Information technology — Future Network — Problem statement and requirements — Part 5: Security

ISO/IEC TR 29181-5:2014 describes the problem statements of current network and the requirements for Future Network in the security perspective. It mainly specifies problems of the current network in security environment, and requirements for security support in Future Network.

Technologies de l'information — Réseaux du futur — Énoncé du problème et exigences — Partie 5: Sécurité

General Information

Status
Published
Publication Date
03-Dec-2014
Current Stage
6060 - International Standard published
Start Date
04-Dec-2014
Completion Date
04-Dec-2014
Ref Project

Buy Standard

Technical report
ISO/IEC TR 29181-5:2014 - Information technology -- Future Network -- Problem statement and requirements
English language
6 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (sample)

TECHNICAL ISO/IEC TR
REPORT 29181-5
First edition
2014-12-15
Information technology — Future
Network — Problem statement and
requirements —
Part 5:
Security
Technologies de l’information — Réseaux du futur — Énoncé du
problème et exigences —
Partie 5: Sécurité
Reference number
ISO/IEC TR 29181-5:2014(E)
ISO/IEC 2014
---------------------- Page: 1 ----------------------
ISO/IEC TR 29181-5:2014(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2014

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form

or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior

written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of

the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2014 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC TR 29181-5:2014(E)
Contents Page

Foreword ........................................................................................................................................................................................................................................iv

Introduction ..................................................................................................................................................................................................................................v

1 Scope ................................................................................................................................................................................................................................. 1

2 Terms and definitions ..................................................................................................................................................................................... 1

3 Abbreviations........................................................................................................................................................................................................... 1

4 General ............................................................................................................................................................................................................................ 2

4.1 Security environment in FN ......................................................................................................................................................... 2

4.2 Related works on security in FN .............................................................................................................................................. 2

5 Problem statement of current network in security environment .................................................................... 2

5.1 The existing problems and reasons of network security ................................................................................... 2

5.1.1 Network users undertake the security risk and responsibilities........................................... 3

5.1.2 Irregular Address and no truly proof for origin .................................................................................... 3

5.1.3 Central control may lead to security disaster ......................................................................................... 3

5.2 The current network security protection measures and effect .................................................................... 3

5.2.1 Current security protection means of common network user ................................................. 3

5.2.2 Current security protection means of professional users ............................................................ 4

5.3 Disadvantages of existing network security defense system .......................................................................... 4

6 The goal and requirements of FN security ................................................................................................................................ 4

6.1 The goal of FN security .................................................................................................................................................................... 4

6.2 The requirements of FN security ............................................................................................................................................ 5

6.2.1 From passive defense to active management.......................................................................................... 5

6.2.2 Replace computing confrontation with authentication technology .................................... 5

6.2.3 Forming one to more system solution with authentication technology .......................... 5

6.3 FN security technical system ...................................................................................................................................................... 5

6.3.1 Identity Authentication system ........................................................................................................................... 5

6.3.2 Platform security (Trusted Computing) ...................................................................................................... 5

6.3.3 Secure connection and transmission ............................................................................................................. 5

6.3.4 Application security ...................................................................................................................................................... 5

6.3.5 The functional requirements of FN security system ......................................................................... 5

7 Consideration of Key technology for FN security implementation ..................................................................6

7.1 Support the real-name and anonymity authentication ........................................................................................ 6

7.2 Support large-scale application ................................................................................................................................................ 6

7.3 Support end-to-end directly authentication and key exchange .................................................................... 6

7.4 Support management domain segmentation and cross-domain authentication .......................... 6

7.5 Simple structure, convenient use, low cost, and easy popularized ........................................................... 6

7.6 The application method to realize Identity Authentication ............................................................................. 6

© ISO/IEC 2014 – All rights reserved iii
---------------------- Page: 3 ----------------------
ISO/IEC TR 29181-5:2014(E)
Foreword

ISO (the International Organization for Standardization) and IEC (the International Electrotechnical

Commission) form the specialized system for worldwide standardization. National bodies that are

members of ISO or IEC participate in the development of International Standards through technical

committees established by the respective organization to deal with particular fields of technical

activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international

organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the

work. In the field of information technology, ISO and IEC have established a joint technical committee,

ISO/IEC JTC 1.

The procedures used to develop this document and those intended for its further maintenance are

described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for

the different types of document should be noted. This document was drafted in accordance with the

editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).

Attention is drawn to the possibility that some of the elements of this document may be the subject

of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.

Details of any patent rights identified during the development of the document will be in the Introduction

and/or on the ISO list of patent declarations received (see www.iso.org/patents).

Any trade name used in this document is information given for the convenience of users and does not

constitute an endorsement.

For an explanation on the meaning of ISO specific terms and expressions related to conformity

assessment, as well as information about ISO’s adherence to the WTO principles in the Technical Barriers

to Trade (TBT) see the following URL: Foreword - Supplementary information

The committee responsible for this document is ISO/IEC JTC 1, Information technology, SC 6,

Telecommunications and information exchange between systems.

ISO/IEC TR 29181 consists of the following parts, under the general title Future Network — Problem

statement and requirements:
— Part 1: Overall aspects
— Part 2: Naming and addressing
— Part 3: Switching and routing
— Part 4: Mobility
— Part 5: Security
— Part 6: Media transport
— Part 7: Service composition

Additional parts, dealing with quality of service and networking of everything are planned.

iv © ISO/IEC 2014 – All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC TR 29181-5:2014(E)
Introduction

This part of ISO/IEC TR 29181 (Future Network: Problem Statement and Requirements) describes the

problems of the current network and the requirements for Future Network in the security perspective.

The general description on the problem statement and requirements for Future Network is given in the

ISO/IEC TR 29181-1. In addition, this part of ISO/IEC TR 29181-5 establishes the problem statement

and requirements for Future Network in the viewpoint of architecture and functionality for security

support.

In general, network security includes information security and the network’s own security. Network

security is concerned with hardware, software, basic communication protocol, network frame structure,

communication mechanism factors of the network, and involving a wide range of many things. This

part of ISO/IEC TR 29181 will focus on changing the security mechanism of network security from the

perspective of the future.

This part of ISO/IEC TR 29181 can be applicable to the overall design of Future Network architecture.

© ISO/IEC 2014 – All rights reserved v
---------------------- Page: 5 ----------------------
TECHNICAL REPORT ISO/IEC TR 29181-5:2014(E)
Information technology — Future Network — Problem
statement and requirements —
Part 5:
Security
1 Scope

This part of ISO/IEC TR 29181 describes the problem statements of current network and the requirements

for Future Network in the security perspective. This part of ISO/IEC TR 29181 mainly specifies

— problems of the current network in security environment, and
— requirements for security support in Future Network.
2 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
2.1
Future Network

network of the future which is made on clean-slate design approach as well as incremental design

approach; it should provide futuristic capabilities and services beyond the limitations of the current

network including the Internet
[SOURCE: ISO/IEC/TR 29181-1:2012, 3.1]
2.2
Net Space

new dimensional time-space system created by humans with communication, computer and other

information technology, which provides new space for human information activities (including

information gathering, processing, storing, transmission etc.) and is becoming an ever important part

of the survival and development environment for human society
Note 1 to entry: Net Space is derived and expended from network.

Note 2 to entry: It is becoming an ever important part of the survival and development environment for human

society.
2.3
FN Space

main space for information activities of human society and finally developed to the virtual world

corresponding to and closely interacted with the physical world
Note 1 to entry: FN Space will be the development and improvement of Net Space.
Note 2 to entry:
3 Abbreviations
FN Future Network
© ISO/IEC 2014 – All rights reserved 1
---------------------- Page: 6 ----------------------
ISO/IEC TR 29181-5:2014(E)
ID Identifier
IP Internet Protocol
TR Technical Report
KMI Key Management Infrastructure
PKI Public Key Infrastructure
USB-key Universal Serial BUS Key
IC card Integrated Circuit Card
4 General
4.1 Security environment in FN

For the FN, people have various assumptions. In all imagination there is one thing in common, that is the

FN must be a reliable and secure network. It can provide reliable and effective support to a variety of

political, economic, cultural, business and social activities for people, at the same time, provide security

for the application and personal privacy as well.

In the FN, drawbacks of existing network security will be overcome, people don’t have always to face the

threat of net crime, because the new security system has made such a network environment in which all

criminal behavior such as the wanton peeping and plunder of information, attacks etc, and network war

simply cannot exist. Even if malicious activities happened, it will be detected and deterred immediately.

The FN will realize “data security”, “network security” and “application security”. People can safely use

the network to engage in all kinds of business and exchange information between each other at ease.

4.2 Related works on security in FN

In the framework of the current network, the communication protocol and the security protection

means is impossible to meet the demand of FN security. Therefore to gain the FN security we must break

through the limitations of the existing mechanism and system, to design a brand-new architecture, basic

communication protocol and rules with new concept. So the construction of FN security system is not

only a com
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.