{"id":397204,"date":"2024-10-20T04:28:54","date_gmt":"2024-10-20T04:28:54","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1609-2-2006-2\/"},"modified":"2024-10-26T08:16:26","modified_gmt":"2024-10-26T08:16:26","slug":"ieee-1609-2-2006-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1609-2-2006-2\/","title":{"rendered":"IEEE 1609.2-2006"},"content":{"rendered":"
New IEEE Standard – Inactive-Withdrawn. Secure message formats, and the processing of those secure messages, within the DSRC\/WAVE system are defined. The standard covers methods for securing WAVE management messages and application messages, with the exception of vehicle-originating safety messages. It also describes administrative functions necessary to support the core security functions.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
3<\/td>\n | IEEE Trial-Use Standard for Wireless Access in Vehicular Environments–Security Services for Applications and Management Messages <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Introduction Notice to users <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | CONTENTS <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1. Overview 1.1 Introduction <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 1.2 Scope 1.3 Purpose 1.4 Document organization <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 1.5 Document conventions 2. Normative references <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 3. Defintions, abbreviations, and acronyms 3.1 Definitions <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 3.2 Abbreviations and acronyms <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 3.3 Terminology, applications, implementations, and security manager <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 4. Presentation language 4.1 General <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 4.2 Notation conventions 4.3 Basic block size 4.4 Numbers 4.5 Fixed-length vectors <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 4.6 Variable-length vectors 4.7 The opaque and opaqueExtLength type <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 4.8 Enumerated type <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 4.9 Constructed types 4.10 The case statement <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 4.11 The extern statement 4.12 Flags <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5. Secured Messages 5.1 General 5.2 SecuredMessage type <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.3 SignedMessage, ToBeSignedMessage, and MessageFlags types <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.4 SignedWSM and ToBeSignedWSM types <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.5 PublicKey, PKAlgorithm, and SymmAlgorithm types <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.6 ECPublicKey type 5.7 CertID8 and CertID10 type 5.8 The ApplicationID and FullySpecifiedAppID types <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 5.9 Time64 and Time32 types 5.10 SignerInfo type <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 5.11 Signature type 5.12 ECDSASignature type 5.13 EncryptedMessage, EncryptedContentInfo, and RecipientInfo types <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 5.14 ECIESNISTp256EncryptedKey and AESCCMCiphertext types <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 5.15 WAVECertificate, ToBeSignedWAVECertificate, CertSpecificData, SubjectType, and CRLSeries types <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5.16 WAVECRL, ToBeSignedCRL, CRL Type, and IDAndDate types <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 5.17 WAVECertificateRequest and WAVECertificateResponse types <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 5.18 GeographicRegion and RegionType types <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 5.19 The 2DLocation and 3DLocationAndConfidence types <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 5.20 Certificate Scopes <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 6. Other secured message formats <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 7. Secure message processing 7.1 Required information for security services 7.2 Caches and stores <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 7.3 Signed messages <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 7.4 Processing Encrypted Messages <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 7.5 Processing Signed and Encrypted Messages 8. Specific uses of secured messages 8.1 Secured WSAs <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 8.2 Secured WSMs <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 8.3 Security Manager <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 8.4 Certificate requests <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 8.5 Fragmented messages <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | Annex A (normative) Protocol Implementation Conformance Statement (PICS) proforma <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | Annex B (normative) Summary of message formats <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | Annex C (informative) Examples of message structures <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | Annex D (informative) General description <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | Annex E (informative) Additional security considerations <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | Annex F (informative) Threat model <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | Annex G (informative) Bandwidth considerations and opportunites for optimization <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | Annex H (informative) Copyright statement for Clause 4 <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | Annex I (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Trial-Use Standard for Wireless Access in Vehicular Environments – Security Services for Applications and Management Messages<\/b><\/p>\n |