{"id":398727,"date":"2024-10-20T04:38:16","date_gmt":"2024-10-20T04:38:16","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1609-2a-2017-2\/"},"modified":"2024-10-26T08:25:54","modified_gmt":"2024-10-26T08:25:54","slug":"ieee-1609-2a-2017-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1609-2a-2017-2\/","title":{"rendered":"IEEE 1609.2a-2017"},"content":{"rendered":"
Amendment Standard – Active. This standard defines secure message formats and processing for use by Wireless Access in Vehicular Environments (WAVE) devices, including methods to secure WAVE management messages and methods to secure application messages. It also describes administrative functions necessary to support the core security functions.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 1609.2a\u2122-2017 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 3. Definitions, abbreviations, and acronyms 3.1 Definitions <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4. General description 4.2 Secure data service (SDS) <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4.3 Security services management entity (SSME) 5. Cryptographic operations and validity 5.1 Certificate validity <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.2 Signed SPDU validity <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.3 Cryptographic operations <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6. Data structures 6.1 Presentation and encoding <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.2 Integer Basic types 6.3 Secured protocol data units (SPDUs) <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 6.4 Certificates and other security management data structures <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 7. Certificate revocation lists (CRLs) and the CRL Verification Entity 7.3 Data structures <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 7.4 CRL: 1609.2 Security envelope <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 8. Peer-to-peer certificate distribution (P2PCD) 8.1 General 8.2 P2PCD operations <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 8.4 Data structures <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 9. Service primitives and functions 9.1 General comments and conventions <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 9.4 SSME SAP <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 9.5 SSME-Sec SAP <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | Annex A (informative) Protocol Implementation Conformance Statement (PICS) proforma A.2 PICS proforma\u2014IEEE Std 1609.2 A.2.3 Conformance statement A.2.3.1 Security services <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | A.2.3.3 Peer-to-peer certificate distribution (P2PCD) functionality <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | Annex B (normative) ASN.1 modules B.0a General B.1 1609.2 security services B.1.1 1609.2 schema <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | B.1.2 1609.2 base types <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | B.2 Certificate revocation list (CRL) B.2.1 Certificate revocation list: Base types <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | B.2.2 CRL: Security envelope <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | B.2.3 CRL: Service Specific Permissions (SSP) B.3 Peer-to-peer certificate distribution (P2PCD) <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | Annex C (informative) Specifying the use of IEEE Std 1609.2\u2122 by SDEEs C.2 IEEE 1609.2 security profiles C.2.1 Contents of security profile C.2.1.2 SDS C.2.1.3 IEEE 1609.2 security profile identification C.2.1.3.1 Sending <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | C.2.1.3.2 Receiving <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | C.2.1.3.3 Security management C.3 IEEE 1609.2 security profile proforma C.3.2 IEEE 1609.2 security profile proforma C.3.2.2 Sending <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | C.3.2.3 Receiving <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | C.3.2.4 Security management C.3.2.5 Other C.4 Service Specific Permissions (SSP) C.4.2 SSP syntax and semantics <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | C.7 Source of encryption keys <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | Annex D (informative) Examples and use cases D.5 Example data structures D.5.3 PsidGroupPermissions examples D.5.4 Root CA certificate profile <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | D.6 Cryptographic test vectors D.6.1 AES-CCM-128 <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | D.6.2 ECIES <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | D.6.3 MAC1 <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | D.6.4 KDF2 <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Wireless Access in Vehicular Environments–Security Services for Applications and Management Messages – Amendment 1<\/b><\/p>\n |