Shopping Cart

No products in the cart.

IEEE 1609.2 2006

$44.96

Trial-Use Standard for Wireless Access in Vehicular Environments – Security Services for Applications and Management Messages

Published By Publication Date Number of Pages
IEEE 2006 117
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

New IEEE Standard – Inactive – Withdrawn. Secure message formats, and the processing of those secure messages, within the DSRC/WAVE system are defined. The standard covers methods for securing WAVE management messages and application messages, with the exception of vehicle-originating safety messages. It also describes administrative functions necessary to support the core security functions.

PDF Catalog

PDF Pages PDF Title
3 IEEE Trial-Use Standard for Wireless Access in Vehicular Environments–Security Services for Applications and Management Messages
6 Introduction
Notice to users
8 Participants
10 CONTENTS
13 1. Overview
1.1 Introduction
14 1.2 Scope
1.3 Purpose
1.4 Document organization
15 1.5 Document conventions
2. Normative references
16 3. Defintions, abbreviations, and acronyms
3.1 Definitions
21 3.2 Abbreviations and acronyms
22 3.3 Terminology, applications, implementations, and security manager
23 4. Presentation language
4.1 General
24 4.2 Notation conventions
4.3 Basic block size
4.4 Numbers
4.5 Fixed-length vectors
25 4.6 Variable-length vectors
4.7 The opaque and opaqueExtLength type
26 4.8 Enumerated type
27 4.9 Constructed types
4.10 The case statement
28 4.11 The extern statement
4.12 Flags
29 5. Secured Messages
5.1 General
5.2 SecuredMessage type
30 5.3 SignedMessage, ToBeSignedMessage, and MessageFlags types
31 5.4 SignedWSM and ToBeSignedWSM types
32 5.5 PublicKey, PKAlgorithm, and SymmAlgorithm types
33 5.6 ECPublicKey type
5.7 CertID8 and CertID10 type
5.8 The ApplicationID and FullySpecifiedAppID types
34 5.9 Time64 and Time32 types
5.10 SignerInfo type
35 5.11 Signature type
5.12 ECDSASignature type
5.13 EncryptedMessage, EncryptedContentInfo, and RecipientInfo types
36 5.14 ECIESNISTp256EncryptedKey and AESCCMCiphertext types
37 5.15 WAVECertificate, ToBeSignedWAVECertificate, CertSpecificData, SubjectType, and CRLSeries types
39 5.16 WAVECRL, ToBeSignedCRL, CRL Type, and IDAndDate types
40 5.17 WAVECertificateRequest and WAVECertificateResponse types
41 5.18 GeographicRegion and RegionType types
42 5.19 The 2DLocation and 3DLocationAndConfidence types
43 5.20 Certificate Scopes
46 6. Other secured message formats
47 7. Secure message processing
7.1 Required information for security services
7.2 Caches and stores
49 7.3 Signed messages
55 7.4 Processing Encrypted Messages
57 7.5 Processing Signed and Encrypted Messages
8. Specific uses of secured messages
8.1 Secured WSAs
62 8.2 Secured WSMs
65 8.3 Security Manager
67 8.4 Certificate requests
69 8.5 Fragmented messages
71 Annex A (normative) Protocol Implementation Conformance Statement (PICS) proforma
88 Annex B (normative) Summary of message formats
95 Annex C (informative) Examples of message structures
101 Annex D (informative) General description
107 Annex E (informative) Additional security considerations
110 Annex F (informative) Threat model
113 Annex G (informative) Bandwidth considerations and opportunites for optimization
115 Annex H (informative) Copyright statement for Clause 4
116 Annex I (informative) Bibliography
IEEE 1609.2 2006
$44.96