Cena s DPH / bez DPH
Hlavní stránka>PD CEN/TR 17464:2020 Space. Use of GNSS-based positioning for road Intelligent Transport System (ITS). Security attacks modelling and definition of performance features and metrics related to security
sklademVydáno: 2020-08-11
PD CEN/TR 17464:2020 Space. Use of GNSS-based positioning for road Intelligent Transport System (ITS). Security attacks modelling and definition of performance features and metrics related to security

PD CEN/TR 17464:2020

Space. Use of GNSS-based positioning for road Intelligent Transport System (ITS). Security attacks modelling and definition of performance features and metrics related to security

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
8700 Kč
Anglicky Tisk
Skladem
8700 Kč
Označení normy:PD CEN/TR 17464:2020
Počet stran:62
Vydáno:2020-08-11
ISBN:978 0 539 06545 9
Status:Standard
Popis

PD CEN/TR 17464:2020


This standard PD CEN/TR 17464:2020 Space. Use of GNSS-based positioning for road Intelligent Transport System (ITS). Security attacks modelling and definition of performance features and metrics related to security is classified in these ICS categories:
  • 03.220.20 Road transport
  • 33.060.30 Radio relay and fixed satellite communications systems
  • 35.240.60 IT applications in transport and trade

The objective is to analyse the security issues that can occur at the GNSS SIS level. In order to do so, a full taxonomy of the GNSS SIS attacks are proposed and GNSS SIS attack security model are elaborated and classified. Security metrics for the validation of the GBPT robustness performances are defined.

The proposed methodology for this technical report consists in three distinct steps that are described hereunder:

  • The first step consists in providing a full taxonomy of the possible GNSS Signal in Space attacks (voluntary or not) to be considered and identify their impact at GBPT level;

  • The second step consists in regrouping narrow sets of previously identified GNSS SIS attacks into security attack models. For each security attack model, an assessment of the dangerousness based on beforehand identified key parameters and methodology will be provided;

  • The third step consists in providing definition of performance objectives, security control, security metrics, and a specific procedure for a robustness evaluation of a GBPT against the identified security attack models at step II.