oneM2M; Security solutions (oneM2M TS-0003 version 1.4.2 Release 1)

RTS/oneM2M-000003v110

General Information

Status
Published
Publication Date
17-Mar-2016
Technical Committee
Current Stage
12 - Completion
Due Date
23-Mar-2016
Completion Date
18-Mar-2016
Ref Project
Standard
ETSI TS 118 103 V1.1.0 (2016-03) - oneM2M; Security solutions (oneM2M TS-0003 version 1.4.2 Release 1)
English language
95 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


TECHNICAL SPECIFICATION
oneM2M;
Security solutions
(oneM2M TS-0003 version 1.4.2 Release 1)

oneM2M TS-0003 version 1.4.2 Release 1 2 ETSI TS 118 103 V1.1.0 (2016-03)

Reference
RTS/oneM2M-000003v110
Keywords
IoT, M2M, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the
print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
and microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.

© European Telecommunications Standards Institute 2016.
All rights reserved.
TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members.
TM
3GPP and LTE™ are Trade Marks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
GSM® and the GSM logo are Trade Marks registered and owned by the GSM Association.
ETSI
oneM2M TS-0003 version 1.4.2 Release 1 3 ETSI TS 118 103 V1.1.0 (2016-03)
Contents
Intellectual Property Rights . 7
Foreword . 7
1 Scope . 8
2 References . 8
2.1 Normative references . 8
2.2 Informative references . 10
3 Definitions, symbols and abbreviations . 11
3.1 Definitions . 11
3.2 Symbols . 14
3.3 Abbreviations . 14
4 Conventions . 15
5 Security Architecture . 15
5.1 Overview . 15
5.1.1 Introduction. 15
5.1.1 Identification and Authentication . 17
5.1.2 Authorization . 17
5.1.3 Identity Management . 17
5.2 Security Layers . 17
5.2.1 Security Service Layer . 17
5.2.2 Secure Environment Abstraction Layer . 18
5.3 Integration within overall oneM2M architecture . 18
6 Security Services and Interactions . 18
6.1 Security Integration in oneM2M flow of events. 18
6.1.1 Interactions between layers . 18
6.1.2 High level sequence of events. 19
6.1.2.1 Enrolment phase . 19
6.1.2.2 Operational phase . 20
6.1.2.2.1 M2M Service Access . 20
6.1.2.2.2 Authorization to access M2M resources . 21
6.2 Security Service Layer . 21
6.2.1 Access Management . 21
6.2.1.1 Authentication . 21
6.2.2 Authorization Architecture . 21
6.2.3 Security Administration . 24
6.2.3.0 Introduction . 24
6.2.3.1 Security Pre-Provisioning of SE . 24
6.2.3.2 Remote security administration of SE . 24
6.2.4 Identity Protection . 24
6.2.5 Sensitive Data Handling . 24
6.2.5.0 Introduction . 24
6.2.5.1 Sensitive Functions . 25
6.2.5.2 Secure Storage . 25
6.2.6 Trust Enabler security functions . 25
6.3 Secure Environment Abstraction Layer Components . 25
6.3.1 Secure Environment . 25
6.3.2 SE Plug-in . 26
6.3.3 Secure Environment Abstraction . 26
7 Authorization . 26
7.1 Access Control Mechanism . 26
7.1.1 General Description . 26
7.1.2 Parameters of the Request message . 27
7.1.3 Format of privileges and selfprivileges Attributes . 28
7.1.4 Access Control Decision . 30
7.1.5 Description of the Access Decision Algorithm . 30
ETSI
oneM2M TS-0003 version 1.4.2 Release 1 4 ETSI TS 118 103 V1.1.0 (2016-03)
7.2 AE Impersonation Prevention . 32
8 Security Frameworks . 33
8.1 General Introductions to the Security Frameworks . 33
8.1.0 General . 33
8.1.1 General Introduction to the Symmetric Key Security Framework. 33
8.1.2 General Introduction to the Certificate-Based Security Framework . 33
8.1.2.0 Introduction . 33
8.1.2.1 Public Key Certificate Flavours . 33
8.1.2.2 Path Validation and Certificate Status Verification . 34
8.1.2.3 Credential Configuration for Certificate-Based Security Framework . 35
8.1.2.4 Information Needed for Certificate Authentication of another Entity . 35
8.1.2.5 Certificate Verification . 36
8.1.3 General Introduction to the GBA (Generic Bootstrapping Architecture) Framework . 37
8.2 Security Association Establishment Frameworks . 38
8.2.1 Overview on Security Association Establishment Frameworks . 38
8.2.2 Detailed Security Association Establishment Frameworks . 41
8.2.2.1 Provisioned Symmetric Key Security Association Establishment Frameworks . 41
8.2.2.2 Certificate-Based Security Association Establishment Frameworks . 43
8.2.2.3 MAF-Based Symmetric Key Security Association Establishment Frameworks . 45
8.3 Remote Security Provisioning Frameworks . 48
8.3.1 Overview on Remote Security Provisioning Frameworks . 48
8.3.1.1 Purpose of Remote Security Provisioning Frameworks . 48
8.3.1.2 Overview on Remote Security Provisioning Frameworks . 48
8.3.2 Detailed Remote Security Provisioning Framework . 52
8.3.2.1 Pre-Provisioned Symmetric Key Remote Security Provisioning Framework . 52
8.3.2.2 Certificate-Based Remote Security Provisioning Framework . 55
8.3.2.3 GBA-Based Remote Security Provisioning Framework . 56
9 Security Framework Procedures and Parameters . 59
9.0 Introduction . 59
9.1 Security Association Establishment Framework Procedures and Parameters . 59
9.1.1 Credential Configuration Parameters . 59
9.1.1.0 Introduction . 59
9.1.1.1 Credential Configuration of Entity A and Entity B . 59
9.1.1.2 Credential Configuration of M2M Authentication Functions . 60
9.1.2 Association Configuration Procedures and Parameters . 60
9.1.2.0 Introduction . 60
9.1.2.1 Association Configuration of Entity A and Entity B . 60
9.1.2.1.1 Association Configuration of Entity A . 60
9.1.2.1.2 Association Configuration of Entity B . 61
9.1.2.2 Association Configuration of M2M Authentication Functions . 61
9.2 Remote Security Provisioning Framework Procedures and Parameters . 62
9.2.1 Bootstrap Credential Configuration Procedures and Parameters . 62
9.2.1.0 Introduction . 62
9.2.1.1 Bootstrap Credential Configuration of Enrolee . 62
9.2.1.2 Bootstrap Credential Configuration of M2M Enrolment Functions. 62
9.2.2 Bootstrap Instruction Configuration Procedures and Parameters . 63
9.2.2.0 Introduction . 63
9.2.2.1 Bootstrap Instruction Configuration of Enrolees . 63
9.2.2.2 Void. 64
9.2.2.3 Bootstrap Instruction Configuration of M2M Enrolment Functions . 64
9.2.2.4 Bootstrap Instruction Configuration of UNSP Authentication Server . 64
10 Protocol and Algorithm Details . 65
10.1 Certificate-Based Security Framework Details . 65
10.1.1 Certificate Profiles . 65
10.1.1.0 General . 65
10.1.1.1 Common Certificate Details . 65
10.1.1.2 Raw Public Key Certificate Profile . 65
10.1.1.3 Details Common to Certificates with Certificate Chains . 65
10.1.1.4 Profile for Device Certificates and their Certificate Chains . 65
10.1.1.4.1 Profile for Device Certificates . 65
ETSI
oneM2M TS-0003 version 1.4.2 Release 1 5 ETSI TS 118 103 V1.1.0 (2016-03)
10.1.1.4.2 Profile for Certificate Authority Certificates for Device Certificates . 66
10.1.1.5 Profile for AE-ID Certificates and their Certificate Chains . 66
10.1.1.6 Profile for FQDN Certificates and their Certificate Chains . 66
10.1.1.7 Profile for CSE-ID Certificates and their Certificate Chains . 66
10.1.2 Public Key Identifiers . 67
10.1.3 Support Requirements for each Public Key Certificate Flavour . 67
10.2 TLS and DTLS Details . 67
10.2.1 TLS and DTLS Versions . 67
10.2.2 TLS and DTLS Ciphersuites for TLS-PSK-Based Security Frameworks . 68
10.2.3 TLS and DTLS Ciphersuites for Certificate-Based Security Frameworks . 68
10.3 Key Export and Key Derivation Details . 69
10.3.1 TLS Key Export Details . 69
10.3.2 Derivation of Master Credential from Enrolment Key . 69
10.3.3 Derivation of Provisioned Secure Connection Key from Enrolment Key . 69
10.3.4 Generating KeId . 70
10.3.5 Generating KcId . 70
10.4 Credential-ID Details . 70
10.5 KpsaId . 70
10.6 KmId Format . 71
10.7 Enrolment Expiry . 71
Annex A (informative): Mapping of 3GPP GBA terminology . 72
Annex B (informative): General Mutual Authentication Mechanism . 73
B.0 Introduction . 73
B.1 Group Authentication . 73
Annex C (normative): Security protocols associated to specific SE technologies. 75
C.0 Introduction . 75
C.1 UICC . 75
C.2 Other secure element and embedded secure element with ISO/IEC 7816-4 interface . 75
C.3 Trusted Execution Environment . 75
C.4 SE to CSE binding . 75
Annex D (normative): UICC security framework to support oneM2M Services . 76
D.0 Introduction . 76
D.1 Access Network UICC-based oneM2M Service Framework. 77
D.1.1 Access Network UICC-based oneM2M Service Framework characteristics . 77
D.1.2 M2M Service Framework discovery for Access Network UICC . 77
D.1.3 Content of files at the DF level . 78
1M2M
D.1.3.0 Introduction. 78
D.1.3.1 EF (oneM2M Service Table) . 78
1M2MST
D.1.3.2 EF (oneM2M Subscription Identifier) . 80
1M2MSID
D.1.3.3 EF (oneM2M Service Provider Identifier) . 80
1M2MSPID
D.1.3.4 EF (M2M Node Identifier) . 81
M2MNID
D.1.3.5 EF (local CSE Identifier) . 81
CSEID
D.1.3.6 EF (M2M Application Identifiers list) . 81
M2MAE-ID
D.1.3.7 EF (M2M IN-CSE IDs list) . 82
INCSEIDS
D.1.3.8 EF (MAF-FQDN). 82
MAFFQDN
D.1.3.9 EF (M2M Enrolment Function Identifier) . 83
MEFID
D.2 oneM2M Service Module application for symmetric credentials on UICC (1M2MSM) . 84
D.2.0 Introduction . 84
D.2.1 oneM2M Service Module application file structure . 84
D.2.1.0 Introduction. 84
D.2.1.1 Content of UICC files at the Master File (MF) level . 84
D.2.1.2 Content of files at the 1M2MSM ADF (Application DF) level . 84
ETSI
oneM2M TS-0003 version 1.4.2 Release 1 6 ETSI TS 118 103 V1.1.0 (2016-03)
D.2.2 oneM2M Subscription related procedures for M2M Service . 85
D.2.2.0 Introduction. 85
D.2.2.1 Initialization - 1M2MSM Application selection . 85
D.2.2.2 1M2MSM session termination . 85
D.2.2.3 oneM2M Service discovery procedure . 85
D.2.2.4 oneM2M Service provisioning procedures . 85
D.2.2.5 oneM2M Application Identifiers provisioning procedure . 85
D.2.2.6 oneM2M Secure provisioning related procedures . 86
D.2.2.7 oneM2M Security Association related procedures . 86
Annex E (informative): Precisions for the UICC framework to support M2M Services . 87
E.0 Introduction . 87
E.1 Suggested content of the EFs at pre-personalization . 87
E.2 EF changes via Data Download or CAT applications . . 87
E.3 List of SFI values at the ADF or DF level . 88
M2MSM M2M
E.4 UICC related tags defined in annex J . 88
Annex F (normative): Acquisition of Location Information for Location based Access
Control . 89
F.0 Introduction . 89
F.1 Description of Region . 89
F.1.1 Circular Description . 89
F.1.2 Country Description . 89
F.2 Acquisition of Location Information . 89
F.2.0 Introduction . 89
F.2.1 Circular Description . 90
F.2.2 Country Description . 91
Annex G (informative): Access Control Decision Request . 92
Annex H (informative): Implementation Guidance and index of solutions . 93
Annex I (informative): Bibliography . 94
History . 95

ETSI
oneM2M TS-0003 version 1.4.2 Release 1 7 ETSI TS 118 103 V1.1.0 (2016-03)
Intellectual Property Rights
IPRs essential or potentially essential to the present document may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (https://ipr.etsi.org/).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Foreword
This Technical Specification (TS) has been produced by ETSI Partnership Project oneM2M (oneM2M).
ETSI
oneM2M TS-0003 version 1.4.2 Release 1 8 ETSI TS 118 103 V1.1.0 (2016-03)
1 Scope
The present document defines security solutions applicable within the M2M system.
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
https://docbox.etsi.org/Reference/.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] ETSI TS 118 101: "oneM2M; Functional Architecture (oneM2M TS-0001)".
[2] ETSI TS 118 111: "oneM2M; Common Terminology (oneM2M TS-0011)".
[3] Void.
[4] ETSI TS 118 104: "oneM2M; Service Layer Core Protocol Specification (oneM2M TS-0004)".
[5] IETF RFC 5246: "The Transport Layer Security (TLS) Protocol Version 1.2".
[6] IETF RFC 6347: "Datagram Transport Layer Security Version 1.2".
[7] ETSI TS 102 225 (V11.0.0): "Smart Cards; Secured packet structure for UICC based applications
(Release 11)".
[8] ETSI TS 102 226 (V11.0.0): "Smart Cards; Remote APDU structure for UICC based applications
(Release 11)".
[9] ETSI TS 131 115 (V10.1.1): "Digital cellular telecommunications system (Phase 2+); Universal
Mobile Telecommunications System (UMTS); Secured packet structure for (Universal) Subscriber
Identity Module (U)SIM Toolkit applications (3GPP TS 31.115 version 10.1.1 Release 10)".
[10] ETSI TS 131 116 (V10.2.0): "Digital cellular telecommunications system (Phase 2+); Universal
Mobile Telecommunications System (UMTS); LTE; Remote APDU Structure for (U)SIM Toolkit
applications (3GPP TS 31.116 version 10.2.0 Release 10)".
[11] 3GPP2 C.S0078-0 (V1.0): "Secured packet structure for CDMA Card Application Toolkit (CCAT)
applications".
[12] 3GPP2 C.S0079-0 (V1.0): "Remote APDU Structure for CDMA Card Application Toolkit
(CCAT) applications".
[13] ETSI TS 133 220: "Digital cellular telecommunications system (Phase 2+); Universal Mobile
Telecommunications System (UMTS); LTE; Generic Authentication Architecture (GAA); Generic
Bootstrapping Architecture (GBA) (3GPP TS 33.220)".
[14] 3GPP2 S.S0109-A: "Generic Bootstrapping Architecture (GBA) Framework".
[15] IETF RFC 4279: "Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)".
[16] Void.
[17] Void.
ETSI
oneM2M TS-0003 version 1.4.2 Release 1 9 ETSI TS 118 103 V1.1.0 (2016-03)
[18] IETF RFC 5705: "Keying Material Exporters for Transport Layer Security (TLS)".
[19] IETF RFC 3629: "UTF-8, a transformation format of ISO 10646".
[20] "Unicode Standard Annex #15; Unicode Normalization Forms", Unicode 5.1.0, March 2008.
NOTE: Available at http://www.unicode.org.
[21] GlobalPlatform Device Technology TEE Administration framework, DRAFT.
[22] GlobalPlatform Device Technology TEE System Architecture, Version 1.0.
[23] ETSI TS 102 671: "Smart Cards; Machine to Machine UICC; Physical and logical characteristics".
[24] ETSI TS 102 221: "Smart Cards; UICC-Terminal interface; Physical and logical characteristics".
[25] ETSI TS 102 484: "Smart Cards; Secure channel between a UICC and an end-point terminal".
[26] ISO/IEC 7816-4: "Identification cards -- Integrated circuit cards -- Part 4: Organization, security
and commands for interchange".
[27] ETSI TS 101 220: "Smart Cards; ETSI numbering system for telecommunication application
providers".
[28] Void.
[29] Void.
[30] Void.
[31] IETF RFC 6655: "AES-CCM Cipher Suites for Transport Layer Security (TLS)".
[32] IETF RFC 5289: "TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter
Mode (GCM)".
[33] IETF RFC 2104: "HMAC: Keyed-Hashing for Message Authentication".
[34] IETF RFC 5280: "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation
List (CRL) Profile".
[35] IETF RFC 6960: "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol -
OCSP".
[36] IETF RFC 6961: "The Transport Layer Security (TLS) Multiple Certificate Status Request
Extension".
[37] IETF RFC 7250: "Using Raw Public Keys in Transport Layer Security (TLS) and Datagram
Transport Layer Security (DTLS)".
[38] IETF RFC 7252: "The Constrained Application Protocol (CoAP)".
[39] National Institute of Standards and Technology (July 1999): "Recommended Elliptic Curves for
Federal Government user".
NOTE: Available at http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf.
[40] IETF RFC 6920: "Naming Things with Hashes".
[41] IETF RFC 3548: "The Base16, Base32, and Base64 Data Encodings".
[42] IETF RFC 5487: "Pre-Shared Key Cipher Suites for TLS with SHA-256/384 and AES Galois
Counter Mode".
[43] IETF RFC 4492: "Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security
(TLS)".
[44] IETF RFC 6066: "Transport Layer Security (TLS) Extensions: Extension Definitions".
ETSI
oneM2M TS-0003 version 1.4.2 Release 1 10 ETSI TS 118 103 V1.1.0 (2016-03)
[45] IETF RFC 7251: "AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for Transport
Layer Security (TLS)".
[46] IETF RFC 5480: "Elliptic Curve Cryptography Subject Public Key Information".
[47] GlobalPlatform Device Technology Secure Element Remote Application Management v1.0
GPD_SPE_008.
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] oneM2M Drafting Rules.
NOTE: Available at http://member.onem2m.org/Static_pages/Others/Rules_Pages/oneM2M-Drafting-Rules-
V1_0.doc.
[i.2] oneM2M TR-0004: "Definitions and Acronyms".
[i.3] Void.
[i.4] ETSI TR 118 508: "Analysis of Security Solutions for the oneM2M System".
[i.5] eXtensible Access Control Markup Language (XACML) Version 3.0. 22 January 2013. OASIS
Standard.
[i.6] Handbook of Applied Cryptography, A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, CRC
Press, 1996.
[i.7] Recommendation ITU-T X.509 (10/2012): "Information technology - Open Systems
Interconnection - The Directory: Public-key and attribute certificate frameworks".
[i.8] Void.
[i.9] OMA-TS-REST-NetAPI-TerminalLocation-V1-0-20130924-A: "RESTful Network API for
Terminal Location", Version 1.0.
[i.10] ISO 3166-1:2013: "Codes for the representation of names of countries and their subdivisions --
Part 1: Country codes".
[i.11] ISO/IEC 7816-5: "Identification cards - Integrated circuit cards - Part 5: Registration of
Application Providers".
[i.12] Guide to Attribute Based Access Control (ABAC) Definition and Considerations, NIST Special
Publication 800-162.
NOTE: Available at http://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf.
ETSI
oneM2M TS-0003 version 1.4.2 Release 1 11 ETSI TS 118 103 V1.1.0 (2016-03)
3 Definitions, symbols and abbreviations
3.1 Definitions
For the purposes of the present document, the terms and definitions given in oneM2M TR-0004 [i.2] and the following
apply:
AE-ID Certificate: certificate with a certificate chain to a trust anchor certificate and containing an AE-ID in the
subjectAltName extension
NOTE: An AE_ID certificate can be used to verify that an entity has been assigned the AE-ID in the certificate.
association configuration: phase of a Security Association Establishment Framework in which the entity establishing
the Security Association (and the Central Key Distribution Server, in the case of Centralized Security Frameworks), are
provided with identities (and any other relevant credentials) to ensure that the security association is established
between the intended entities
association security handshake: phase of a Security Association Framework in which the security association
endpoints perform mutual authentication
bootstrap credential: pre-provisioned credential enabling mutual authentication of the Enrolee and the M2M
Enrolment function
bootstrap credential configuration: phase of a Security Bootstrap Framework in which the Bootstrap Credentials are
pre-provisioned to the Enrolee and the M2M Enrolment function
bootstrap enrolment handshake: phase of a Security Bootstrap Framework in which the Enrolee and M2M Enrolment
Function perform mutual authentication
bootstrap instruction configuration: phase of a Security Bootstrap Framework in which the Enrolee and M2M
Enrolment Function are provided with identities (and any other relevant credentials) to enable the M2M Enrolment
function to establish a Master Credential between the intended Enrolee and M2M Authentication Function
bootstrap server function [13]: BSF is hosted in a network element under the control of a Mobile Network Operator.
BSF, HSS, and UEs participate in GBA in which a shared secret is established between the network and a UE by
running the bootstrapping procedure
NOTE: The shared secret can be used between NAFs and UEs, for example, for authentication purposes.
bootstrapping transaction identifier [13]: bootstrapping transaction identifier (B-TID) is used to bind the subscriber
identity to the keying material in GBA reference points Ua, Ub and Zn
CA-Certificate [i.6]: certificate created by one certification authority (CA) certifying the public key of another CA
certificate: See Public Key Certificate.
certificate chain: sequence of one or more CA-certificates, where: the Public Verification Key in each CA-certificate is
certified in the previous CA-certificate; and the public key of the first CA-Certificate is trusted a priori
NOTE: Trust in the public key in each CA-certificate can be based on trust in the previous CA-Certificate.
certificate name: unique identifier in a name field of a Certificate (e.g. in the X.509 "Subject" or "Subject Alternative
Name" attribute)
certificate verification: process necessary to trust an entity's Certificate
certification authority [i.6]: responsible for establishing and vouching for the authenticity of public keys
NOTE: This includes binding public keys to distinguished names through signed certificates, managing certificate
serial numbers, and certificate revocation.
credential configuration: phase of a Security Association Establishment Framework in which the Credentials
necessary for the Security Association Establishment Framework are configured to the relevant entities and functions
Credential-ID type-ID: portion of a Credential-ID indicating the type of credential being identified
ETSI
oneM2M TS-0003 version 1.4.2 Release 1 12 ETSI TS 118 103 V1.1.0 (2016-03)
CSE-ID certificate: certificate with a certificate chain to a root of trust and containing a CSE-ID in the subjectAltName
extension
NOTE: A CSE_ID certificate can be used to verify that an entity has be
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...