UNLIMITED FREE
ACCESS
TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

- Trained on our vast library of engineering resources.

ETSI - TR 103 087

Reconfigurable Radio Systems (RRS); Security related use cases and threats

active, Most Current
Organization: ETSI
Publication Date: 1 November 2017
Status: active
Page Count: 119
scope:

The present document provides an analysis of the risk of security attacks on the operation of reconfigurable radio systems. It identifies which security threats can disrupt RRS networks and devices or can induce negative impacts on other radio communication services operating in the same radio spectrum. The present document also identifies stakeholder and assets, which can be potentially impacted by the security threats.

The present document extends the set of use cases addressed over those covered by ETSI TR 103 087 (V1.1.1) [i.30] to cover the following:

• Remote attestation of the Reconfigurable Equipment status (installed RA and DoC).

• Configuration enforcement of reconfigurable equipment.

• Distribution and enforcement of mobility policies.

• Long-term management of devices (in particular orphaned devices).

• Secure device root of trust.

Document History

TR 103 087
November 1, 2017
Reconfigurable Radio Systems (RRS); Security related use cases and threats
The present document provides an analysis of the risk of security attacks on the operation of reconfigurable radio systems. It identifies which security threats can disrupt RRS networks and devices...
June 1, 2016
Reconfigurable Radio Systems (RRS); Security related use cases and threats in Reconfigurable Radio Systems
The present document provides an analysis of the risk of security attacks on the operation of reconfigurable radio systems. It identifies which security threats can disrupt RRS networks and devices...

References

Advertisement