢
DECTâ„¢ (Digital Enhanced Cordless Telecommunications) is a flexible digital radio access standard for cordless communications in residential, corporate and public environments.
Among other achievements for DECTâ„¢, ETSI has developed the DECTâ„¢ Standard Authentication Algorithm (DSAA) and the DECTâ„¢ Standard Cipher (DSC).
The combination of TDMA/TDD digital radio technology and dynamic channel selection with additional encryption techniques, authentication and identification procedures makes DECTâ„¢ radio transmissions extremely secure against unauthorized radio eavesdropping by third parties.
For an overview of the security features in DECTâ„¢ see ETSI EN 300 175-7 'DECT; Common Interface: Security features'.
Lawful Interception
ETSI technical committee Lawful Interception (LI ) covers the whole spectrum of interception aspects, from a logical overview of the entire architecture and the generic intercepted data flow, to the service-specific details for e-mail and Internet, and the requirements for law enforcement agencies.
Specifications for the handover procedure: TS 101 671 and ES 201 671 illustrate the flow that the intercepted data should follow in telecommunication networks or services.
LI is also addressing Retained Data. European governments are becoming increasingly interested in preserving communications. The European Parliament's civil liberties committee recently voted in favour of new rules, whereby details on telephone calls and Internet use would be kept for six to 12 months. LI is producing documents on Retaining Data for Enforcement Authorities and for the Retained Data Handover Interface.
Electronic Signatures
ETSI standards for electronic signatures are currently being developed in technical committee Electronic Signatures and Infrastructures (ESI).
Next Generation Networks
ETSI technical committee TISPAN is collaborating closely with 3GPPâ„¢, with the aim of reusing 3GPPâ„¢ security mechanisms on IP Multimedia Subsystem (IMS). In particular, TISPAN is standardizing the security for the fixed network part of NGN and identifying gaps and requirements to extend or modify 3GPPâ„¢ security specifications for its purpose. TISPAN is also looking into the possibility of standardizing new NGN-specific security components where necessary.
TISPAN set the security requirements for the subsystems of Next Generation Networks ETSI TS 187 001 'NGN SECurity; Requirements'.
TISPAN is producing a Security Design Guides and a review of Review of activity on security (ETSI ES 202 382, ES 202 383, EG 202 387, TR 102 420).
Algorithms
ETSI Security Algorithms Group of Experts (SAGE) provides the Institute's standards makers with cryptographic algorithms and protocols specific to fraud prevention, unauthorized access to public and private telecommunications networks and user data privacy.
EMTEL
ETSI Special Committee on Emergency Communications (EMTEL) is the focal point in ETSI for the co-ordination and collection of requirements for emergency service communication. The committee's scope includes issues related to user needs, network architectures, network resilience, contingency planning, priority communications, priority access technologies and network management, national security and Public Protection and Disaster Relief (PPDR).
Other deliverables published by EMTEL address the European regulations covering communication during emergency situations, suitability of SMS and CBS (Cell Broadcast Service) for Emergency Messaging, and requirements for emergency communications network resiliency.
MESA
Project MESA (Mobility for Emergency and Safety Applications) is a transatlantic partnership project, established in 2000. Its aim is to define a digital mobile broadband system which will revolutionize the efficiency of first responders and rescue squads during an emergency or a disaster. At these times security requirements as well as advanced [mobile] service requirements, reach far beyond the scope of current established wireless standards.
Project MESA has adopted a 'System of Systems' approach, which involves linking together a variety of existing and foreseen technologies and systems. The key factor is interoperability.
Smart Cards
The main task of ETSI technical committee Card Platform (TC SCP) is to maintain and expand the smart card platform specifications for 2G and 3G mobile communication systems on which other committees and organizations can base their system-specific applications.
Currently the committee is focusing on creating a USB-based High Speed Protocol for the UICC, as well as producing specifications for contactless smart cards.
Radio Frequency Identification (RFID)
Security in RFID technology must prevent illicit tracking and cloning of tags. In addition, RFID tags present a rather low limit of computational resources within the tag, which makes the use of standard cryptographic techniques unfeasible. Lighter encryption algorithms must be created for the RFID tags.
ETSI has recently established a Task Group (ERM TG34) to produce deliverables for future RFID technologies and products. Two specifications have already been published:
ETSI EN 302 208-1 - Radio Frequency Identification Equipment operating in the band 865 MHz to 868 MHz with power levels up to 2 W; Technical requirements and methods of measurement Product Standard for 2 W RFID at UHF
ETSI EN 302 208-2 Radio Frequency Identification Equipment operating in the band 865 MHz to 868 MHz with power levels up to 2 W; Harmonized EN under article 3.2 of the R&TTE Directive Product Standard for 2 W RFID at UHF.
There is also a technical report - TR 102 436 - giving guidelines for the installation and commissioning of RFID equipment at UHF.
Broadcasting
Joint Technical Committee Broadcast is defining specific security features.
Some Achievements:
- DVB Common Scrambling Algorithm - ETSI is the Custodian for the Common Scrambling Algorithm.
- TV-Anytime is a set of specifications for the controlled delivery of multimedia content to a user's personal device (Personal Video Recorder). ETSI standards for TV-Anytime are being developed in JTC Broadcast, based on proposals from the TV-Anytime Forum. Phase 2 specifications have now also been published by ETSI.
- Current work involves security issues regarding satellite distribution systems, with the intention of protecting the user identity in terms of location, signalling and data traffic to prevent unauthorized use of the network.
Satellite
ETSI technical committee Satellite Earth Stations and Systems (SES) has produced specifications on network security for broadband satellite multimedia services.
In addition, the committee's working group on geo-mobile radio interfaces, which is responsible for standards on radio interfaces for geostationary earth orbit satellite access to the core network of GSM, has undertaken work on the security of the interface and the services delivered through it.
SES is working on new specifications on network security in the area of broadband satellite multimedia services.
IPCablecomâ„¢
ETSI has set standards defining the protocols and functional requirements for Internet Protocol Cable Communications (IP Cablecom) - including a security specification for the technology:
ETSI TS 101 909-11 'Digital Broadband Cable Access to the Public Telecommunications Network; IP Multimedia Time Critical Services; Part 11: Security', covering security for IPCablecom, identifying security risks and specifying mechanisms to secure the architecture.
Proofing Products Against Crime
Proofing products against crime describes the act of integrating or embedding protective features into products in order to reduce their potential to become targets of criminal activity or preventing their use as instruments of crime.
ETSI is reacting to the European Commission Mandate M/355 'Programming mandate addressed to the ESOs for the elaboration of European Standards to identify and reduce crime risk in products and services', which requests concrete action from the European Standards Organizations (ESOs) on Proofing Products Against Crime.
A White Paper on Proofing Products Against Crime, giving guidance to Standards Groups working in Telecommunications and IT has been published and is available free of charge.
A White Paper is available free of charge, outlining all of the Security work being carried out by ETSI, and including a list of Security related standards.
Standards
Please use the ETSI Work Programme to find related standards. As an example, by selecting the Technical Body of interest (towards the bottom of the page), e.g. ESI, LI, etc., and then by clicking on 'Search', the list of requested standards will be provided. The usage of other options would enhance or refine your search. All standards are downloadable individually, free-of-charge.
Standard No.
Standard title.
TS 103 172
Electronic Signatures and Infrastructures (ESI); PAdES Baseline Profile
TS 103 115
Smart Cards; Test specification for UICC Application Programming Interface for Java Card™ for Contactless Applications; Test Environment and Annexes; (Release 9)
TS 102 230
Smart Cards; UICC-Terminal interface; Physical, electrical and logical test specification (Release 9)
TS 102 384
Smart Cards; UICC-Terminal interface; Card Application Toolkit (CAT) conformance specification (Release 9)
TS 102 694-1
Smart Cards; Test specification for the Single Wire Protocol (SWP) interface; Part 1: Terminal features (Release 9)
TS 102 694-2
Smart Cards; Test specification for the Single Wire Protocol (SWP) interface; Part 2: UICC features (Release 9)
TS 102 695-1
Smart Cards; Test specification for the Host Controller Interface (HCI); Part 1: Terminal features (Release 9)
TS 102 695-2
Smart Cards; Test specification for the Host Controller Interface (HCI); Part 2: UICC features (Release 9)
TS 102 695-3
Smart Cards; Test specification for the Host Controller Interface (HCI); Part 3: Host Controller features (Release 9)
TS 101 733
Electronic Signatures and Infrastructures (ESI); CMS Advanced Electronic Signatures (CAdES)
TS 103 173
Electronic Signatures and Infrastructures (ESI); CAdES Baseline Profile
SR 003 091
Electronic Signatures and Infrastructures (ESI); Recommendations on Governance and Audit Regime for CAB Forum Extended Validation and Baseline Certificates
TS 103 383
Smart Cards; Embedded UICC; Requirements Specification;
(Release 12)
TS 102 232-1
Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 1: Handover specification for IP delivery
TS 102 232-2
Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 2: Service-specific details for messaging services
TS 102 042
Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates
EN 319 412-5
Electronic Signatures and Infrastructures (ESI); Profiles for Trust Service Providers issuing certificates; Part 5: Extension for Qualified Certificate profile
EN 319 411-2
Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 2: Policy requirements for certification authorities issuing qualified certificates
EN 319 411-3
Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 3: Policy requirements for Certification Authorities issuing public key certificates
EN 319 401
Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures
