IEEE 1609.2-2006
$62.83
IEEE Trial-Use Standard for Wireless Access in Vehicular Environments – Security Services for Applications and Management Messages
Published By | Publication Date | Number of Pages |
IEEE | 2006 |
New IEEE Standard – Inactive-Withdrawn. Secure message formats, and the processing of those secure messages, within the DSRC/WAVE system are defined. The standard covers methods for securing WAVE management messages and application messages, with the exception of vehicle-originating safety messages. It also describes administrative functions necessary to support the core security functions.
PDF Catalog
PDF Pages | PDF Title |
---|---|
3 | IEEE Trial-Use Standard for Wireless Access in Vehicular Environments–Security Services for Applications and Management Messages |
6 | Introduction Notice to users |
8 | Participants |
10 | CONTENTS |
13 | 1. Overview 1.1 Introduction |
14 | 1.2 Scope 1.3 Purpose 1.4 Document organization |
15 | 1.5 Document conventions 2. Normative references |
16 | 3. Defintions, abbreviations, and acronyms 3.1 Definitions |
21 | 3.2 Abbreviations and acronyms |
22 | 3.3 Terminology, applications, implementations, and security manager |
23 | 4. Presentation language 4.1 General |
24 | 4.2 Notation conventions 4.3 Basic block size 4.4 Numbers 4.5 Fixed-length vectors |
25 | 4.6 Variable-length vectors 4.7 The opaque and opaqueExtLength type |
26 | 4.8 Enumerated type |
27 | 4.9 Constructed types 4.10 The case statement |
28 | 4.11 The extern statement 4.12 Flags |
29 | 5. Secured Messages 5.1 General 5.2 SecuredMessage type |
30 | 5.3 SignedMessage, ToBeSignedMessage, and MessageFlags types |
31 | 5.4 SignedWSM and ToBeSignedWSM types |
32 | 5.5 PublicKey, PKAlgorithm, and SymmAlgorithm types |
33 | 5.6 ECPublicKey type 5.7 CertID8 and CertID10 type 5.8 The ApplicationID and FullySpecifiedAppID types |
34 | 5.9 Time64 and Time32 types 5.10 SignerInfo type |
35 | 5.11 Signature type 5.12 ECDSASignature type 5.13 EncryptedMessage, EncryptedContentInfo, and RecipientInfo types |
36 | 5.14 ECIESNISTp256EncryptedKey and AESCCMCiphertext types |
37 | 5.15 WAVECertificate, ToBeSignedWAVECertificate, CertSpecificData, SubjectType, and CRLSeries types |
39 | 5.16 WAVECRL, ToBeSignedCRL, CRL Type, and IDAndDate types |
40 | 5.17 WAVECertificateRequest and WAVECertificateResponse types |
41 | 5.18 GeographicRegion and RegionType types |
42 | 5.19 The 2DLocation and 3DLocationAndConfidence types |
43 | 5.20 Certificate Scopes |
46 | 6. Other secured message formats |
47 | 7. Secure message processing 7.1 Required information for security services 7.2 Caches and stores |
49 | 7.3 Signed messages |
55 | 7.4 Processing Encrypted Messages |
57 | 7.5 Processing Signed and Encrypted Messages 8. Specific uses of secured messages 8.1 Secured WSAs |
62 | 8.2 Secured WSMs |
65 | 8.3 Security Manager |
67 | 8.4 Certificate requests |
69 | 8.5 Fragmented messages |
71 | Annex A (normative) Protocol Implementation Conformance Statement (PICS) proforma |
88 | Annex B (normative) Summary of message formats |
95 | Annex C (informative) Examples of message structures |
101 | Annex D (informative) General description |
107 | Annex E (informative) Additional security considerations |
110 | Annex F (informative) Threat model |
113 | Annex G (informative) Bandwidth considerations and opportunites for optimization |
115 | Annex H (informative) Copyright statement for Clause 4 |
116 | Annex I (informative) Bibliography |