Information technology — Future Network — Problem statement and requirements — Part 5: Security

ISO/IEC TR 29181-5:2014 describes the problem statements of current network and the requirements for Future Network in the security perspective. It mainly specifies problems of the current network in security environment, and requirements for security support in Future Network.

Technologies de l'information — Réseaux du futur — Énoncé du problème et exigences — Partie 5: Sécurité

General Information

Status
Published
Publication Date
03-Dec-2014
Current Stage
6060 - International Standard published
Due Date
11-Oct-2014
Completion Date
04-Dec-2014
Ref Project

Buy Standard

Technical report
ISO/IEC TR 29181-5:2014 - Information technology -- Future Network -- Problem statement and requirements
English language
6 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

TECHNICAL ISO/IEC TR
REPORT 29181-5
First edition
2014-12-15
Information technology — Future
Network — Problem statement and
requirements —
Part 5:
Security
Technologies de l’information — Réseaux du futur — Énoncé du
problème et exigences —
Partie 5: Sécurité
Reference number
ISO/IEC TR 29181-5:2014(E)
©
ISO/IEC 2014

---------------------- Page: 1 ----------------------
ISO/IEC TR 29181-5:2014(E)

COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2014
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form
or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior
written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of
the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2014 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC TR 29181-5:2014(E)

Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Terms and definitions . 1
3 Abbreviations. 1
4 General . 2
4.1 Security environment in FN . 2
4.2 Related works on security in FN . 2
5 Problem statement of current network in security environment . 2
5.1 The existing problems and reasons of network security . 2
5.1.1 Network users undertake the security risk and responsibilities. 3
5.1.2 Irregular Address and no truly proof for origin . 3
5.1.3 Central control may lead to security disaster . 3
5.2 The current network security protection measures and effect . 3
5.2.1 Current security protection means of common network user . 3
5.2.2 Current security protection means of professional users . 4
5.3 Disadvantages of existing network security defense system . 4
6 The goal and requirements of FN security . 4
6.1 The goal of FN security . 4
6.2 The requirements of FN security . 5
6.2.1 From passive defense to active management. 5
6.2.2 Replace computing confrontation with authentication technology . 5
6.2.3 Forming one to more system solution with authentication technology . 5
6.3 FN security technical system . 5
6.3.1 Identity Authentication system . 5
6.3.2 Platform security (Trusted Computing) . 5
6.3.3 Secure connection and transmission . 5
6.3.4 Application security . 5
6.3.5 The functional requirements of FN security system . 5
7 Consideration of Key technology for FN security implementation .6
7.1 Support the real-name and anonymity authentication . 6
7.2 Support large-scale application . 6
7.3 Support end-to-end directly authentication and key exchange . 6
7.4 Support management domain segmentation and cross-domain authentication . 6
7.5 Simple structure, convenient use, low cost, and easy popularized . 6
7.6 The application method to realize Identity Authentication . 6
© ISO/IEC 2014 – All rights reserved iii

---------------------- Page: 3 ----------------------
ISO/IEC TR 29181-5:2014(E)

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
Details of any patent rights identified during the development of the document will be in the Introduction
and/or on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the meaning of ISO specific terms and expressions related to conformity
assessment, as well as information about ISO’s adherence to the WTO principles in the Technical Barriers
to Trade (TBT) see the following URL: Foreword - Supplementary information
The committee responsible for this document is ISO/IEC JTC 1, Information technology, SC 6,
Telecommunications and information exchange between systems.
ISO/IEC TR 29181 consists of the following parts, under the general title Future Network — Problem
statement and requirements:
— Part 1: Overall aspects
— Part 2: Naming and addressing
— Part 3: Switching and routing
— Part 4: Mobility
— Part 5: Security
— Part 6: Media transport
— Part 7: Service composition
Additional parts, dealing with quality of service and networking of everything are planned.
iv © ISO/IEC 2014 – All rights reserved

---------------------- Page: 4 ----------------------
ISO/IEC TR 29181-5:2014(E)

Introduction
This part of ISO/IEC TR 29181 (Future Network: Problem Statement and Requirements) describes the
problems of the current network and the requirements for Future Network in the security perspective.
The general description on the problem statement and requirements for Future Network is given in the
ISO/IEC TR 29181-1. In addition, this part of ISO/IEC TR 29181-5 establishes the problem statement
and requirements for Future Network in the viewpoint of architecture and functionality for security
support.
In general, network security includes information security and the network’s own security. Network
security is concerned with hardware, software, basic communication protocol, network frame structure,
communication mechanism factors of the network, and involving a wide range of many things. This
part of ISO/IEC TR 29181 will focus on changing the security mechanism of network security from the
perspective of the future.
This part of ISO/IEC TR 29181 can be applicable to the overall design of Future Network architecture.
© ISO/IEC 2014 – All rights reserved v

---------------------- Page: 5 ----------------------
TECHNICAL REPORT ISO/IEC TR 29181-5:2014(E)
Information technology — Future Network — Problem
statement and requirements —
Part 5:
Security
1 Scope
This part of ISO/IEC TR 29181 describes the problem statements of current network and the requirements
for Future Network in the security perspective. This part of ISO/IEC TR 29181 mainly specifies
— problems of the current network in security environment, and
— requirements for security support in Future Network.
2 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
2.1
Future Network
FN
network of the future which is made on clean-slate design approach as well as incremental design
approach; it should provide futuristic capabilities and services beyond the limitations of the current
network including the Internet
[SOURCE: ISO/IEC/TR 29181-1:2012, 3.1]
2.2
Net Space
new dimensional time-space system created by humans with communication, computer and other
information technology, which provides new space for human information activities (including
information gathering, processing, storing, transmission etc.) and is becoming an ever important part
of the survival and development environment for human society
Note 1 to entry: Net Space is derived and expended from network.
Note 2 to entry: It is becoming an ever important part of the survival and development environment for human
society.
2.3
FN Space
FN
main space for information activities of human society and finally developed to the virtual world
corresponding to and closely interacted with the physical world
Note 1 to entry: FN Space will be the development and improvement of Net Space.
Note 2 to entry:
3 Abbreviations
FN Future Network
© ISO/IEC 2014 – All rights reserved 1

---------------------- Page: 6 ----------------------
ISO/IEC TR 29181-5:2014(E)

ID Identifier
IP Internet Protocol
TR Technical Report
KMI Key Management Infrastructure
PKI Public Key Infrastructure
USB-key Universal Serial BUS Key
IC card Integrated Circuit Card
4 General
4.1 Security environment in FN
For the FN, people have various assumptions. In all imagination there is one thing in common, that is the
FN must be a reliable and secure network. It can provide reliable and effective support to a variety of
political, economic, cultural, business and social activities for people, at the same time, provide security
for the application and personal privacy as well.
In the FN, drawbacks of existing network security will be overcome, people don’t have always to face the
threat of net crime, because the new security system has made such a network environment in which all
criminal behavior such as the wanton peeping and plunder of information, attacks etc, and network war
simply cannot exist. Even if malicious activities happened, it will be detected and deterred immediately.
The FN will realize “data security”, “network security” and “application security”. People can safely use
the network to engage in all kinds of business and exchange information between each other at ease.
4.2 Related works on security in FN
In the framework of the current network, the communication protocol and the security protection
means is impossible to meet the demand of FN security. Therefore to gain the FN security we must break
through the limitations of the existing mechanism and system, to design a brand-new architecture, basic
communication protocol and rules with new concept. So the construction of FN security system is not
only a com
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.