Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAE.3G-33.102(R4-4.3.0) ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2002-10-28 ÃÑÆäÀÌÁö 14
ÇѱÛÇ¥Áظí IMT-2000 3GPP-3G º¸¾È; º¸¾È ¾ÆÅ°ÅØó(R4)
¿µ¹®Ç¥Áظí IMT-2000 3GPP-3G security; Security architecture;4.3.0
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº 3¼¼´ë ¹«¼± ÅÚ·¹Ä¿¹Â´ÏÄÉÀÌ¼Ç ½Ã½ºÅÛÀ» À§ÇÑ º¸¾È ¾ÆÅ°ÅØó ´Ù½Ã ¸»ÇØ, º¸¾È Ư¼º(features)°ú º¸¾È ¸ÞÄ¿´ÏÁòÀ» ¼³¸íÇÏ°íÀÚ ÇÔÀ» ¸ñÀûÀ¸·Î ÇÑ´Ù
IMT-2000 º¸¾È¿¡ ´ëÇÑ ±âÁØÀ¸·Î »ç¿ëÇÒ ¼ö ÀÖ´Ù
º» Ç¥ÁØÀº 3¼¼´ë ¹«¼± ÅÚ·¹Ä¿¹Â´ÏÄÉÀÌ¼Ç ½Ã½ºÅÛÀ» À§ÇÑ º¸¾È ¾ÆÅ°ÅØó ´Ù½Ã ¸»ÇØ, º¸¾È Ư¼º(features)°ú º¸¾È ¸ÞÄ¿´ÏÁòÀ» Á¤ÀÇÇÑ´Ù. º¸¾È Ư¼ºÀ̶õ Çϳª ¶Ç´Â ¸î °³ÀÇ º¸¾È ¿ä±¸»çÇ×À» ¸¸Á·½ÃÅ°´Â ¼­ºñ½º ´É·Â(service capabilities)ÀÌ´Ù. ÀüüÀûÀÎ º¸¾È Ư¼ºÀº "3G Security: Threats and Requirements" (21.133) ¿¡ Á¤ÀǵǾî ÀÖ´Â °Í°ú °°Àº º¸¾È ¿ä±¸»çÇ×À» ¸»ÇÑ´Ù.
ÇϳªÀÇ º¸¾È ¸ÞÄ¿´ÏÁòÀ̶õ ÇϳªÀÇ º¸¾È Ư¼ºÀ» ½ÇÇöÇϱâ À§ÇÏ¿© »ç¿ëµÉ ¼ö ÀÖ´Â ¿ä¼ÒÀÌ´Ù. ¸ðµç º¸¾È Ư¼º°ú º¸¾È ¿ä±¸»çÇ×Àº º¸¾È ¾ÆÅ°ÅØó¸¦ ±¸¼ºÇÑ´Ù.
º¸¾È Ư¼ºÀÇ ÇϳªÀÇ ¿¹´Â »ç¿ëÀÚ µ¥ÀÌÅÍ ºñ¹Ð¼ºÀÌ´Ù. ÀÌ Æ¯¼ºÀ» ±¸ÇöÇϱâ À§ÇÏ¿© »ç¿ëµÉ ¼ö ÀÖ´Â º¸¾È ¸ÞÄ¿´ÏÁòÀ¸·Î derived cipher Å°¸¦ »ç¿ëÇÏ´Â stream cipher°¡ ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à This specification defines the security architecture, i.e., the security features and the security mechanisms, for the third generation mobile telecommunication system.
A security feature is a service capability that meets one or several security requirements. The complete set of security features address the security requirements as they are defined in "3G Security: Threats and Requirements" (TS 21.133 [1]) and implement the security objectives and principles described in TS 33.120 [2]. A security mechanism is an element that is used to realise a security feature. All security features and security mechanisms taken together form the security architecture.
±¹Á¦Ç¥ÁØ 3GPP TS 33.102
°ü·ÃÆÄÀÏ TTAE.3G-33.102(R4-4.3.0).pdf TTAE.3G-33.102(R4-4.3.0).pdf            

ÀÌÀü
60GHz ÁÖÆļö ´ë¿ª °íó¸® ¹°¸® ¹× MAC °èÃþ ¹«¼±·£ ±Ô°Ý(IEEE Std 802.11ad-2012)
´ÙÀ½
Sub 1 GHz ºñ¸éÇ㠴뿪À» »ç¿ëÇÏ´Â ¹«¼±·£ MAC ¹× PHY ±Ô°Ý(IEEE Std 802.11ah-2016)