ETSI TC ITS WG5 STANDARDIZATION ACTIVITIES ETSI ITS Workshop 2011.
Update on Security and LI activities in ETSI
description
Transcript of Update on Security and LI activities in ETSI
Update on Security and LI activities in ETSI
Charles Brookson
OCG Security Chairman
SOURCE: Charles Brookson, OCG Security Chairman
TITLE: Update on Security activities in ETSI
AGENDA ITEM: Joint 4.3
CONTACT: Charles Brookson ([email protected])
GSC11/Joint(06)10
Security work in ETSI• 3G and GSM (via www.3gpp.org)• DECT cordless phones• TETRA – Public Service mobile• NGN – Next Generation Networks in TISPAN7
– based on 3GPP’s IMS-SIP (intrinsic resilience of IP networks)• Digital signatures• Emergency communications (see GSC11_Joint_07)• Lawful Interception (see GSC11_Joint_17)• Security workshop (January 2006, free!!)
– workshop review on www.etsi.org• White Paper: Security for ICT - the Work of ETSI (see
GSC11_Joint_18)
Algorithms
• ETSI is a world leader in creating cryptographic algorithms and protocols to prevent fraud and unauthorised access to ICT and broadcast networks, and to protect customers’ privacy
• ETSI algorithms include:– algorithms used to protect GPRS, GSM and 3GPP
communications• extremely robust in real-life situations
– Dual-Tone Multi-Frequency (DTMF) receiver algorithm for PBX and Central Office applications
• used around the world, outperforming all traditional solutions– Conditional Access for TV etc
ongoing work• Lawful Interception (see GSC11_Joint_17)
– service specific details for IP multimedia services intercept– considerations for CSP domain IP interception– service-specific details for IP delivery of PSTN/ISDN Services
interception– Technical Report on Stored Data Handover
• Smart cards– GSM SIM card standards for security, authentication etc– extended the USIM and UICC for 3G and other applications,
including access control to WLANs and for PC security functions • Electronic signatures
– supporting the development of a European electronic signature infrastructure