Electronic fee collection - Security framework

ISO 17573 defines the roles and functions as well as the internal and external entities of the EFC system environment. Based on the system architecture defined in ISO 17573, the security framework describes a set of requirements and security measures for stakeholders to implement and operate their part of an EFC system as required for a trustworthy environment according to its basic information security policy. In general, the overall scope is an information security framework for all organisational and technical entities and in detail for the interfaces between them.

Elektronische Gebührenerhebung - Sicherheitsgrundstruktur

Perception de télépéage - Cadre de sécurité

Elektronsko pobiranje pristojbin - Varnostni okvir

Standard ISO 17573 določa vloge in funkcije ter notranje in zunanje subjekte okolja sistema za elektronsko pobiranje pristojbin (EFC). Varnostni okvir na podlagi sistemske arhitekture iz standarda ISO 17573 opisuje sklop zahtev in varnostnih ukrepov za zainteresirane strani, da lahko svoj del sistema za okoljsko pobiranje pristojbin izvajajo in upravljajo v skladu z zahtevami za zaupanja vredno okolje ob upoštevanju osnovne politike informacijske varnosti. Na splošno je skupno področje uporabe okvir informacijske varnosti za vse organizacijske in tehnične subjekte, podrobno pa za vmesnike med njimi.

General Information

Status
Withdrawn
Publication Date
11-Mar-2013
Withdrawal Date
01-Dec-2015
Technical Committee
Current Stage
9900 - Withdrawal (Adopted Project)
Start Date
22-Oct-2015
Due Date
14-Nov-2015
Completion Date
02-Dec-2015

Relations

Buy Standard

Technical specification
TS CEN/TS 16439:2013
English language
141 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

SLOVENSKI STANDARD
SIST-TS CEN/TS 16439:2013
01-april-2013
Elektronsko pobiranje pristojbin - Varnostni okvir
Electronic fee collection - Security framework
Elektronische Gebührenerhebung - Sicherheitsgrundstruktur
Perception de télépéage - Cadre de sécurité
Ta slovenski standard je istoveten z: CEN/TS 16439:2013
ICS:
35.240.60 Uporabniške rešitve IT v IT applications in transport
transportu in trgovini and trade
SIST-TS CEN/TS 16439:2013 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------

SIST-TS CEN/TS 16439:2013

---------------------- Page: 2 ----------------------

SIST-TS CEN/TS 16439:2013


TECHNICAL SPECIFICATION
CEN/TS 16439

SPÉCIFICATION TECHNIQUE

TECHNISCHE SPEZIFIKATION
January 2013
ICS 35.240.60
English Version
Electronic fee collection - Security framework
Perception de télépéage - Cadre de sécurité Elektronische Gebührenerhebung -
Sicherheitsgrundstruktur
This Technical Specification (CEN/TS) was approved by CEN on 27 August 2012 for provisional application.

The period of validity of this CEN/TS is limited initially to three years. After two years the members of CEN will be requested to submit their
comments, particularly on the question whether the CEN/TS can be converted into a European Standard.

CEN members are required to announce the existence of this CEN/TS in the same way as for an EN and to make the CEN/TS available
promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in force (in parallel to the CEN/TS)
until the final decision about the possible conversion of the CEN/TS into an EN is reached.

CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania,
Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United
Kingdom.





EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION

EUROPÄISCHES KOMITEE FÜR NORMUNG

Management Centre: Avenue Marnix 17, B-1000 Brussels
© 2013 CEN All rights of exploitation in any form and by any means reserved Ref. No. CEN/TS 16439:2013: E
worldwide for CEN national Members.

---------------------- Page: 3 ----------------------

SIST-TS CEN/TS 16439:2013
CEN/TS 16439:2013 (E)
Contents Page
Foreword . 6
0 Introduction . 7
0.1 Reader's guide . 7
0.2 EFC role model . 8
0.3 Relation to other security standards . 9
1 Scope . 11
1.1 EFC specific scope . 11
1.2 Scope in relation to other security frameworks . 14
2 Normative references . 15
3 Terms and definitions . 16
4 Symbols and abbreviations . 22
5 Trust model . 24
5.1 Introduction . 24
5.2 Stakeholders trust relations . 24
5.3 Technical trust model . 25
5.3.1 General . 25
5.3.2 Trust model for TC and TSP relations . 25
5.3.3 Trust model for TSP and User relations . 27
5.3.4 Trust model for Interoperability Management relations . 27
5.4 Implementation . 27
5.4.1 Setup of trust relations . 27
5.4.2 Trust relation renewing and revocation . 27
5.4.3 Issuing and revocation of sub CA and entity certificates . 28
5.4.4 Certificate and Certificate Revocation List profile and format . 28
5.4.5 Certificate extensions . 28
6 Security requirements. 29
6.1 Introduction . 29
6.2 Information Security Management System . 29
6.3 Communication interfaces . 30
6.3.1 General . 30
6.3.2 Generic interface requirements . 31
6.3.3 DSRC profile . 31
6.3.4 TC to TSP profile . 32
6.3.5 Communication provider profile. 32
6.4 Data storages . 33
6.4.1 General . 33
6.4.2 OBE data storages . 33
6.4.3 RSE data storages. 33
6.4.4 Back End data storage . 34
6.5 Toll Charger . 34
6.6 Toll Service Provider . 35
6.7 User. 37
6.8 Interoperability Management . 38
6.9 Limitation of requirements . 38
7 Security measures - countermeasures . 38
7.1 Introduction . 38
7.2 General security measures . 39
7.3 Communication interfaces security measures . 39
2

---------------------- Page: 4 ----------------------

SIST-TS CEN/TS 16439:2013
CEN/TS 16439:2013 (E)
7.3.1 General .3 9
7.3.2 DSRC-EFC interface .3 9
7.3.3 CCC interface . 40
7.3.4 LAC interface .4 0
7.3.5 Front End to TSP Back End interface .4 1
7.3.6 TC to TSP interface .4 1
7.4 End-to-end security measures .4 1
7.5 Toll Service Provider security measures .4 3
7.5.1 Front End security measures.4 3
7.5.2 Back End security measures .4 3
7.6 Toll Charger security measures.4 4
7.6.1 RSE security measures .4 4
7.6.2 Back End security measures .4 4
7.6.3 Other TC security measures .4 4
8 Security specifications for interoperable interface implementation . 45
8.1 General .4 5
8.1.1 Subject .4 5
8.1.2 Signature and hash algorithms .4 5
8.1.3 MAC algorithm .4 5
8.1.4 MAC key derivation .4 6
8.1.5 Key encryption algorithm.4 6
8.1.6 Padding algorithm .4 6
8.2 Security specifications for DSRC-EFC .4 6
8.2.1 Subject .4 6
8.2.2 OBE .4 6
8.2.3 RSE .4 7
8.3 Security specifications for CCC.4 7
8.3.1 Subject .4 7
8.3.2 OBE .4 7
8.3.3 RSE .4 7
8.4 Security specifications for LAC .4 7
8.4.1 Subject .4 7
8.4.2 OBE .4 7
8.4.3 RSE .4 7
8.5 Security specifications for Front End to TSP interface . 48
8.5.1 General .4 8
8.5.2 ChargeReport message authentication .4 8
8.6 Security specifications for TC to TSP interface .4 9
8.6.1 General .4 9
8.6.2 Secure communication channel .4 9
8.6.3 Message authentication .4 9
8.6.4 Proof of message delivery .5 1
8.6.5 TSP ChargeReport authentication . 51
9 Key management .5 2
9.1 Introduction .5 2
9.2 Asymmetric keys .5 2
9.2.1 Key exchange between stakeholders .5 2
9.2.2 Key generation and certification.5 2
9.2.3 Protection of Keys .5 3
9.2.4 Application.5 3
9.3 Symmetric keys .5 3
9.3.1 Introduction .5 3
9.3.2 Key exchange between stakeholders .5 3
9.3.3 Key lifecycle .5 4
9.3.4 Key storage and protection .5 6
9.3.5 Session keys .5 7
Annex A (normative) Data type specification.5 8
Annex B (normative) Implementation Conformance Statement (ICS) proforma . 62
3

---------------------- Page: 5 ----------------------

SIST-TS CEN/TS 16439:2013
CEN/TS 16439:2013 (E)
B.1 Guidance for completing the ICS proforma . 62
B.1.1 Purposes and structure . 62
B.1.2 Abbreviations and conventions. 62
B.1.3 Instructions for completing the ICS proforma . 64
B.2 Identification of the implementation . 64
B.2.1 General . 64
B.2.2 Date of the statement . 64
B.2.3 Implementation Under Test (IUT) identification . 64
B.2.4 System Under Test (SUT) identification . 65
B.2.5 Product supplier . 65
B.2.6 Applicant (if different from product supplier) . 66
B.2.7 ICS contact person . 66
B.3 Identification of the standard . 67
B.4 Global statement of conformance . 67
B.5 Roles . 67
B.6 Trust Model functionalities . 67
B.7 Profiles . 68
B.8 Requirements . 68
B.9 Security measures . 71
B.10 Specifications for interoperable interfaces security . 74
Annex C (informative) Stakeholder objectives and generic requirements . 76
C.1 Introduction . 76
C.2 Toll Chargers . 77
C.2.1 Toll chargers and their main interests . 77
C.2.2 Security service requirements for a Toll Charger . 77
C.3 Toll Service Providers . 78
C.3.1 Toll service providers and their main interests . 78
C.3.2 Security service requirements for a Toll Service Provider . 78
C.4 Users . 79
C.4.1 Users and their main interests . 79
C.4.2 Users requirements . 79
C.5 Interoperability Management . 79
C.5.1 Interoperability management and its main interests . 79
C.5.2 Security service requirements for interoperability management . 80
Annex D (informative) Threat analysis . 81
D.1 General introduction . 81
D.2 Attack trees based threat analysis . 81
D.2.1 Introduction . 81
D.2.2 System model . 82
D.2.3 Presentation of attack trees . 83
D.2.4 Attacker class 1: User . 84
D.2.5 Attacker class 2: Toll Service Provider . 86
D.2.6 Attacker class 3: Toll Charger . 89
D.2.7 Attacker class 4: Hacker . 91
D.2.8 Attacker class 5: Activist . 94
D.2.9 Attacker class 6: Communication provider . 95
D.2.10 Attacker class 7: Enterprise . 96
D.2.11 Attacker class 8: Government . 99
D.2.12 Attacker class 9: Foreign power . 101
D.3 Asset based threat analysis . 102
D.3.1 General . 102
D.3.2 Threatened Assets . 102
D.3.3 Compliance matrix . 104
D.3.4 Presentation of threats . 106
D.3.5 Generic threats . 107
D.3.6 Asset: Billing details . 109
D.3.7 Asset: OBE Charge Report . 110
D.3.8 Asset: Customisation information . 111
D.3.9 Asset: User contract information . 111
4

---------------------- Page: 6 ----------------------

SIST-TS CEN/TS 16439:2013
CEN/TS 16439:2013 (E)
D.3.10 Asset: Exception List . 112
D.3.11 Asset: "Help, info, complain". 112
D.3.12 Asset: OBE .1 13
D.3.13 Asset: User privacy . 115
D.3.14 Asset: RSE .1 15
D.3.15 Asset: EFC stakeholders image and reputation . 116
D.3.16 Asset: TC and TSP central system . 117
D.3.17 Asset: Transit information . 117
D.3.18 Asset: Trust object . 118
D.3.19 Asset: User identification. 120
D.3.20 Asset: Context Data . 120
D.3.21 Asset: Payment means . 121
D.3.22 Asset: Limited autonomy . 122
D.3.23 Asset: EFC Schema . 122
D.3.24 Asset: Contractual conditions . 123
D.3.25 Asset: Operational rules . 124
D.3.26 Asset: Complaint . 125
D.3.27 Asset: Certification . 127
D.3.28 Asset: Operational report. 128
Annex E (informative) Security Policies . 129
E.1 Introduction .
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.