Intelligent Transport Systems (ITS); Security; Trust and Privacy Management

RTS/ITS-00524

General Information

Status
Published
Publication Date
16-May-2018
Technical Committee
Current Stage
12 - Completion
Due Date
16-May-2018
Completion Date
17-May-2018
Mandate
Ref Project

Buy Standard

Standard
ETSI TS 102 941 V1.2.1 (2018-05) - Intelligent Transport Systems (ITS); Security; Trust and Privacy Management
English language
71 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

ETSI TS 102 941 V1.2.1 (2018-05)






������������������������
Intelligent Transport Systems (ITS);
Security;
Trust and Privacy Management

---------------------- Page: 1 ----------------------
2 ETSI TS 102 941 V1.2.1 (2018-05)



Reference
RTS/ITS-00524
Keywords
interoperability, ITS, management, security

ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the
print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
and microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.

© ETSI 2018.
All rights reserved.

TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are trademarks of ETSI registered for the benefit of its Members.
TM TM
3GPP and LTE are trademarks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
oneM2M logo is protected for the benefit of its Members.
®
GSM and the GSM logo are trademarks registered and owned by the GSM Association.
ETSI

---------------------- Page: 2 ----------------------
3 ETSI TS 102 941 V1.2.1 (2018-05)
Contents
Intellectual Property Rights . 5�
Foreword . 5�
Modal verbs terminology . 5�
1 Scope . 6�
2 References . 6�
2.1 Normative references . 6�
2.2 Informative references . 7�
3 Definitions, abbreviations and notation . 8�
3.1 Definitions . 8�
3.2 Abbreviations . 8�
3.3 Notation . 9�
4 ITS authority hierarchy . 9�
5 Privacy in ITS . 10�
6 Trust and privacy management . 11�
6.1 ITS-S Security Lifecycle .11�
6.1.1 ITS-S Life-cycle management .11�
6.1.2 Manufacture .12�
6.1.3 Enrolment .12�
6.1.4 Authorization .13�
6.1.5 Maintenance .14�
6.1.6 End of life .14�
6.2 Public Key Infrastructure .14�
6.2.0 General .14�
6.2.0.1 Messages format .14�
6.2.0.2 Signed and encrypted data structures .16�
6.2.1 CA certificate request.17�
6.2.2 Enrolment/Authorization assumption and requirements .20�
6.2.3 Message Sequences .22�
6.2.3.1 Introduction .22�
6.2.3.2 Enrolment Management .23�
6.2.3.2.0 Overview .23�
6.2.3.2.1 Enrolment request .23�
6.2.3.2.2 Enrolment response .26�
6.2.3.3 Authorization Management .27�
6.2.3.3.0 Overview .27�
6.2.3.3.1 Authorization request .28�
6.2.3.3.2 Authorization response .33�
6.2.3.4 Authorization Validation protocol .34�
6.2.3.4.0 Overview .34�
6.2.3.4.1 Authorization validation request .34�
6.2.3.4.2 Authorization validation response .36�
6.3 Generation, distribution and use of Trust information lists .38�
6.3.1 Generation and distribution of CTL by TLM .38�
6.3.2 Generation and distribution of CTL by RCA .39�
6.3.3 Generation and distribution of CRL by RCA .40�
6.3.4 Specification of Full CTL and Delta CTL .40�
6.3.5 Transmission of CTL and CRL .41�
6.3.6 CTL and CRL use by ITS-Ss .41�
7 Security association and key management between ITS Stations . 42�
7.0 Introduction .42�
7.1 Broadcast SAs .42�
7.2 Multicast SAs .42�
ETSI

---------------------- Page: 3 ----------------------
4 ETSI TS 102 941 V1.2.1 (2018-05)
7.3 Unicast SAs .43�
Annex A (normative): ITS security management messages specified in ASN.1 . 45�
A.1 ITS trust and privacy messages specified in ASN.1 . 45�
A.2 Security management messages structures . 45�
A.2.1 Security data structures .45�
A.2.2 Security Management messages for CA .46�
A.2.3 Security Management messages for ITS-S_WithPrivacy .48�
A.2.4 Security Management messages for ITSS_NoPrivacy .49�
A.2.5 Enrolment and authorization data types.51�
A.2.5.1 Enrolment .51�
A.2.5.2 Authorization .52�
A.2.5.3 AuthorizationValidation.53�
A.2.6 Offline message structures .54�
A.2.7 Trust lists data types .54�
Annex B (normative): Service specific parameters (SSPs) definition . 58�
B.1 Overview . 58�
B.2 CTL SSPs definition . 58�
B.3 CRL SSPs definition . 59�
B.4 Certificate request messages SSPs definition . 59�
B.5 Security Management certificate permissions . 60�
Annex C (informative): Communication profiles for security credential provisioning services
(EC request, AT request) . 61�
Annex D (normative): Communication profiles for CTL and CRL . 65�
D.1 CTL request and response protocol . 65�
D.2 CRL request and response protocol . 65�
D.3 Broadcast communication of CTL/CRL . 66�
Annex E (informative): Encryption of a message from a sender to a receiver . 67�
Annex F (informative): Bibliography . 69�
Annex G (informative): Change history . 70�
History . 71�

ETSI

---------------------- Page: 4 ----------------------
5 ETSI TS 102 941 V1.2.1 (2018-05)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (https://ipr.etsi.org/).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
Foreword
This Technical Specification (TS) has been produced by ETSI Technical Committee Intelligent Transport Systems
(ITS).
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
ETSI

---------------------- Page: 5 ----------------------
6 ETSI TS 102 941 V1.2.1 (2018-05)
1 Scope
The present document specifies the trust and privacy management for Intelligent Transport System (ITS)
communications. Based upon the security services defined in ETSI TS 102 731 [1] and the security architecture defined
in ETSI TS 102 940 [5], it identifies the trust establishment and privacy management required to support security in an
ITS environment and the relationships that exist between the entities themselves and the elements of the ITS reference
architecture defined in ETSI EN 302 665 [2].
The present document identifies and specifies security services for the establishment and maintenance of identities and
cryptographic keys in an Intelligent Transport System (ITS). Its purpose is to provide the functions upon which systems
of trust and privacy can be built within an ITS.
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
https://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] ETSI TS 102 731: "Intelligent Transport Systems (ITS); Security; Security Services and
Architecture".
[2] ETSI EN 302 665: "Intelligent Transport Systems (ITS); Communications Architecture".
[3] ETSI TS 103 097: "Intelligent Transport Systems (ITS); Security; Security header and certificate
formats".
[4] ETSI TS 102 942: "Intelligent Transport Systems (ITS); Security; Access control".
[5] ETSI TS 102 940: "Intelligent Transport Systems (ITS); Security; ITS communications security
architecture and security management".
[6] ISO/IEC 8824-1:2015: "Information technology -- Abstract Syntax Notation One (ASN.1):
Specification of basic notation".
[7] Recommendation ITU-T X.696 (08/2014): "Information Technology-Specification of Octet
Encoding Rules (OER)".
[8] Void.
[9] ETSI TS 102 943: "Intelligent Transport Systems (ITS); Security; Confidentiality services".
[10] ETSI EN 302 637-2: "Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set
of Applications; Part 2: Specification of Cooperative Awareness Basic Service".
[11] ETSI EN 302 637-3: "Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set
of Applications; Part 3: Specifications of Decentralized Environmental Notification Basic
Service".
[12] ETSI TS 103 301: "Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of
Applications; Facilities layer protocols and communication requirements for infrastructure
services".
ETSI

---------------------- Page: 6 ----------------------
7 ETSI TS 102 941 V1.2.1 (2018-05)
[13] NIST FIPS PUB 198-1: "The Keyed-Hash Message Authentication Code (HMAC)".
[14] Void.
[15] IETF RFC 4862: "IPv6 Stateless Address Autoconfiguration".
[16] ETSI EN 302 636-6-1: "Intelligent Transport Systems (ITS); Vehicular Communications;
GeoNetworking; Part 6: Internet Integration; Sub-part 1: Transmission of IPv6 Packets over
GeoNetworking Protocols".
[17] Void.
[18] ETSI EN 302 636-4-1: "Intelligent Transport Systems (ITS); Vehicular communications;
GeoNetworking; Part 4: Geographical addressing and forwarding for point-to-point and point-to-
multipoint communications; Sub-part 1: Media-Independent Functionality".
[19] ETSI TS 102 965: "Intelligent Transport Systems (ITS); Application Object Identifier (ITS-AID);
Registration".
[20] IEEE 802.11™: "IEEE Standard for Information technology - Telecommunications and
information exchange between systems - Local and metropolitan area networks-Specific
requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specifications".
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ISO/IEC 15408-2: "Information technology - Security techniques - Evaluation criteria for IT
security; Part 2: Security functional components".
[i.2] ETSI TR 102 638: "Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of
Applications; Definitions".
[i.3] IETF RFC 4046: "Multicast Security (MSEC) Group Key Management Architecture".
[i.4] IETF RFC 4301: "Security Architecture for the Internet Protocol".
[i.5] IETF RFC 4302: "IP Authentication Header".
[i.6] IETF RFC 4303: "IP Encapsulating Security Payload (ESP)".
[i.7] IETF RFC 5246: "The Transport Layer Security (TLS) Protocol Version 1.2".
[i.8] IETF RFC 3547: "The Group Domain of Interpretation".
[i.9] IETF RFC 3830: "MIKEY: Multimedia Internet KEYing".
[i.10] IETF RFC 4535: "GSAKMP: Group Secure Association Key Management Protocol".
[i.11] IETF RFC 4306: "Internet Key Exchange (IKEv2) Protocol", December 2005.
[i.12] IETF RFC 4877: "Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture".
[i.13] ETSI TS 102 723-8: "Intelligent Transport Systems (ITS); OSI cross-layer topics; Part 8: Interface
between security entity and network and transport layer".
ETSI

---------------------- Page: 7 ----------------------
8 ETSI TS 102 941 V1.2.1 (2018-05)
[i.14] CVRIA: "Connected Vehicle Reference Implementation Architecture".
NOTE: Available at http://www.iteris.com/cvria/.
[i.15] ISO 21210-2010: "Intelligent Transport Systems (ITS) - Communications access for land mobiles
(CALM) - Ipv6 networking".
3 Definitions, abbreviations and notation
3.1 Definitions
For the purposes of the present document, the terms and definitions given in ETSI TS 102 731 [1], ETSI
TS 102 940 [5], ISO/IEC 15408-2 [i.1] and the following apply:
delta CTL: partial CTL that only contains CTL entries that have been updated since the issuance of the prior, base CTL�
3.2 Abbreviations
For the purposes of the present document, the abbreviations given in ETSI EN 302 636-4-1 [18] and the following
apply:
AA Authorization Authority
ASN Abstract Syntax Notation
AT Authorization Ticket
CA Certification Authority
CCH Control CHannel
CCMS Cooperative-ITS Certificate Management System
COER Canonical Octet Encoding Rule
CPOC C-ITS Point Of Contact
CRL Certificate Revocation List
CTL Certificate Trust List
CVRIA Connected Vehicle Reference Implementation Architecture
DC Distribution Centre
DENM Decentralized Environmental Notification Message
EA Enrolment Authority
EC Enrolment Credential
ECC Elliptic Curve Cryptography
ECTL European Certificate Trust List
EV Electric Vehicle
GET command HTTP GET
GN/BTP GeoNetworking/Basic Transport Protocol
GN6 GeoNetworking-IPv6
HMAC keyed-Hash Message Authentication Code
HTTP Hyper Text Transfer Protocol
IP Internet Protocol
ITS-AID ITS Application ID
LTE Long Term Evolution (4G)
MSEC Multicast SECurity
OBD On-Board Diagnosis
PA Policy Authority
PDU Protocol Data Unit
PII Personally Identifiable Information
POP Proof Of Possession
RCA Root Certification Authority
SCH Service CHannel
SLAAC StateLess Address Auto Configuration
SM Security Management
SSP Service Specific Permissions
TCP Transmission Control Protocol
ETSI

---------------------- Page: 8 ----------------------
9 ETSI TS 102 941 V1.2.1 (2018-05)
TCP/IP Transmission Control Protocol / Internet Protocol
TLM Trust List Manager
TLS Transport Layer Security
UPER Unaligned Packed Encoding Rules
V2I Vehicle-to-Infrastructure
WLAN Wireless Local Area Network
3.3 Notation
The requirements identified in the present document include:
a) mandatory requirements strictly to be followed in order to conform to the present document. Such
requirements are indicated by clauses without any additional marking;
b) requirements strictly to be followed if applicable to the type of ITS Station concerned.
Such requirements are indicated by clauses marked by "[CONDITIONAL]"; and where relevant is marked by an
identifier of the type of ITS-S for which the clauses are applicable as follows:
� [Itss_WithPrivacy] is used to denote requirements applicable to ITS-S for which pseudonymity has to be
assured and re-identification by the AA is not allowed. This includes for instance personal user vehicle ITS-S
or personal ITS-S Portable.
� [Itss_NoPrivacy] is used to denote requirements applicable to ITS-S for which pseudonymity does not have to
be assured and are allowed to be re-identified by the AA. This may be for instance fixed or mobile RSUs or
special vehicles.
4 ITS authority hierarchy
Trust and privacy management requires secure distribution and maintenance (including revocation when applicable) of
trust relationships, which may be enabled by specific security parameters that include enrolment credentials that provide
rd
3 party certificates of proof of identity or other attributes such as pseudonym certificates. Public key certificates and
Public Key Infrastructure (PKI) are used to establish and maintain trust between the ITS-S and other ITS-S and
authorities.
ETSI TS 102 731 [1] specifies requirements on security management services and security management roles such as
EAs and AAs. The ITS security architecture is defined in ETSI TS 102 940 [5] and covers both the secured
Communication Architecture, the architecture of the ITS-S Communication security system and the Security
Management System architecture.
The present document assumes the definition of the security management entities specified in ETSI TS 102 940 [5] and
the top-level entities for the management of multiple Root CAs collaborating within a single Trust Model. For ease of
reading and for further specification of trust and privacy management the relevant tables from ETSI TS 102 940 [5] are
copied here.
ETSI

---------------------- Page: 9 ----------------------
10 ETSI TS 102 941 V1.2.1 (2018-05)
Table 1: Functional element roles of the PKI
Functional element Description
Root Certification Authority The Root CA is the highest level CA in the certification hierarchy. It provides EA and
AA with proof that it may issue enrolment credentials, respectively authorization tickets
Enrolment Authority Security management entity responsible for the life cycle management of enrolment
credentials. Authenticates an ITS-S and grants it access to ITS communications
Authorization Authority Security management entity responsible for issuing, monitoring the use of authorization
tickets. Provides an ITS-S with authoritative proof that it may use specific ITS services
Distribution Centre (optional) Provides to ITS-S the updated trust information necessary for performing the validation
process to control that received information is coming from a legitimate and authorized
ITS-S or a PKI certification authority by publishing the CTL and CRL
Sending ITS-S Acquires rights to access ITS communications from Enrolment Authority
Negotiates rights to invoke ITS services from Authorization Authority
Sends single-hop and relayed broadcast messages
Relaying ITS-S Receives broadcast message from the sending ITS-S and forwards them to the
receiving ITS-S if required
Receiving ITS-S Receives broadcast messages from the sending or relaying ITS-S
Manufacturer Installs necessary information for security management in ITS-S at production
Operator Installs and updates necessary information for security management in ITS-S during
operation

Table 2: Functional element roles of the top-level trust management
Functional element Description
Policy Authority Policy authority is a role composed by the representatives of public and private
stakeholders (e.g. Authorities, Road Operators, Vehicle Manufacturers, etc.)
participating to the C-ITS trust model. It designates and authorizes the TLM and the
CPOC to operate in the C-ITS Trust system. It decides if root CAs are trustable and
approves/removes the Root CAs operation in C-ITS trust domain by notifying the
TLM about approved/revoked Root CAs certificates�
Central
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.