{"id":111990,"date":"2024-10-18T16:19:36","date_gmt":"2024-10-18T16:19:36","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1609-2-2013\/"},"modified":"2024-10-24T22:03:19","modified_gmt":"2024-10-24T22:03:19","slug":"ieee-1609-2-2013","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1609-2-2013\/","title":{"rendered":"IEEE 1609.2 2013"},"content":{"rendered":"
Revision Standard – Active. Secure message formats and processing for use by Wireless Access in Vehicular Environments (WAVE) devices, including methods to secure WAVE management messages and methods to secure application messages are defined in this standard. It also describes administrative functions necessary to support the core security functions.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 1609\u2122.2-2013 front cover <\/td>\n<\/tr>\n | ||||||
3<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Notice to users Laws and regulations Copyrights Updating of IEEE documents Errata Patents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1. Overview 1.1 Scope 1.2 Purpose <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 1.3 Document organization 1.4 Document conventions 1.5 Note to implementers 2. Normative references <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3. Definitions, abbreviations, and acronyms 3.1 Definitions <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 3.2 Abbreviations and acronyms <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4. General description 4.1 WAVE protocol stack overview <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 4.2 Generic security services 4.3 Security processing services 4.3.1 General <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 4.3.2 Secure data exchange <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 4.3.3 Signed WSAs 4.3.4 Processing for security management 4.4 Cryptomaterial 4.4.1 General <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 4.4.2 Private key storage and cryptomaterial handles <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 4.5 Security management services 4.5.1 Certificate Management Entity <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 4.5.2 Provider Service Security Management Entity <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5. Security services 5.1 General 5.2 Preconditions for secure processing 5.2.1 Secure data exchange <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.2.2 Secure WSAs 5.2.2.1 Local service index for security <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 5.2.2.2 Registering secure provider service permissions with PSSME 5.2.3 Cryptomaterial 5.2.3.1 General <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.2.3.2 Initialization 5.2.3.3 Transition to Key Pair Only state <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 5.2.3.4 Transition to Key and Certificate state <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 5.3 Secure data exchange 5.3.1 General <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 5.3.2 Sign data <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 5.3.3 Encrypt data 5.3.4 Sign and encrypt data <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 5.3.5 Decrypt data 5.3.6 Verify signed data <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5.4 Signed WSAs 5.4.1 Sign WSA <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 5.4.2 Verify signed WSA <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 5.5 Validity of signed communications 5.5.1 General <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 5.5.2 Certificate chains 5.5.2.1 General <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 5.5.2.2 Cryptographic verification of certificate chains <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 5.5.3 Permissions and consistency of permissions 5.5.3.1 General 5.5.3.2 Consistency between signed communications and signing certificates 5.5.3.2.1 General <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 5.5.3.2.2 Signed data <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 5.5.3.2.3 Consistency between signed data and transport layers 5.5.3.2.4 Consistency within signed data 5.5.3.2.5 Signed WSA <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 5.5.3.3 Consistency between subordinate certificates and issuing certificates <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 5.5.3.4 Permission encoding: inherited permissions <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 5.5.4 Certificate validity 5.5.4.1 Certificate lifetime 5.5.4.2 Certificate revocation 5.5.4.3 Revoked certificates <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 5.5.4.4 Dubious certificates <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 5.5.5 Relevance and replay tests <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 5.5.6 Local estimates of time and location 5.6 Processing for security management 5.6.1 Certificate request 5.6.1.1 Processing <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 5.6.1.2 Validity of certificate requests <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 5.6.2 Certificate response 5.6.2.1 Processing <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 5.6.2.2 Validity of certificate responses <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 5.6.3 Certificate response acknowledgement 5.6.4 Certificate revocation information 5.6.4.1 Processing flow 5.6.4.2 Validity of CRLs <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 5.6.4.3 Transport 5.7 Certificate Management Entity 5.7.1 General 5.7.2 Certificate revocation information <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 5.7.3 Trust anchor <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 5.7.4 Other certificates 5.8 Cryptographic operations 5.8.1 Signature algorithms 5.8.2 Public key encryption algorithms: ECIES <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 5.8.3 Key pair generation 5.8.4 Key pair validity 5.8.5 Symmetric algorithms: AES-CCM <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 5.8.6 Implicit certificates 5.8.7 Hash algorithms: SHA-256 6. Data structures for secure communication 6.1 Presentation language 6.1.1 General <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 6.1.2 Notation conventions 6.1.3 Basic block size 6.1.4 Numbers 6.1.5 Fixed-length vectors <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 6.1.6 Variable-length vectors 6.1.6.1 Variable-length vectors with fixed-length length encoding <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 6.1.6.2 Variable-length vectors with variable-length length encoding <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 6.1.7 The opaque and opaqueExtLength type <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 6.1.8 Enumerated type 6.1.9 The psid type <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 6.1.10 Constructed types 6.1.11 The select statement <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 6.1.12 The extern statement <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 6.1.13 Flags 6.1.13.1 Use of flags field <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 6.1.13.2 Encoding of flags field <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 6.2 Structures for secure communications 6.2.1 General <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 6.2.2 1609Dot2Data 6.2.3 ContentType <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 6.2.4 SignedData <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 6.2.5 SignerIdentifier 6.2.6 SignerIdentifierType <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 6.2.7 HashedId8 6.2.8 ToBeSignedData <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 6.2.9 Psid 6.2.10 TbsDataFlags 6.2.11 Time64WithStandardDeviation <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 6.2.12 Time64 6.2.13 ThreeDLocation <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 6.2.14 TbsDataExtension 6.2.15 TbsDataExtensionType 6.2.16 Signature 6.2.17 PKAlgorithm <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 6.2.18 EcdsaSignature 6.2.19 EllipticCurvePoint <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | 6.2.20 EccPublicKeyType 6.2.21 SignedWsa 6.2.22 ToBeSignedWsa <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 6.2.23 EncryptedData <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 6.2.24 SymmAlgorithm 6.2.25 RecipientInfo <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 6.2.26 EciesNistP256EncryptedKey 6.2.27 AesCcmCiphertext 6.2.28 ToBeEncrypted <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 6.3 Certificates and other security management data structures 6.3.1 General <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 6.3.2 Certificate <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 6.3.3 ToBeSignedCertificate <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 6.3.4 HolderType <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 6.3.5 CertificateContentFlags 6.3.6 CertificateDuration <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 6.3.7 CertSpecificData 6.3.8 RootCaScope <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 6.3.9 HolderTypeFlags 6.3.10 PsidArray <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 6.3.11 ArrayType 6.3.12 PsidPriorityArray <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 6.3.13 PsidPriority 6.3.14 GeographicRegion <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 6.3.15 RegionType 6.3.16 CircularRegion 6.3.17 RectangularRegion 6.3.18 PolygonalRegion <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 6.3.19 TwoDLocation 6.3.20 SecDataExchCaScope <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 6.3.21 WsaCaScope 6.3.22 CrlSeries <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 6.3.23 IdentifiedNotLocalizedScope 6.3.24 PsidSspArray 6.3.25 PsidSsp <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 6.3.26 IdentifiedScope 6.3.27 AnonymousScope <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 6.3.28 WsaScope 6.3.29 PsidPrioritySspArray <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 6.3.30 PsidPrioritySsp 6.3.31 Time32 6.3.32 PublicKey <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 6.3.33 PublicKeyReconstructionHashInput 6.3.34 CertificateRequest 6.3.35 ToBeSignedCertificateRequest <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 6.3.36 ToBeEncryptedCertificateResponse <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 6.3.37 ToBeEncryptedCertificateRequestError 6.3.38 CertificateRequestErrorCode <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 6.3.39 ToBeEncryptedCertificateResponseAcknowledgment 6.3.40 Crl <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 6.3.41 ToBeSignedCrl <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 6.3.42 CrlType 6.3.43 IdAndDate 6.3.44 CertId10 6.3.45 CrlRequest <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 7. Service primitives and functions 7.1 General comments and conventions <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | Sec-Function-CheckCertificateChainConsistency Sec-Function-VerifyChainAndSignature Sec-Function-DecryptData Sec-Function-CertificateRequestErrrorVerification Sec-Function-CertificateResponseVerification <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 7.2 Sec SAP 7.2.1 Sec-LocalServiceIndexForSecurity.request 7.2.1.1 Function 7.2.1.2 Semantics of the service primitive 7.2.1.3 When generated 7.2.1.4 Effect of receipt 7.2.2 Sec-LocalServiceIndexForSecurity.confirm 7.2.2.1 Function 7.2.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 7.2.2.3 When generated 7.2.2.4 Effect of receipt 7.2.3 Sec-CryptomaterialHandle.request 7.2.3.1 Function 7.2.3.2 Semantics of the service primitive 7.2.3.3 When generated 7.2.3.4 Effect of receipt 7.2.4 Sec-CryptomaterialHandle.confirm 7.2.4.1 Function <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | 7.2.4.2 Semantics of the service primitive 7.2.4.3 When generated 7.2.4.4 Effect of receipt 7.2.5 Sec-CryptomaterialHandle-GenerateKeyPair.request 7.2.5.1 Function 7.2.5.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 7.2.5.3 When generated 7.2.5.4 Effect of receipt 7.2.6 Sec-CryptomaterialHandle-GenerateKeyPair.confirm 7.2.6.1 Function 7.2.6.2 Semantics of the service primitive 7.2.6.3 When generated 7.2.6.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 7.2.7 Sec-CryptomaterialHandle-StoreKeyPair.request 7.2.7.1 Function 7.2.7.2 Semantics of the service primitive 7.2.7.3 When generated 7.2.7.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 7.2.8 Sec-CryptomaterialHandle-StoreKeyPair.confirm 7.2.8.1 Function 7.2.8.2 Semantics of the service primitive 7.2.8.3 When generated 7.2.8.4 Effect of receipt 7.2.9 Sec-CryptomaterialHandle-StoreCertificate.request 7.2.9.1 Function 7.2.9.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 7.2.9.3 When generated 7.2.9.4 Effect of receipt 7.2.10 Sec-CryptomaterialHandle-StoreCertificate.confirm 7.2.10.1 Function 7.2.10.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 7.2.10.3 When generated 7.2.10.4 Effect of receipt 7.2.11 Sec-CryptomaterialHandle-StoreCertificateAndKey.request 7.2.11.1 Function 7.2.11.2 Semantics of the service primitive 7.2.11.3 When generated 7.2.11.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | 7.2.12 Sec-CryptomaterialHandle-StoreCertificateAndKey.confirm 7.2.12.1 Function 7.2.12.2 Semantics of the service primitive 7.2.12.3 When generated 7.2.12.4 Effect of receipt 7.2.13 Sec-SignedData.request 7.2.13.1 Function <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 7.2.13.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | 7.2.13.3 When generated 7.2.13.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 7.2.14 Sec-SignedData.confirm 7.2.14.1 Function <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 7.2.14.2 Semantics of the service primitive 7.2.14.3 When generated <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | 7.2.14.4 Effect of receipt 7.2.15 Sec-EncryptedData.request 7.2.15.1 Function 7.2.15.2 Semantics of the service primitive 7.2.15.3 When generated 7.2.15.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | 7.2.16 Sec-EncryptedData.confirm 7.2.16.1 Function 7.2.16.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | 7.2.16.3 When generated 7.2.16.4 Effect of receipt 7.2.17 Sec-SecureDataContentExtraction.request 7.2.17.1 Function 7.2.17.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | 7.2.17.3 When generated 7.2.17.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | 7.2.18 Sec-SecureDataContentExtraction.confirm 7.2.18.1 Function 7.2.18.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | 7.2.18.3 When generated 7.2.18.4 Effect of receipt 7.2.19 Sec-SignedDataVerification.request 7.2.19.1 Function 7.2.19.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | 7.2.19.3 When generated 7.2.19.4 Effect of receipt 7.2.19.4.1 Overview <\/td>\n<\/tr>\n | ||||||
145<\/td>\n | 7.2.19.4.2 Setting generation time, generation time standard deviation, generation location, expiry time <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | 7.2.20 Sec-SignedDataVerification.confirm 7.2.20.1 Function 7.2.20.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | 7.2.20.3 When generated 7.2.20.4 Effect of receipt 7.2.21 Sec-CRLVerification.request 7.2.21.1 Function 7.2.21.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | 7.2.21.3 When generated 7.2.21.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
151<\/td>\n | 7.2.22 Sec-CRLVerification.confirm 7.2.22.1 Function 7.2.22.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
152<\/td>\n | 7.2.22.3 When generated 7.2.22.4 Effect of receipt 7.2.23 Sec-CertificateRequest.request 7.2.23.1 Function 7.2.23.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
155<\/td>\n | 7.2.23.3 When generated 7.2.23.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
157<\/td>\n | 7.2.24 Sec-CertificateRequest.confirm 7.2.24.1 Function 7.2.24.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
158<\/td>\n | 7.2.24.3 When generated 7.2.24.4 Effect of receipt 7.2.25 Sec-CertificateResponseProcessing.request 7.2.25.1 Function 7.2.25.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
159<\/td>\n | 7.2.25.3 When generated 7.2.25.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
160<\/td>\n | 7.2.26 Sec-CertificateResponseProcessing.confirm 7.2.26.1 Function 7.2.26.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
161<\/td>\n | 7.2.26.3 When generated 7.2.26.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
162<\/td>\n | 7.3 WME-Sec SAP 7.3.1 General 7.3.2 WME-Sec-SignedWsa.request 7.3.2.1 Function 7.3.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
163<\/td>\n | 7.3.2.3 When generated 7.3.2.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
165<\/td>\n | 7.3.3 WME-Sec-SignedWsa.confirm 7.3.3.1 Function 7.3.3.2 Semantics of the service primitive 7.3.3.3 When generated 7.3.3.4 Effect of receipt 7.3.4 WME-Sec-SignedWsaVerification.request 7.3.4.1 Function <\/td>\n<\/tr>\n | ||||||
166<\/td>\n | 7.3.4.2 Semantics of the service primitive 7.3.4.3 When generated 7.3.4.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
169<\/td>\n | 7.3.5 WME-Sec-SignedWsaVerification.confirm 7.3.5.1 Function 7.3.5.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
170<\/td>\n | 7.3.5.3 When generated 7.3.5.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
171<\/td>\n | 7.4 PSSME SAP 7.4.1 PSSME-LocalServiceIndexForSecurity.request 7.4.1.1 Function 7.4.1.2 Semantics of the service primitive 7.4.1.3 When generated 7.4.1.4 Effect of receipt 7.4.2 PSSME-LocalServiceIndexForSecurity.confirm 7.4.2.1 Function 7.4.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
172<\/td>\n | 7.4.2.3 When generated 7.4.2.4 Effect of receipt 7.4.3 PSSME-SecuredProviderService.request 7.4.3.1 Function 7.4.3.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
173<\/td>\n | 7.4.3.3 When generated 7.4.3.4 Effect of receipt 7.4.4 PSSME-SecuredProviderService.confirm 7.4.4.1 Function 7.4.4.2 Semantics of the service primitive 7.4.4.3 When generated 7.4.4.4 Effect of receipt 7.4.5 PSSME-SecureProviderServiceInfo.request 7.4.5.1 Function <\/td>\n<\/tr>\n | ||||||
174<\/td>\n | 7.4.5.2 Semantics of the service primitive 7.4.5.3 When generated 7.4.5.4 Effect of receipt 7.4.6 PSSME-SecureProviderServiceInfo.confirm 7.4.6.1 Function 7.4.6.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
175<\/td>\n | 7.4.6.3 When generated 7.4.6.4 Effect of receipt 7.4.7 PSSME-CryptomaterialHandleStorage.request 7.4.7.1 Function 7.4.7.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
176<\/td>\n | 7.4.7.3 When generated 7.4.7.4 Effect of receipt 7.4.8 PSSME-CryptomaterialHandleStorage.confirm 7.4.8.1 Function 7.4.8.2 Semantics of the service primitive 7.4.8.3 When generated <\/td>\n<\/tr>\n | ||||||
177<\/td>\n | 7.4.8.4 Effect of receipt 7.4.9 PSSME-OutOfOrderDetection.request 7.4.9.1 Function 7.4.9.2 Semantics of the service primitive 7.4.9.3 When generated 7.4.9.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
178<\/td>\n | 7.4.10 PSSME-OutOfOrderDetection.confirm 7.4.10.1 Function 7.4.10.2 Semantics of the service primitive 7.4.10.3 When generated 7.4.10.4 Effect of receipt 7.5 CME SAP 7.5.1 CME-CertificateInfo.request 7.5.1.1 Function 7.5.1.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | 7.5.1.3 When generated 7.5.1.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
181<\/td>\n | 7.5.2 CME-CertificateInfo.confirm 7.5.2.1 Function 7.5.2.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
182<\/td>\n | 7.5.2.3 When generated 7.5.2.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
183<\/td>\n | 7.5.3 CME-AddTrustAnchor.request 7.5.3.1 Function 7.5.3.2 Semantics of the service primitive 7.5.3.3 When generated 7.5.3.4 Effect of receipt 7.5.4 CME-AddTrustAnchor.confirm 7.5.4.1 Function <\/td>\n<\/tr>\n | ||||||
184<\/td>\n | 7.5.4.2 Semantics of the service primitive 7.5.4.3 When generated 7.5.4.4 Effect of receipt 7.5.5 CME-AddCertificate.request 7.5.5.1 Function 7.5.5.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | 7.5.5.3 When generated 7.5.5.4 Effect of receipt 7.5.5.5 Effect of receipt 7.5.6 CME-AddCertificate.confirm 7.5.6.1 Function 7.5.6.2 Semantics of the service primitive 7.5.6.3 When generated 7.5.6.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
186<\/td>\n | 7.5.7 CME-AddCertificateRevocation.request 7.5.7.1 Function 7.5.7.2 Semantics of the service primitive 7.5.7.3 When generated 7.5.7.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | 7.5.8 CME-AddCertificateRevocation.confirm 7.5.8.1 Function 7.5.8.2 Semantics of the service primitive 7.5.8.3 When generated 7.5.8.4 Effect of receipt 7.5.9 CME-AddCrlInfo.request 7.5.9.1 Function 7.5.9.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
188<\/td>\n | 7.5.9.3 When generated 7.5.9.4 Effect of receipt 7.5.10 CME-AddCrlInfo.confirm 7.5.10.1 Function 7.5.10.2 Semantics of the service primitive 7.5.10.3 When generated 7.5.10.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
189<\/td>\n | 7.5.11 CME-CrlInfo.request 7.5.11.1 Function 7.5.11.2 Semantics of the service primitive 7.5.11.3 When generated 7.5.11.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
190<\/td>\n | 7.5.12 CME-CrlInfo.confirm 7.5.12.1 Function 7.5.12.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
191<\/td>\n | 7.5.12.3 When generated 7.5.12.4 Effect of receipt 7.6 PSSME-Sec SAP 7.6.1 PSSME-Sec-CryptomaterialHandle.request 7.6.1.1 Function 7.6.1.2 Semantics of the service primitive <\/td>\n<\/tr>\n | ||||||
192<\/td>\n | 7.6.1.3 When generated 7.6.1.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
193<\/td>\n | 7.6.2 PSSME-Sec-CryptomaterialHandle.confirm 7.6.2.1 Function <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | 7.6.2.2 Semantics of the service primitive 7.6.2.3 When generated 7.6.2.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
195<\/td>\n | 7.7 CME-Sec SAP 7.7.1 CME-Sec-ReplayDetection.request 7.7.1.1 Function 7.7.1.2 Semantics of the service primitive 7.7.1.3 When generated 7.7.1.4 Effect of receipt <\/td>\n<\/tr>\n | ||||||
196<\/td>\n | 7.7.2 CME-Sec-ReplayDetection.confirm 7.7.2.1 Function 7.7.2.2 Semantics of the service primitive 7.7.2.3 When generated 7.7.2.4 Effect of receipt 7.8 Internal functions 7.8.1 General <\/td>\n<\/tr>\n | ||||||
197<\/td>\n | 7.8.2 CME-Function-ConstructCertificateChain 7.8.2.1 Input 7.8.2.2 Output <\/td>\n<\/tr>\n | ||||||
198<\/td>\n | 7.8.2.3 Summary 7.8.2.4 Processing <\/td>\n<\/tr>\n | ||||||
200<\/td>\n | 7.8.3 Sec-Function-CheckCertificateChainConsistency 7.8.3.1 Input 7.8.3.2 Output 7.8.3.3 Summary 7.8.3.4 Processing <\/td>\n<\/tr>\n | ||||||
202<\/td>\n | 7.8.4 Sec-Function-CheckChainPsidsConsistency 7.8.4.1 Input 7.8.4.2 Output 7.8.4.3 Summary 7.8.4.4 Processing 7.8.5 Sec-Function-CheckChainPsidPriorityConsistency 7.8.5.1 Input <\/td>\n<\/tr>\n | ||||||
203<\/td>\n | 7.8.5.2 Output 7.8.5.3 Summary 7.8.5.4 Processing 7.8.6 Sec-Function-CheckChainGeographicConsistency 7.8.6.1 Input <\/td>\n<\/tr>\n | ||||||
204<\/td>\n | 7.8.6.2 Output 7.8.6.3 Summary 7.8.6.4 Processing 7.8.7 Sec-Function-VerifyChainAndSignature 7.8.7.1 Input <\/td>\n<\/tr>\n | ||||||
205<\/td>\n | 7.8.7.2 Output 7.8.7.3 Summary 7.8.7.4 Processing <\/td>\n<\/tr>\n | ||||||
206<\/td>\n | 7.8.8 Sec-Function-DecryptData 7.8.8.1 Input 7.8.8.2 Output 7.8.8.3 Summary <\/td>\n<\/tr>\n | ||||||
207<\/td>\n | 7.8.8.4 Processing 7.8.9 Sec-Function-CertificateRequestErrrorVerification 7.8.9.1 Input <\/td>\n<\/tr>\n | ||||||
208<\/td>\n | 7.8.9.2 Output 7.8.9.3 Summary 7.8.9.4 Processing <\/td>\n<\/tr>\n | ||||||
209<\/td>\n | 7.8.10 Sec-Function-CertificateResponseVerification 7.8.10.1 Input 7.8.10.2 Output <\/td>\n<\/tr>\n | ||||||
210<\/td>\n | 7.8.10.3 Summary 7.8.10.4 Processing <\/td>\n<\/tr>\n | ||||||
212<\/td>\n | Annex A (normative) Protocol Implementation Conformance Statement (PICS) prforma A.1 Instructions for completing the PICS proforma <\/td>\n<\/tr>\n | ||||||
214<\/td>\n | A.2 PICS proforma\u2014IEEE Std 1609.2 <\/td>\n<\/tr>\n | ||||||
224<\/td>\n | Annex B (informative) IEEE 1609.2 security profiles B.1 General <\/td>\n<\/tr>\n | ||||||
225<\/td>\n | B.2 Secure data exchange <\/td>\n<\/tr>\n | ||||||
229<\/td>\n | B.3 IEEE 1609.2 security profile proforma <\/td>\n<\/tr>\n | ||||||
232<\/td>\n | Annex C (normative) IEEE 1609.2 security profile for specific use cases C.1 SAE J2735 Basic Safety Message <\/td>\n<\/tr>\n | ||||||
234<\/td>\n | C.2 WSA <\/td>\n<\/tr>\n | ||||||
236<\/td>\n | Annex D (informative) Example and Use Cases D.1 Examples of encoded data structures <\/td>\n<\/tr>\n | ||||||
240<\/td>\n | D.2 Secure data reception <\/td>\n<\/tr>\n | ||||||
243<\/td>\n | D.3 Certificate request <\/td>\n<\/tr>\n | ||||||
254<\/td>\n | D.4 Signed WSA: full example with certificate request and WSA processing <\/td>\n<\/tr>\n | ||||||
265<\/td>\n | D.5 Processing CRLs <\/td>\n<\/tr>\n | ||||||
267<\/td>\n | D.6 Constructing a certificate chain <\/td>\n<\/tr>\n | ||||||
272<\/td>\n | Annex E (informative) Rationale and FAQ E.1 Introduction E.2 General philosophy <\/td>\n<\/tr>\n | ||||||
275<\/td>\n | E.3 System assumptions made in this standard <\/td>\n<\/tr>\n | ||||||
276<\/td>\n | E.4 Cryptography <\/td>\n<\/tr>\n | ||||||
279<\/td>\n | E.5 Secure data exchange <\/td>\n<\/tr>\n | ||||||
281<\/td>\n | E.6 Signed WSAs <\/td>\n<\/tr>\n | ||||||
284<\/td>\n | E.7 Certificate request <\/td>\n<\/tr>\n | ||||||
285<\/td>\n | E.8 CRL use E.9 Security mechanisms not included in this standard <\/td>\n<\/tr>\n | ||||||
288<\/td>\n | Annex F (informative) Copyright statement for 6.1 <\/td>\n<\/tr>\n | ||||||
289<\/td>\n | Annex G (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Wireless Access in Vehicular Environments Security Services for Applications and Management Messages<\/b><\/p>\n |