id stringlengths 7 13 | title stringlengths 26 396 | type stringclasses 2
values | version stringclasses 152
values | url stringlengths 90 98 | scope stringlengths 0 9.03k |
|---|---|---|---|---|---|
103 885 | Reconfigurable Radio Systems (RRS); Feasibility study on existing spectrum sharing frameworks for temporary and flexible spectrum access | TR | 1.1.2 | http://www.etsi.org/deliver/etsi_tr/103800_103899/103885/01.01.02_60/tr_103885v010102p.pdf | The present study addresses technical approaches for automated spectrum access to support dynamic, temporary, and flexible spectrum sharing. Existing spectrum sharing frameworks (e.g. Citizens Broadband Radio Service (CBRS), Licensed Shared Access (LSA), etc.) are evaluated with regard to their suitability for temporary and flexible spectrum access. To evaluate such suitability, the study identifies and assesses properties and parameters (e.g. for scalable localized dedicated networks) that need to be considered. It includes a gap analysis to identify possible for spectrum access for on-demand use cases. This scope includes nomadic deployments. The applications and use cases described claim a certain, typically high Quality of Service (QoS) but are often limited in range and differ in the duration of operation which can vary from short-term (e.g. some days to some weeks) to long-term (e.g. some weeks to some years). Some use cases allow for prior network planning, others demand very short-term deployment without a prior planning phase. To support the use cases described, the study evaluates: • suitability of sharing frameworks for temporary and flexible spectrum access to support ad hoc and on-demand use cases; • procedures and functionalities for automated spectrum negotiation, assignment, and application specific QoS guarantee; • suitability for the support of scalable localized dedicated networks; • suitability for the support of fixed, nomadic or mobile deployments; and • characteristics, system architectures and high-level procedures for spectrum access for use cases described. If needed, this study proposes evolution and improvement of the existing technical approaches or develops new technical solutions for spectrum sharing. |
103 890 | Speech and multimedia Transmission Quality (STQ); Design of a generic approach to test network performance for OTT conversational voice applications | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103800_103899/103890/01.01.01_60/tr_103890v010101p.pdf | The present document presents the design of a white box model of native OTT voice application using a generic OTT voice application which uses a generic client developed based on commonly used codec/client technology (standardized, open source) with the scope to enable on device, fully controllable testing of a single OTT version using a fully accessible KPIs set. The present document presents the benefits and limitations of such a generic approach, describes how the generic OTT voice application and client are designed, and discusses examples of codec and client adaptation and settings. Description of a framework for a data driven validation of the generic application vs. native OTT application is also provided. Using as example a commonly used mobile native OTT telephony application, the performance results of a generic OTT voice application in terms of quality (MOS scoring), speech path delay, call set up time, call set up failure and drop call are discussed. |
103 891 | Speech and multimedia Transmission Quality (STQ); Parametric non-intrusive QoS evaluation of Cloud Gaming Services over RTP/UDP streaming | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103800_103899/103891/01.01.01_60/tr_103891v010101p.pdf | The scope of the present document is to provide a parametric non-intrusive evaluation of Cloud Gaming Services based on RTP/UDP streaming through the assessment of the QoS of Cloud Gaming users obtained passively by monitoring the network traffic generated using active test devices or by subscribers. Such evaluation also includes service and user detection together with other indicators to assess the ability of the network to deliver the cloud gaming service. The present document leverages the existing Recommendations ITU-T P.1201 [i.1], G.1072 [i.4] and ETSI TR 103 702 [i.6] to provide QoS parameters for users who experience Cloud Gaming Services over RTP/UDP streaming. In particular, it extends Recommendation ITU-T G.1072 [i.4] model, which predicts the expected QoS/MOS for given network conditions and is mainly focused to network design and optimization activities, to user analysis based on non-intrusive passive monitoring, feeding such model with measured or estimated end-user packet loss, round-trip time, inter-arrival jitter, video bitrate, framerate, and further information derived from the game platform capabilities and streaming data. Moreover, the present document, in addition to Recommendation ITU-T H.264 [i.8] characterization provided by Recommendation ITU-T G.1072 [i.4], addresses Recommendation ITU-T H.265 [i.9] (and VP9) video codecs and audio chat. The Recommendation ITU-T G.1072 [i.4]-derived model has been applied to three gaming platforms under several network conditions: Blacknut®, Nvidia GeForce Now®, and Google Stadia®. They delivered objective results in line with the user's subjective. However, the applicability needs to avoid the periods when games are paused or when gamers select game options. In such a situation, the scenes are mostly static, and encoders output a low video bit rate that does not represent the one used to stream the game while in action. The identified QoS parameters refer to the following categories with the aim also of addressing a practical Root Cause Analysis: • Service-Centric (Subscriber IP address, Cloud gaming Platform Name). • Cloud Gaming Session (Platform Start Time, Game Start Time, Streaming Start Time, Play Start Time, Streaming End Time, Streaming Duration). • Media (MOS, Audio/Video Bitrate, Video Framerate, Audio/Video Packets, Audio/Video Downlink/Uplink bytes). • Transport (Network Round Trip Time, Packet Loss Rate, Packet retransmission, Server addresses, Server ports, SSRC). |
103 896 | Satellite Earth Stations and Systems (SES); Considerations on off-axis EIRP density mask applicability for Ka band GSO ESOMPs in relation to potential revision to ETSI EN 303 978 (V2.1.2) | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103800_103899/103896/01.01.01_60/tr_103896v010101p.pdf | The present document aims at studying the implications of reviewing the applicability of the mask for off-axis EIRP density in ETSI EN 303 978 (V2.1.2) [i.9]. |
103 898 | Intelligent Transport Systems (ITS); Communications Architecture; Release 2 | TS | 2.0.0 | http://www.etsi.org/deliver/etsi_ts/103800_103899/103898/02.00.00_60/ts_103898v020000p.pdf | The present document is the baseline for the definition of the Release 2 ITS communications architecture. |
103 899 | Intelligent Transport Systems (ITS); Vehicular Communications; Geographical Area Definition; Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/103800_103899/103899/02.01.01_60/ts_103899v020101p.pdf | The present document specifies the Release 2 of the Geographical Area Definition. |
103 900 | Intelligent Transport Systems (ITS); Facilities Layer; Cooperative Awareness Service; Release 2 | TS | 2.2.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103900/02.02.01_60/ts_103900v020201p.pdf | The present document provides the specification of the Release 2 Cooperative Awareness (CA) service. This includes definition of the syntax and semantics of the Cooperative Awareness Message (CAM) and detailed specifications on the message handling. |
103 901 | PowerLine Telecommunications (PLT); Coexistence of Narrow Band PLT technologies operating in the frequency bands 3kHz to 95 kHz, 95 kHz to 125 kHz and 125 kHz to 140 kHz; [IEEE Std 1901.2TM - 2013, IEEE Standard for Low-Frequency (less than 500 kHz) Narrowband Power Line Communications for Smart grid Applications, Section 10 Coexistence] | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103901/01.01.01_60/ts_103901v010101p.pdf | The present document provides the requirements to support coexistence within the frequency band 3kHz up to 95 kHz, sub-band above 95 kHz up to 125 kHz and sub-band above 125 kHz up to 140 kHz as given in CENELEC EN 50065-1 [i.7] (also referred to as the CENELEC A band, B and C bands), for the following standards: • IEEE Std 1901.2TM [1]. • IEC 61334-3-1 [i.1]. • IEC 61334-4-32 [i.2]. • IEC 61334-5-1 [i.3]. • IEC 61334-5-2 [i.4]. • ISO/IEC 14543-3-5 [i.5]. • ISO/IEC 14908-3 [i.6]. |
103 902 | Intelligent Transport Systems (ITS); ITS Framework; Terms, Symbols and Abbreviations; Release 2 | TR | 2.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103902/02.01.01_60/tr_103902v020101p.pdf | The present document defines all common ITS Release 2 terms, symbols and abbreviations ensuring consistency and compliancy for the ETSI ITS Release 2 specifications. |
103 904 | SmartM2M; SAREF extension investigation Requirements for the Smart Grid domain | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103904/01.01.01_60/tr_103904v010101p.pdf | The present document provides the requirements for an initial semantic model in the Smart Grid domain based on a limited set of use cases and from available existing data models. The present document has been developed in close collaboration with different initiatives in the Smart Grid domain. Further extensions are envisaged in the future to cover entirely such domain. The associated ETSI TS 103 410-12 [i.3] will specify the extension (i.e. the semantic model) for the Smart Grid domain based on the requirements and use cases specified in the present document. |
103 905 | Core Network and Interoperability Testing (INT); VoNR/ViNR and VoLTE/ViLTE interconnection testing for interworking and roaming scenarios with QoS/QoE | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103905/01.01.01_60/ts_103905v010101p.pdf | The present document aims to ensure the verification of various interconnections, including interoperability, interworking, and roaming, in compliance with national and international requirements and Service Level Agreements (SLAs) among operators. Voice over LTE (VoLTE) and Voice over 5G both use the IP Multimedia Subsystem (IMS) framework as defined in 3GPP. Although the IMS framework remains the same, technological advancements in radio, core, and devices are expected to deliver a better user experience in Vo5G compared to VoLTE. Therefore, the end-to-end scenarios and tests for interconnection and roaming described in ETSI TS 103 397 [2] respectively ETSI TS 101 585 [11] remain valid. Additionally the present document provides a series of test suites for Quality of Service (QoS) and Quality of Experience (QoE) based on KPI for voice quality measurements and KPI for voice quality measurements. NOTE: Clauses 4.2, 4.3, 4.4 and 4.5 describe the establishment of connections on the 5G core. This is repeated information which serves solely the purpose of a better understanding of the configurations and use cases defined for VoNR in the present document. |
103 906 | Digital Enhanced Cordless Telecommunications (DECT); Study On Low Data Rate Audio Support | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103906/01.01.01_60/tr_103906v010101p.pdf | The present document provides an investigation on the usage of low bit rates for DECT audio transmissions, e.g. lower data rates voice connections. The present document describes potential uses cases, technical solutions, and options. Especially, aspects such as optimal audio codec frame intervals, optimization of DECT slot formats, channel codec requirements and audio codec requirements are studied in the present document. |
103 907 | Speech and multimedia Transmission Quality (STQ); Test methods for insert type headsets enabled with structure-borne speech capture | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103907/01.01.01_60/tr_103907v010101p.pdf | The present document provides test setups and test methods for headsets, which use human bone conduction as an additional input signal to the air-borne transmitted voice of the near-end talker. The work described in the present document includes test setup description, validation procedures and standardized test methods focusing on the time- variant behaviour of headset devices that utilize bone conduction in their signal processing. |
103 908 | PowerLine Telecommunications (PLT); BPSK Narrow Band Power Line Channel for Smart Metering Applications [CEN EN 14908-3:2006, modified] | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103908/01.01.01_60/ts_103908v010101p.pdf | The present document contains all the information necessary to facilitate the exchange of data and control information over the power line medium between devices that share the same LV transformer(s) within a utility's electricity network. Certain aspects of the present document are defined in other documents. These documents are referenced where relevant. In the case where a referenced standard conflicts with the present document, the present document will prevail. The present document provides the necessary adaptions to the endorsed document [1]. The present scope replaces in its entirety the scope of the endorsed document [1]. |
103 909 | Power Line Telecommunications (PLT) Narrow band transceivers in the range 9 kHz to 500 kHz Power Line Performance Test Method Guide | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103909/01.01.01_60/ts_103909v010101p.pdf | The present document describes test techniques that can be used to determine the performance of narrow band power line communications technologies using any modulation technique in the frequency range 9 kHz to 500 kHz. |
103 910 | Methods for Testing and Specification (MTS); AI Testing; Test Methodology and Test Specification for ML-based Systems | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103910/01.01.01_60/tr_103910v010101p.pdf | The present document describes test types, test items, quality criteria, and testing methodologies associated with testing ML-based systems, with an emphasis on supervised, unsupervised, and reinforcement learning. The present document outlines how these testing practices can be effectively integrated into the life cycle of typical ML-based systems. The present document applies to all types of organizations involved in any of the lifecycle stages of developing and operating ML-based systems as well as to any other stakeholder roles. |
103 916 | Intelligent Transport Systems (ITS); Parking Availability Service; Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103916/02.01.01_60/ts_103916v020101p.pdf | The present document specifies the facility layer service responsible for the generation of dynamic parking availability information in various transport environments (on street, off street, in parking facilities and park & ride stations). The dissemination is intended from a roadside or any other appropriate node, for example a central station. |
103 918 | Intelligent Transport Systems (ITS); Security; Testing; ITS Misbehaviour Reporting; Interoperability tests specification; Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103918/02.01.01_60/ts_103918v020101p.pdf | The present document contains specification of interoperability test descriptions to validate implementations of ETSI TS 103 097 [1], ETSI TS 102 941 [i.3] and ETSI TS 103 759 [2]. |
103 919 | Emergency Communications (EMTEL); Accessibility and interoperability of emergency communications and for the answering of emergency communications by the public safety answering points (PSAPs) (including to the single European Emergency number 112) | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103919/01.01.01_60/ts_103919v010101p.pdf | The present document specifies interoperable and accessible emergency communications, which incorporates voice, video, and real time text. Involvement of originating devices, originating service provider, packet switched emergency communications infrastructure, PSAPs, and supporting services in the emergency communications chain is specified, and the use of the different media. The present document also addresses technical aspects of interoperability between communication services and emergency communication networks, and the interoperability and functionality required to be able to route emergency communications to the most appropriate PSAP. Focus is on SIP and IMS technologies for originating services and SIP technology for the emergency communications systems, while also other technologies are briefly touched. For conversion of modality between sign language and spoken language, the possibility to invoke sign language interpreters in the communication is specified. The emergency communications related requirements on accessible electronic communications are specified in the present document, while the general accessibility requirements on emergency communications are specified in ETSI EN 301 549 [1]. |
103 924 | Optical Network and Device Security Catalogue of requirements | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103924/01.01.01_60/ts_103924v010101p.pdf | The present document provides a catalogue of baseline requirements specific to optical network and devices covering access network, transport network and network management system. The present document presents the functional requirements using the stage 2 model approach outlined in Recommendation ITU-T Q.65 [i.1] and adopts the functional framework for security functions from ETSI TS 102 165-2 [i.2]. |
103 925 | Intelligent Transport Systems (ITS); Testing; Vulnerable Road Users (VRU) awareness; Interoperability tests specification; Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103925/02.01.01_60/ts_103925v020101p.pdf | The present document contains specifications of interoperability test descriptions to validate implementations of ETSI TS 103 300-3 [1]. |
103 926 | Intelligent Transport Systems (ITS); Testing; Collective Perception Service (CPS); Interoperability tests specification; Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103926/02.01.01_60/ts_103926v020101p.pdf | The present document contains specifications of interoperability test descriptions to validate implementations of ETSI TS 103 324 [1]. |
103 927 | CYBER; Cyber Security for Consumer Internet of Things; Requirements for Smart Voice-Controlled Devices | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103927/01.01.01_60/ts_103927v010101p.pdf | The present document defines security provisions for Smart Voice-controlled Device extending from the provisions for consumer IoT devices defined in ETSI TS 103 645 [1]. In terms of security concerns, SVD has a different focus than other generic IoT devices (e.g. distributed sensors, smart appliances, etc.). For example, SVD mainly interacts with users through voice assistants that can understand users' voice commands and assist users to control other devices in the IoT network. This feature actually expands the attack surface of SVD. In addition, SVD usually collects the user's voice and trains a model uniquely suitable for the current user to provide personalized service. Therefore, SVD-related privacy protection issues are particularly prominent. This vertical will focus on addressing the unique security issues of SVD. Annex D gives an architectural diagram of a typical smart home system containing SVD to allow readers of the present document to better understand the position and purpose of SVD in a home network environment. |
103 928 | Cyber Security (CYBER); Cyber Security for Home Gateways; Conformance Assessment of Security Requirements as vertical from Consumer Internet of Things | TS | 1.3.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103928/01.03.01_60/ts_103928v010301p.pdf | The present document specifies a conformance assessment methodology for Home Gateway devices of their security risk mitigation and privacy protection measures against ETSI TS 103 848 [1], addressing the mandatory provisions as well as conditions and complements of the standard by defining test cases and assessment criteria for each provision. The methodology is fully adapted from ETSI TS 103 701 [2], clause 4.3 assessment procedure. Therewith, the ICS of phase 2 defines the applicability of each test, while the present document defines the according IXIT of phase 3. In other words, for the present document, each teststep is worded as "shall" since its applicability is defined in the ICS based on the ICS pro forma in clause A.3. The present document covers the modifications and additions on provisions made in ETSI TS 103 848 [1] and updates the previous version ETSI TS 103 928 [i.2]. The present document intends to support suppliers or implementers of Home Gateway products in first-party assessment (self-assessment), user organizations in second party assessment, independent testing organizations in third party assessment and certification and conformance declaration scheme owners in operating harmonized schemes. Defining a certification or conformance declaration scheme is out of scope of the present document. Multi-medium or highly targeted/sophisticated attacks and thus the invasive analysis of hard- and software modules is out of scope of the present document. The Test Scenarios (TSOs) are targeting basic effort regarding test depth and test circumference in accordance with ETSI TS 103 848 [1] which addresses a baseline security level. Due to the heterogeneity of Home Gateway devices, ETSI TS 103 848 [1] and therefore the associated test groups in the present document are formulated in a generic manner. Thus, the present document does not describe specific tools or detailed step-by-step instructions. The test cases are intended to be performed by competent bodies that have the expertise to derive a suitable test plan. |
103 929 | Cyber Security (CYBER); Mapping of specific requirements of standardisation request for RED articles 3(3)(d), 3(3)(e) and 3(3)(f) to IEC 62443-4-2 requirements and to ETSI EN 303 645 provisions | TS | 1.2.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103929/01.02.01_60/ts_103929v010201p.pdf | The present document provides mapping tables to show which security requirements and provisions from the IEC 62443-4-2 [i.4] and the ETSI EN 303 645 [i.3], respectively, cover the specific requirements from the standardisation request for the RED articles 3(3)(d), 3(3)(e) and 3(3)(f) and are therefore relevant to fulfil the essential requirements given by the RED articles 3(3)(d), 3(3)(e) and 3(3)(f). In addition, so-called transition requirements are provided which help and are to be considered for implementing the transition from product conformity based on provisions from ETSI EN 303 645 [i.3] and/or requirements from IEC 62443-4-2 [i.4] to product conformity based on the RED delegated regulation [i.2]. |
103 930 | Guide for the development of Harmonised Standards falling under article 3.2 of the Radio Equipment Directive (RED); Meteorological and Primary Radars | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103930/01.01.01_60/tr_103930v010101p.pdf | The present document describes the applicability of the technical requirements related to article 3.2 of the RED [i.2] as defined in ETSI EG 203 336 [i.1] for the following types of primary, monostatic radar systems: • ground-based aeronautical radars (e.g. air surveillance radars, surface movement radars and runway debris detection radars); • meteorological radars (e.g. weather radars and wind profilers); • land-based surveillance maritime radars (e.g. coastal and VTS radars); • shipborne maritime radars not falling under the MED Directive [i.8] (i.e. non-SOLAS radars and river radars). The present document also addresses technical issues and provide guidelines (such as spurious emission measurements for waveguide-based systems) for the test procedures related to the applicable technical requirements. |
103 931 | Cyber Security (CYBER); Network Router Security Requirements | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103931/01.01.01_60/ts_103931v010101p.pdf | The present document defines security requirements for the network routers to mitigate the threats analysed in ETSI TR 103 869 [i.1]. |
103 932-1 | CYBER; Consumer Mobile Devices Base PP-Configuration; Part 1: CMD and Biometric Verification | TS | 1.1.2 | http://www.etsi.org/deliver/etsi_ts/103900_103999/10393201/01.01.02_60/ts_10393201v010102p.pdf | The present document is the PP-Configuration for the combination of the Consumer Mobile Device PP and the Biometric Authentication PP-Module. |
103 933 | Access, Terminals, Transmission and Multiplexing (ATTM); Fibre deployment for fibre-based in-premises networking | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103933/01.01.01_60/ts_103933v010101p.pdf | The present document will briefly introduce Fibre-To-The-Room (FTTR) application in home and business building, FTTR system architecture and general requirements of the fibre infrastructure, analyse and evaluate energy consumption, environmental impacts and security, provide guidance for FTTR system design and network planning, FTTR fibre deployment in home and business building (Green, Brown). The present document will also introduce some methods and tools for fibre deployment in premises and acceptance requirements of fibre deployment as practice reference. |
103 935 | Cyber Security (CYBER); Assessment of cyber risk based on products’ properties to support market placement | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103935/01.01.01_60/tr_103935v010101p.pdf | The present document examines the background to the assessment of cybersecurity risks and identifies issues that may arise in the context of placing ICT products and services in the EU Single Market under the applicable legal requirements. Issues relevant to that scope are explored and options identified for possibly consideration in ETSI working practices to addresses these issues. Under the New Legislative Framework (NLF) that governs the placement of products and services in the EU Single Market, harmonised standards provide a path of minimal economic friction for the agile introduction of technological innovations across EU Member States. In turn, risk assessment plays a pivotal role in the development of harmonised standards that, whilst supporting conformance to the applicable legal requirements, are also economically efficient. The importance of harmonised standards to the smooth and efficient design and development of products and services to be placed on the EU Single Market has been recognized by the European Commission and the European Standardization Organizations. Because the assessment of cyber risks is a fundamentally combinatorial exercise, the complexity and time it takes for a European Standardization Organization to identify and analyse the risk that should be considered in the harmonised standards increases exponentially with the scope that the respective legislation covers and the portfolio of ICT products and services it applies to. In simple terms, the greater the range of products and services within the scope of a particular legislation, the larger the set of possible use cases to consider will be, and thus the larger the workload of the risk assessment. The present document presents the framework that underpins the placement of products in the EU Single Market in regard to risk assessment matters. It highlights of the salient features that, in accordance to common knowledge in the domain, good risk assessment approaches demonstrate. It also outlines the most common standards that underpin the application of risk assessment in an international context. In addition, it presents key characteristics of good approaches to the assessment of risks. Finally, it scopes the space of solutions that includes risk assessment approaches fit to inform the development and the application of harmonised standards in support of market placement. The concepts and the approach put forth in the present document are applicable to products, as defined in [i.14], that are or can be described through properties that take distinct values. The present document does not address the estimation of probability distributions that characterize the occurrence of events that contribute to particular risks. More specifically, it assumes that a stable body of knowledge in support of such estimates exists and builds on such estimates, if any, that apply in a given risk assessment scenario. A solution that, for illustration purposes, is shown in Annex A of the present document, assumes that errors in the estimation of numerical boundaries of risk classes follow a normal distribution. However, this assumption serves exclusively illustration purposes and does not restrict the application of the solution under the assumption of a different distribution. Finally, in regard to the ICT industry's recent focus on zero trust [i.41] and vulnerability disclosure: zero trust is beyond the scope of risk assessment, as according to ISO 31000:2018 [i.2], enforcement actions are part of risk treatment, which, while informed by the outcomes of risk assessment, is beyond the scope of risk assessment. Likewise, vulnerability disclosure, whose ecosystem is presented in ETSI TR 104 003 [i.42], while informed by the outcomes of risk assessment, is beyond the scope of the risk assessment process itself. |
103 936 | Cyber Security (CYBER); Implementing Design practices to mitigate consumer IoT-enabled coercive control | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103936/01.01.01_60/tr_103936v010101p.pdf | The present document is an informative ETSI Technical Report (TR) that recommends initial design practices to minimize the potential of coercive control through the use of consumer Internet of Things (IoT) devices. The diversity and proliferation of consumer IoT devices provides new mechanisms that attackers might misuse, and this is a risk that should be addressed by industry. The present document provides emerging design practices through examples and explanatory text for organizations involved in the development and manufacturing of Consumer IoT devices and associated services. The intent of the present document is to identify design practices to minimize potential misuse of Consumer IoT devices and associated services for coercive control whilst not limiting the intended functionality of the device by the user. Although the present document is focused on design practices for Consumer IoT devices, the guidance also applies to multiple other types of smart technologies including but not limited to Smart TVs, alarm systems, stereos, etc. The present document also covers the surrounding eco-system around consumer IoT devices, this includes how related technology, services, and the user behaviour of consumer IoT devices relates to the issues of coercive control. |
103 937 | Cyber Security (CYBER); Cyber Resiliency and Supply Chain Management | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103937/01.01.01_60/tr_103937v010101p.pdf | The present document addresses cyber resiliency throughout the supply chain and the various related frameworks and measures using risk-based, system of trust, and zero trust approaches, including the proposed EU Cyber Resilience Act, [i.1] through [i.8]. |
103 938 | Intelligent Transport Systems (ITS); Vehicular Communications; Basic Set of Applications; Local Dynamic Map (LDM); Release 2 | TS | 2.0.0 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103938/02.00.00_60/ts_103938v020000p.pdf | The present document is the baseline for the Release 2 specification defining the functional behaviour associated with a Local Dynamic Map (LDM) for usage in an ITS Station Unit (ITS-SU). |
103 941 | Short Range Devices (SRD) and Ultra Wide Band (UWB); Measurement setups and specifications for testing under full environmental profile (normal and extreme environmental conditions) | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103941/01.01.01_60/ts_103941v010101p.pdf | The purpose of the present document is to explain and to provide a justification for an additional (radiated or conducted) test (procedure and test sept up arrangement) for devices and applications under the complete (normal and extreme) conditions of the environmental profile. This requirement is proposed to name as "TX behaviour under extreme environmental profile conditions". |
103 942 | Testing (MTS); Security Testing; IoT Security Functional Modules | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103942/01.01.01_60/ts_103942v010101p.pdf | The scope of the present document is designed to guide users and developers involved in the security testing of IoT systems. While the testing approach described is primarily tailored to the IoTAC System Architecture, it can be adaptable to various IoT domains. The present document covers essential aspects of testing, including Functional Testing, Static Application Security Testing (SAST), and Dynamic Application Security Testing (DAST). Furthermore, it proposes a methodology for translating functional and SAST test cases into TDL-TO test purposes. The proposed methodology offers a systematic approach, guiding practitioners through analysing functional test case specifications, mapping the relevant information to TDL-TO concepts, and customizing the SAST ruleset to align with TDL-TO descriptions. By adopting this methodology, organizations can ensure consistency and effectiveness in translating functional and security test cases into TDL-TO test purposes, thereby enhancing the efficiency of their testing processes. The present document goes beyond a theoretical discussion of testing principles by including concrete examples of intra and inter-component Test Purposes (TPs) using TDL-TO [2] as a specification language. It provides tangible applications for developers and users interested in IoT security testing to understand the testing approach better and see how it can be applied in practice. |
103 943 | System Reference document (SRdoc); DECT-2020 NR technology operating in frequency bands below 6 GHz | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103943/01.01.01_60/tr_103943v010101p.pdf | The present document provides information on the intended applications, markets and the technical parameters and functionalities of DECT-2020 NR technology and its deployment capabilities. The SRDoc contains information to support the CEPT activities e.g. for the EC mandate on technical conditions regarding the shared use of the 3,8 to 4,2 GHz frequency band. In addition, the present document contains information and proposals for operation on additional frequency bands outside the 1 880 to 1 900 MHz frequency band. The present document includes the necessary information to support the co-operation between ETSI and the Electronic Communications Committee (ECC) of the European Conference of Post and Telecommunications Administrations (CEPT). |
103 944 | Smart Body Area Network (SmartBAN); Technical Report on Smart Coordinator for SmartBAN Networks | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103944/01.01.01_60/tr_103944v010101p.pdf | The present document is limited to providing information about the smart coordinator operating at the link layer. |
103 945 | Emergency Communications (EMTEL); PEMEA Audio Video Extension | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103945/01.01.01_60/ts_103945v010101p.pdf | The present document describes the PEMEA Audio_Video (PAV) capability, and the need for this functionality. The required entities and actors are identified along with the protocol, specifying message exchanges between entities. The message formats are specified and procedural descriptions of expected behaviours under different conditions are detailed. |
103 946 | Methods for Testing & Specification (MTS); Security validation of IoT architecture application and conformity; Case Study Experiences | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103946/01.01.01_60/tr_103946v010101p.pdf | The goal of the present document is to compile case study experiences related to the security validation and assurance for the integration and conformity of IoT applications with an existing IoT architecture in order to have a common understanding in MTS and related committees and to support trustworthiness. Industrial experiences may cover but are not restricted to the following domains: smart home, smart grid, unmanned air systems, automated driving. |
103 948 | Wireline Access Network Systems; General engineering for existing network reuse; Implementation of IP equipment on existing coaxial networks | TR | 1.1.2 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103948/01.01.02_60/tr_103948v010102p.pdf | The present document supports deployment of video surveillance equipment standardized in ETSI TS 105 176-2 [i.1] and ETSI TR 105 177 [i.2] on existing networks. |
103 949 | Quantum-Safe Cryptography (QSC) Migration; ITS and C-ITS migration study | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103949/01.01.01_60/tr_103949v010101p.pdf | The present document reviews the state of deployment of cryptographic security mechanisms in Intelligent Transport Systems (ITS) and Cooperative Intelligent Transport Systems (C-ITS) and their susceptibility to attack by a quantum computer. The present document makes a number of recommendations regarding the adoption of Quantum Safe Cryptography in order to minimize the exposure of ITS and C-ITS to attack. |
103 950 | Speech and multimedia Transmission Quality (STQ); Gender-related aspects of listening quality and effort in speech communication systems | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103950/01.01.01_60/tr_103950v010101p.pdf | The present document addresses the effects of the speaker's gender-related aspects on transmission quality. It provides recommendations on test procedures and implementation means for future technologies dedicated to human speech communication systems, in order to balance transmission quality among genders. |
103 952 | Smart Body Area Network (SmartBAN); Brain Computer Interface (BCI) | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103952/01.01.01_60/tr_103952v010101p.pdf | The present document is limited to providing information for the brain computer interface use case. The present document discusses proof of concept in the design of the wireless interface for the next-generation of μECoG electrode arrays implanted in the human brain. This includes recording and stimulation of large regions of the brain at a high spatial resolution, as well as energy harvesting, power management, and data communications processing. In particular, the present document focuses on the wireless communication interface. |
103 953 | Cyber Security (CYBER); Guidelines for TLMSP Usage | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103953/01.01.01_60/tr_103953v010101p.pdf | The present document provides guidelines on how to use ETSI TS 103 523-2 [i.6] (TLMSP) in different scenarios; for example, when different application layer protocols are used, or when TLMSP is used for different services. It provides guidelines on the following topics: • How to map different parts of the application layer protocol onto different TLMSP contexts. • Which middlebox functionality that is relevant and how to assign access rights to allow the corresponding middlebox operations. • Suitable trust model(s). • Use of the different optional TLMSP features. • Implementation and usability aspects. |
103 954 | Cyber Security (CYBER); Critical Security Controls for Effective Cyber Defence; Mobile Communications Sector | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103954/01.01.01_60/tr_103954v010101p.pdf | The present document applies the latest version of the Critical Security Controls ([i.10] and [i.15]) for effective risk control and enhanced resilience of the Mobile Communications sector and includes mappings to latest version of the GSMA Security Controls. |
103 956 | Satellite Earth Stations and Systems (SES); Technical analysis for the Radio Frequency, Modulation and Coding for Telemetry Command and Ranging (TCR) of Communications Satellites | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103956/01.01.01_60/tr_103956v010101p.pdf | The present document provides the rationale for the revision of the ETSI TCR Standard ETSI EN 301 926 [i.1] in the following areas: • frequency plan; • operational phases; • hosted payload management application; • mega-constellation application; • spread spectrum modulation; • phase and frequency modulation; and • coding and interleaving. |
103 957 | Cyber Security (CYBER); Metaverse Cyber Security Analysis | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103957/01.01.01_60/tr_103957v010101p.pdf | The present document from the perspective of a use case driven risk analysis, including gaps, applicable to the virtual world (termed Metaverse), respecting environmental constraints, represented as an immersive and constant virtual 3D world where users (people) interact by means of an avatar to carry out a wide range of activities, analyse uniquely new cyber security requirements and technical standards. References to EU/CEPT requirements and ETSI work are provided [i.1] thru [i.5]. |
103 958 | Cyber Security (CYBER); Study Implementation of the Resilience of Critical Entities Directive | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103958/01.01.01_60/tr_103958v010101p.pdf | The present document studies and identifies gaps aimed at implementation guidance for relevant provisions of the EU Resilience of Critical Entities (CER) Directive, especially related to transportation, eHealth, space systems and encryption. |
103 959 | Cyber Security (CYBER); Critical Security Controls for Effective Cyber Defence; Cloud Sector | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103959/01.01.01_60/tr_103959v010101p.pdf | The present document applies the latest version of the Critical Security Controls [i.20] for effective risk control and enhanced resilience of the Cloud Sector and adds mappings to CSA Security Controls and Cloud Data Centre Hardened Image implementations [i.21]. |
103 960 | Cyber Security (CYBER); Implementation of the Digital Operational Resilience Act (DORA) | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103960/01.01.01_60/tr_103960v010101p.pdf | The present document studies the requirements, available standards, tools, and gaps for implementing the DORA (Regulation (EU) 2022/2554 [i.1]) together with guidance relating to the use of encryption and post-quantum safeguards. |
103 961 | CYBER; Optical Network and Device Security; Security provisions for the management of Optical Network devices and services | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103961/01.01.01_60/ts_103961v010101p.pdf | The present document defines security measures for the management of Optical Network devices and services as defined in ETSI TS 103 962 [4] and ETSI TS 103 963 [5]. The present document extends the provisions identified in the Catalogue of Requirements for Optical Network and Device Security from ETSI TS 103 924 [1]. |
103 962 | CYBER; Optical Network and Device Security; Security provisions in Optical Access Network Devices | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103962/01.01.01_60/ts_103962v010101p.pdf | The present document provides the baseline requirements specific to Optical Access Network (OAN) and devices which provides network access service to network service subscribers. The present document extends the provisions identified in the Catalogue of Requirements for Optical Network (ON) and Device Security from ETSI TS 103 924 [1] addressing the security of Access Network (AN) and the Optical Line Terminal (OLT) as the core network equipment in Access Network. The present document gathers the requirements in the form of an Implementation Conformance Statement in Annex A. NOTE: A primacy distinction between OANs and OTNs (see ETSI TS 103 963 [i.17]) is in the lower layer protocols supported by the devices, OANs use GEM or GPON [2], [7] and [8] protocols to deliver client data, whereas OTNs device encode client data which come from an OLT device into an OTN frame transparently. However the optical transmission aspects are not addressed by the present document other than in the required security mechanisms needed to support them. |
103 963 | CYBER; Optical Network and Device Security; Security provisions in transport network devices | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103963/01.01.01_60/ts_103963v010101p.pdf | The present document provides the baseline requirements specific to optical transport network devices. The present document extends the provisions identified in the Catalogue of Requirements for Optical Network and Device Security from ETSI TS 103 924 [1] (see also Annex B of the present document) addressing the optical network entities to optical core/backbone and optical intra-core interfaces. The present document gathers the requirements in the form an Implementation Conformance Statement in Annex A. |
103 964 | Cyber Security (CYBER); A Verifiable Credentials extension using Attribute-Based Encryption | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103964/01.01.01_60/ts_103964v010101p.pdf | The present document defines a new proof method via a challenge-response authentication protocol based on predicate encryption, in particular on Ciphertext Policy-Attribute Based Encryption (CPABE). In this proof method, CP-ABE keys encode attributes, while the expressiveness of CP-ABE policies enables their selective disclosure and/or anonymous proof of predicates over them. Relationship with existing Zero Knowledge Proof [i.16] methods is highlighted. |
103 965 | CYBER; Quantum-Safe Cryptography (QSC); Impact of Quantum Computing on Cryptographic Security Proofs | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103965/01.01.01_60/tr_103965v010101p.pdf | The present document is intended to provide an overview of the impact of quantum computing on the security proofs of several cryptographic protocols. It focuses on cryptographic protocols that can be run on classical hardware; further, it discusses which security proofs are invalidated, or otherwise affected, in the presence of an attacker with access to a CRQC, and discusses for each affected system whether: a) an alternative proof has been found that does provide security against quantum attacks, but possibly with a reduced security level; b) no alternative proof has been found, but security is expected to still hold; c) the cryptographic system is expected to be broken by quantum attacks, in a way which is not captured by the classical security proof, although no concrete quantum attack exists yet; or d) a concrete quantum attack that breaks security, in a way which is not captured by the classical proof, is available. In terms of the security proofs and problems under consideration, the present document includes the following: 1) The quantum random oracle model, and in particular its usage in: a) The Fiat-Shamir transformation. b) The Fujisaki-Okamoto transformation. 2) The rewinding technique for zero-knowledge proof systems. 3) The binding property of commitment schemes. 4) The universal-composability framework. 5) The indifferentiability framework. 6) Security proofs of pseudo-random functions. In addition to presenting the theoretical developments on these topics, the present document elaborates on the practical consequences. In some cases, the security of classically secure schemes is uncertain in the face of a quantum adversary. In other cases, the security of the scheme holds, but the parameters need to be adjusted to retain the same level of security. NOTE: The present document does not discuss so-called "quantum-annoying" schemes, which still base their security on computational problems that can be solved (relatively) efficiently by a quantum computer, but force such an attack to perform a high number of operations, hence making it impractical for the expected first generation of quantum computers. |
103 966 | CYBER Security (CYBER); Quantum-Safe Cryptography (QSC); Deployment Considerations for Hybrid Schemes | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103966/01.01.01_60/tr_103966v010101p.pdf | The present document explores issues around combining traditional and post-quantum algorithms to construct hybrid cryptographic schemes. Specifically, the present document examines some of the reasons for proposing and adopting hybrid schemes, both for key establishment and digital signatures; clarifies some of the terminology used to describe hybrid schemes; discusses some of the security, efficiency, and agility trade-offs; highlights some important things to consider when selecting algorithm and parameter combinations; explores some potential deployment and migration issues; and identifies situations where hybrid schemes will need to be deprecated in favour of purely post-quantum algorithms. The present document does not provide guidance on whether or not to use hybrid schemes. |
103 967 | Cyber Security (CYBER); Quantum-Safe Cryptography (QSC); Impact of Quantum Computing on Symmetric Cryptography | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103967/01.01.01_60/tr_103967v010101p.pdf | The present document gives an overview of the impact of quantum computing on symmetric algorithms such as block ciphers and hash functions. It discusses the practicality of parallelising Grover's algorithm, the effect of limiting quantum circuit depth, and the overhead from quantum error correction. The present document supplements ETSI GR QSC 006 [i.1] by summarizing quantum resource estimates for attacks against widely used symmetric algorithms with reasonable circuit depth assumptions. It also provides guidance on the need to increase symmetric key lengths for a range of different use cases. |
103 969 | Intelligent Transport Systems (ITS); NR-V2X and LTE-V2X Access layer in the 5 GHz frequency band; Test Specification; Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103969/02.01.01_60/ts_103969v020101p.pdf | The present document specifies the minimum requirements to demonstrate compliance with ETSI EN 303 798 [1]. |
103 972 | DVB-I service delivery over 5G Systems; Deployment Guidelines | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103972/01.01.01_60/tr_103972v010101p.pdf | The present document maps the commercial use cases and requirements from DVB BlueBook C100 [i.1] into deployment guidelines including a reference deployment architecture. |
103 973 | Coded Multisource Media Format (CMMF) for Content Distribution and Delivery | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103973/01.01.01_60/ts_103973v010101p.pdf | The present document specifies a Coded Multisource Media Format (CMMF) container. This format is used to support storage and delivery of linear, network or channel coded multisource audio/video media over networks. It also specifies the xCD-1 linear coding type. The present document also includes examples. |
103 976 | Interface for Lawful Disclosure of vehicle-related data | TS | 1.5.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103976/01.05.01_60/ts_103976v010501p.pdf | The present document defines an interface between two parties to make lawful requests for data relating to vehicles, and to respond to those requests where appropriate. The usage of the interface does not jeopardize the safety and security of the vehicles involved and takes into account the boundaries of the responsibilities of the parties involved. |
103 715 | SmartM2M; Study for oneM2M; Discovery and Query solutions analysis & selection | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103700_103799/103715/01.01.01_60/tr_103715v010101p.pdf | |
103 744 | CYBER; Quantum-Safe Cryptography (QSC); Quantum-safe Hybrid Key Establishment | TS | 1.2.2 | http://www.etsi.org/deliver/etsi_ts/103700_103799/103744/01.02.02_60/ts_103744v010202p.pdf | The present document specifies several methods for deriving cryptographic keys from multiple shared secrets. The shared secrets are established using existing traditional key establishment schemes, like Elliptic Curve Diffie-Hellman (ECDH) in NIST SP800-56Ar3 [1], and new quantum-safe Key Encapsulation Mechanisms (KEMs). |
103 836-6-1 | Intelligent Transport Systems (ITS); Vehicular Communications; GeoNetworking; Part 6: Internet Integration; Sub-part 1: Transmission of IPv6 Packets over GeoNetworking Protocols for ITS-G5; Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/103800_103899/1038360601/02.01.01_60/ts_1038360601v020101p.pdf | The present document specifies the transmission of IPv6 packets over the ETSI GeoNetworking protocol for ITS-G5 and as defined in ETSI TS 103 836-4-1 [6] via a protocol adaptation sub-layer referred to as the GN6ASL (GeoNetworking to IPv6 Adaptation Sub-Layer). The scope of the present document is limited to the GN6ASL. NOTE 1: The mechanisms specified in the present document utilize capabilities of IEEE 802 technologies only, such as VLAN defined in IEEE 802.1Q [27]. The techniques specified in the present document fulfil the requirements for GeoNetworking and IPv6 integration described in ETSI TS 103 836-1 [2]. In particular, these techniques allow for the transport of IPv6 packets by ETSI GeoNetworking protocol given in ETSI TS 103 836-4-1 [6], enabling sub-IP multi-hop delivery of IPv6 packets, e.g. in a vehicular network. As a result, the connectivity provided by points-of-attachment to IPv6 infrastructure networks is extended by means of mobile relay nodes. In addition to that, the techniques described in the present document allow for geocasting of IPv6 multicast packets. The scope of the GN6ASL is limited to the fulfilment of the requirements for GeoNetworking and IPv6 integration described in ETSI TS 103 836-1 [2], clause 5.9, by enabling an ITS station including a GeoAdhoc router as given in ETSI TS 103 836-4-1 [6] running the GeoNetworking protocol and an IPv6-compliant protocol layer to: • exchange IPv6 packets with other ITS stations; • acquire globally routable IPv6 unicast addresses and communicate with an arbitrary IPv6 host located in the Internet, whenever an ITS station including a GeoAdhoc router and including or connected to an access router [4] providing IPv6 connectivity to the Internet is reachable directly or via other relay ITS stations; • perform the operations required by IETF RFC 3963 [13] for a Mobile Router whenever: a. an ITS mobile router supporting Network Mobility Basic Support (NEMO BS) as defined in IETF RFC 3963 [13] is present in the ITS station and runs on top of the GN6ASL; and b. an ITS station including a GeoAdhoc router and including or connected to an access router as defined in ETSI TS 103 836-3 [4] providing IPv6 connectivity to the Internet is reachable directly or via other relay ITS stations. NOTE 2: The present document adopts the definition of "IPv6-compliant" and "sub-IP multi-hop delivery" introduced in clause 3.1. Extending the IPv6 basic standards IETF RFC 8200 [7], IETF RFC 4291 [8], IETF RFC 4007 [9], IETF RFC 4861 [10] and IETF RFC 4862 [12] to support new features is outside the scope of the present document. Extensions to NEMO BS as given in IETF RFC 3963 [13] are outside the scope of the present document. Mechanisms for the dissemination of IPv6 routing information for hosts and routers not directly attaching to the network where GeoNetworking is used are outside the scope of the present document (e.g. discovery of IPv6 in-vehicle prefixes). However, the present document aims at providing the underlying support for the dissemination of such routing information, i.e. IPv6 multicast support for the network where the GeoNetworking protocol is used. With respect to IPv6 multicast and anycast support, the present document is limited to the support required to enable distribution of IPv6 multicast and anycast traffic on a shared link. Amendments to specific IPv6 multicast forwarding mechanisms are out of the scope of the present document. However, the present document aims at not preventing existing IPv6 multicast forwarding mechanisms from being used in conjunction with the GN6ASL. In order to facilitate the deployment of ITS systems, the present document aims at maintaining backward compatibility with pre-existent IPv6-compliant protocol implementations and NEMO BS implementations compliant with IETF RFC 3963 [13]. A usage example of NEMO BS with the GN6ASL is presented in the informative annex F. The mechanisms specified in the present document are distinct from but compatible with the IPv6-related functionalities given in ISO 21210-2012 [i.16], which specifies how IPv6 networking is generally operated in ITS stations. The techniques described in the present document provide a way to transport IPv6 packets that is fully compatible with the IPv6 specifications and pre-existing implementations, and hence is compatible with ISO 21210-2012 [i.16]. ETSI ETSI TS 103 836-6-1 V2.1.1 (2024-07) 9 |
103 977 | RFID Measurement methods for transmit spectrum using modern spectrum analysers | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103977/01.01.01_60/tr_103977v010101p.pdf | The present document specifies technical characteristics and methods of measurements for Radio Frequency IDentification (RFID) devices used in the frequency ranges 865 MHz to 868 MHz and 915 MHz to 921 MHz. Power limits up to a maximum of 2 W e.r.p. are specified for this equipment in the frequency band 865 MHz to 868 MHz and up to a maximum of 4 W e.r.p. in the frequency band 915 MHz to 921 MHz. NOTE: The term frequency band is typically used for reference to dedicated bands as described in CEPT ECC ERC Recommendation 70-03 [i.7], while frequency range is used in the other cases. While ETSI EN 302 208 [i.2] covers a comprehensive set of technical characteristics and methods of measurements, the focus of the present document is on transmitter spectrum mask using modern spectrum analysers, and ETSI EN 302 208 [i.2] applies for all other aspects. The types of equipment covered by the present document are as follows: • fixed interrogators; • portable interrogators. The present document contains measurement methods to demonstrate that the specified radio equipment both effectively uses and supports the efficient use of radio spectrum in order to avoid harmful interference. |
103 849 | SmartM2M; Smart Escalator IoT System | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103800_103899/103849/01.01.01_60/ts_103849v010101p.pdf | The present document specifies the IoT communication aspects for escalators and moving walkways (i.e. the Escalators System). For the rest of the present document the term escalator will be used to indicate both proper escalators and moving walkways. The present document defines the elements involved in such communications and their relations, from the central cloud level to the Smart Escalator Installations, including the integration with administrative information, the integration of Smart Escalator Systems not conformant to the present document (non-standard and legacy installations), and the integration of application targeting human users. The present document is intended to enable the similar use cases in ETSI TR 103 546 [i.3] and more in general aiming to support all the major use cases and requirements in the context of smart escalators. It deals with the architectural aspect of the communication and the set of information that is needed to assure interoperability across installations and platforms but does not specify the specific applications that are using this information. These applications are left to the market together with the extended set of information that are specific of each technology and may differ amongst providers. The Smart Escalator System communication relies on existing specification that are referenced in the present document (i.e. the oneM2M standard suite), but the definition of the element and the information to be exchanged is kept independent from underlaying communication framework and technology, to minimize the impact of the evolution of the communication framework on the information managed by the smart escalator. This approach allows also the delegation of basic important functionalities (e.g. security, management, use of different IT and telecommunication means, platforms and semantic interoperability support) to the underlaying communication framework, to evolve and adapt to the technology evolution without impacting directly the present document. |
103 986 | Publicly Available Specification (PAS); A1 interface: Transport Protocol (O-RAN.WG2.A1TP-R004-v03.03) | TS | 3.3.0 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103986/03.03.00_60/ts_103986v030300p.pdf | The present document specifies the transport protocol stack for the A1 interface. |
103 987 | Publicly Available Specification (PAS); A1 interface: Application Protocol (O-RAN.WG2.A1AP-R004-v04.03) | TS | 4.3.0 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103987/04.03.00_60/ts_103987v040300p.pdf | The present document specifies the application protocol of the A1 interface. It includes service definitions and API definitions for the A1 policy management service (A1-P) and the A1 enrichment information service (A1-EI). |
103 988 | Publicly Available Specification (PAS); A1 interface: Type Definitions (O-RAN.WG2.A1TD-R004-v09.0.0) | TS | 9.0.0 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103988/09.00.00_60/ts_103988v090000p.pdf | The present document specifies the data model and the data types that are used in the body of the procedures in the A1 interface. |
103 985 | Publicly Available Specification (PAS); A1 interface: Use Cases and Requirements (O-RAN.WG2.A1UCR-R004-v01.04) | TS | 1.4.0 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103985/01.04.00_60/ts_103985v010400p.pdf | The present document specifies the use cases and requirements for the A1 interface. |
103 989 | Publicly Available Specification (PAS); A1 interface: Test Specification (O-RAN.WG2.A1TS-R004-v04.02) | TS | 4.2.0 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103989/04.02.00_60/ts_103989v040200p.pdf | The present document specifies test cases for conformance testing and interoperability testing of the Non-RT RIC and the Near-RT RIC over the A1 interface. |
103 990 | Cyber Security (CYBER); Standards mapping and gap analysis against regulatory expectations | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/103900_103999/103990/01.01.01_60/tr_103990v010101p.pdf | The present document provides a standards gap analysis against the regulatory expectations of a number of extant, planned, or in development, regulatory instruments in order to identify where existing standards can be used in support, or where new standards are required to enable regulatory conformance. The primary focus of the present document is the Cyber Resilience Act [i.1] with some consideration of the NIS2 Directive [i.2] and the Cyber Security Act (CSA) [i.3]. NOTE 1: The mapped standards listed in clause 2, whilst they are not directly applicable to the application of the present document, are identified as satisfying in whole or in part, one or more of the regulatory expectations identified. NOTE 2: Matters related to EU policy are not addressed by the present document. |
103 992 | Cyber Security (CYBER); Implementation of the Revised Network and Information Security (NIS2) Directive applying Critical Security Controls | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103992/01.01.01_60/ts_103992v010101p.pdf | The present document describes an ensemble of cyber security specifications and other materials, especially the ETSI Critical Security Controls in ETSI TR 103 305-1 [i.9] that can be applied to support NIS2 Directive [i.1] requirements by EU Member States and affected essential and important entities. The present document also considers, and makes reference to, the work being done by ETSI ESI on Trust Services. |
103 993 | Cyber Security (CYBER); ONDS Test Suite Structure and Test Purposes | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103993/01.01.01_60/ts_103993v010101p.pdf | The present document defines Test Purposes for ETSI TS 103 962 [1] and ETSI TS 103 963 [2] written in the format of a TSS&TP using the notation TPLan (ETSI ETR 266 [i.8], ETSI ES 202 553 [3]) extended to address the description of test purposes taking into account requirements from Common Criteria Part 2 [8]. The latter is necessary to support conformity to the EUCC programme (for each of CRA [i.1] and NIS2 [i.2] in addition to the CSA [i.3]). |
103 994-1 | Cyber Security (CYBER); Privileged Access Workstations; Part 1: Physical Device | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/10399401/01.01.01_60/ts_10399401v010101p.pdf | The present document provides requirements that are specific enough to define the desired security outcomes, but flexible enough that there can be innovation and different ways for how they can be achieved. Whilst it is initially targeted towards the Telecoms Sector, the principles are designed to be industry agnostic. The present document covers the device only. Additional documents will cover other aspects of PAWs that can work in conjunction with each other to meet the needs of the overall system architecture and achieve the relevant security aims. |
103 994-2 | Cyber Security (CYBER); Privileged Access Workstations; Part 2: Connectivity | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/10399402/01.01.01_60/ts_10399402v010101p.pdf | The present document provides requirements that are specific enough to define the desired security outcomes, but flexible enough that there can be innovation and different ways for how they can be achieved. Whilst it is initially targeted towards the Telecoms Sector, the principles are designed to be industry agnostic. The present document covers the connectivity and follows on from Part 1 - Devices [1]. Additional documents will cover other aspects of PAWs that can work in conjunction with each other to meet the needs of the overall system architecture and achieve the relevant security aims. |
103 994-3 | Cyber Security (CYBER); Privileged Access Workstations; Part 3: System Integration | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/10399403/01.01.01_60/ts_10399403v010101p.pdf | The present document provides requirements that are specific enough to define the desired security outcomes, but flexible enough that there can be innovation and different ways for how they can be achieved. Whilst it is initially targeted towards the Telecoms Sector, the principles are designed to be industry agnostic. The present document covers system integration and follows on from ETSI TS 103 994-1 - Devices [1] and ETSI TS 103 994-2 - Connectivity [2]. This series of documents will cover different aspects of PAWs that can work in conjunction with each other to meet the needs of the overall system architecture and the relevant security aims. |
103 996 | Cyber Security (CYBER); EUCC PP for Optical Network and Device Security (ONDS) | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103996/01.01.01_60/ts_103996v010101p.pdf | The present document defines the test cases in the form of evaluation criteria and PP/CC evaluation tests resulting from the Test Purposes identified for ETSI TS 103 962 [1] and ETSI TS 103 963 [2] in ETSI TS 103 993 [3]. In combination with the base standard (including its ICS statement), and the TSS&TP in ETSI TS 103 993 [3] this serves as a complete ONDS specification to allow use in the EUCC regime [10] or equivalent under Common Criteria (CC) as a Protection Profile (PP) [4]. NOTE 1: The present document adopts the style and much of the structure of a PP adapted to conform to the ETSI Stylesheet. NOTE 2: The present document is structured in such a way to form part of the EUCC [10] submission. NOTE 3: The present document addresses the assurance levels identified in CSA [i.26] for EUCC [10] as Substantial (Article 52.6 of [i.26]). NOTE 4: In the present document the requirements from ETSI TS 103 962 [1] and ETSI TS 103 963 [2] in the conventional ETSI format are highlighted against the most relevant SFRs from CC-Part 2 [5] in clauses 8 and 9 and in Annex B. NOTE 5: The present document uses both ETSI style NOTEs that give additional information but are not mandatory, and CC style Application notes that also give additional information but in a more formal way than the ETSI NOTE as an evaluation body is expected to address the content of the application note and to give a justification if the content is ignored. |
103 998 | Publicly Available Specification (PAS); DASH-IF: Content Steering for DASH | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/103900_103999/103998/01.01.01_60/ts_103998v010101p.pdf | The present document specifies Content Steering for DASH. |
103 999-1 | Smart Secure Platform (SSP); Part 1: Test Specification, general characteristics (Release 15) | TS | 15.2.0 | http://www.etsi.org/deliver/etsi_ts/103900_103999/10399901/15.02.00_60/ts_10399901v150200p.pdf | The present document specifies the test descriptions, test environment and conformance requirements for services running in the Smart Secure Platform and in any terminal hosting a Smart Secure Platform application. The present document specifies the test descriptions for: • SSP characteristics • Physical interfaces • SSP common layer • Secure SCL • Communication layers above SCL of the SSP. Tests for the usage or an SSP different to what is defined in ETSI TS 103 666-1 [1] are out of scope of the present document. |
103 999-2 | Smart Secure Platform (SSP); Part 2: Integrated SSP (iSSP) characteristics Test Specification (Release 15) | TS | 15.0.0 | http://www.etsi.org/deliver/etsi_ts/103900_103999/10399902/15.00.00_60/ts_10399902v150000p.pdf | The present document details the test specifications for the Smart Secure Platform (SSP) integrated into an SoC, also known as iSSP. It specifies the test environment to verify conformance requirements for services running in the Smart Secure Platform and in any terminal hosting a Smart Secure Platform application as defined in ETSI TS 103 666-1 [9] focusing on the specific attributes that are defined for the iSSP in ETSI TS 103 666-2 [10]. |
104 000 | Lawful Interception (LI); Internal Network Interface X0 | TS | 1.3.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104000/01.03.01_60/ts_104000v010301p.pdf | The present document defines an electronic interface for the exchange of information relating to the establishment and management of Lawful Interception. Typically, this interface would be used between a central LI administration function and the network internal interception points. Typical reference models for LI define an interface between Law Enforcement Agencies (LEAs) and Communication Service Providers (CSPs), called the handover interface. They also define an internal network interface within the CSP domain between administration and mediation functions for lawful interception and network internal functions, which facilitates the interception of communication. This internal network interface typically consists of sub-interfaces; initial configuration of the network internal elements of lawful interception (X0), administration (called X1), transmission of intercept related information (X2), transmission of content of communication (X3). The present document specifies the X0 interface for configuration of the network elements of lawful interception. It also covers the needs of the virtualized environments and specifies the initial trust establishment of the LI interfaces to secure that LI functions get identities (certificates) for LI only after being verified (e.g. using attestation) and endorsed for LI use. The present document is tightly related to the ETSI Lawful Interception Architecture, ETSI TS 104 007 [2]. ETSI TS 104 007 [2] describes the architecture for the LI system and the new X0 interface used for building trust and setup of the X1/2/3 interfaces, the present document specifies the role and detailed definition of interface X0 and how it couples with interfaces X1/2/3. The present document and ETSI TS 104 007 [2] plug together and give a complete model of the LI system. X0 is characterized in standard documents ETSI GR NFV SEC-011 [i.1] and 3GPP TS 33.127 [i.3] through descriptions and requirements. |
104 001 | Open Smart Grid Protocol (OSGP); Smart Metering/Smart Grid Communication Protocol | TS | 2.2.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104001/02.02.01_60/ts_104001v020201p.pdf | The present document is a revision of ETSI TS 104 001. ETSI TS 104 001 was initially a revision of ETSI GS OSG 001 [i.5], which was originally created under the ETSI ISG OSG. The previous version of ETSI TS 104 001 was prepared by the TC PLT, but it now falls under the responsibilities of TC ATTM. This update is to ensure proper references to ANSI, IEEE and MC. |
104 002 | Publicly Available Specification (PAS); DASH-IF Forensic A/B Watermarking An interoperable watermarking integration schema | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104002/01.01.01_60/ts_104002v010101p.pdf | The present document specifies DASH-IF Forensic A/B Watermarking. |
104 003 | Cyber Security (CYBER); The vulnerability disclosure ecosystem | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104003/01.01.01_60/tr_104003v010101p.pdf | The present document provides an overview of the history and facets of the cyber vulnerability disclosure ecosystem. The overview includes the history of this activity, the concepts and specifications that emerged, the diverse venues and use cases, imposed obligations, and the technological and social challenges faced. |
104 004 | Environmental Engineering (EE); Processor power management functionality of servers | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104004/01.01.01_60/tr_104004v010101p.pdf | The present document is focused on addressing the characterization of the process power management functionality of servers. The processor power management of servers is limited to those within scope of Commission Regulation (EU) 2019/424 [i.1]. |
104 005 | Secure Element Technologies (SET); Technical Report on impacts of the post-quantum cryptography on ETSI TC SET specifications | TR | 1.2.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104005/01.02.01_60/tr_104005v010201p.pdf | The present document analyses the mechanisms that use cryptography in the specifications under ETSI TC SET responsibility. It describes the potential changes for a responsible industry transition to Quantum-Safe technology. |
104 006 | Rail Telecommunications (RT); Future Railway Mobile Communication System (FRMCS); Study on Onboard Radio Interface (OBrad) | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104006/01.01.01_60/tr_104006v010101p.pdf | The present document is a study of the Onboard Radio Interface (OBRAD). The following is covered: • An analysis of the requirements on OBRAD captured in UIC FRMCS TOBA FRS [i.1], UIC FRMCS SRS [i.3] and other relevant UIC specifications. • An analysis and identification of available protocols, suitable for OBRAD Data Transport protocol and OBRAD Management and Control protocol. • A proposal on potential solution(s) and possible technical realization(s), covering the physical and functional OBRAD interface as well as physical implementations of the OBRAD interface. • An analysis of the impact of the proposed OBRAD solution/realization to chipset, On-Board FRMCS architecture (Gateway Function, Radio Function, Operation and Maintenance) and migration aspects (existing versus new installations). • An analysis of the capability of the proposed OBRAD solution/realization for performance aspects like responsiveness of the interface, latency, timing, and for availability (redundancy) aspects. |
104 007 | Lawful Interception (LI); Lawful Interception Architecture | TS | 1.2.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104007/01.02.01_60/ts_104007v010201p.pdf | The present document on Lawful Interception architecture provides an overview of the technical framework and components involved in facilitating lawful interception of communications for law enforcement agencies. The present document outlines the key principles, standards, and protocols governing lawful interception, including the roles and responsibilities. |
104 008 | Methods for Testing & Specification (MTS); Continuous Auditing Based Conformity Assessment for AI-enabled systems | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104008/01.01.01_60/ts_104008v010101p.pdf | The present document specifies the key aspects of Continuous Auditing-Based Conformity Assessment (CABCA) as an audit methodology to evaluate and assess an AI system's conformity to relevant standards and regulations in a continuous manner. The present document applies to all types of organizations involved in the quality management of any of the lifecycle stages of AI systems as well as to any AI stakeholder roles. The present document specifies: • Principles underlying CABCA, including independence, reliability, stakeholder trust and transparency. • CABCA assessment process, covering architecture, roles and procedures. • Outcome of the assessments, including the issuance or revocation of conformity status. |
104 011 | Reconfigurable Radio Systems (RRS) Dynamic Spectrum Allocation Service (DSAS) System Requirements | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104011/01.01.01_60/ts_104011v010101p.pdf | The present document specifies system requirements for the Dynamic Spectrum Allocation Service (DSAS) to support dynamic, temporary, and flexible spectrum sharing in an efficient, automated, and frequency and technology agnostic way based on the analysis introduced in ETSI TR 103 885 [i.1]. The report considers existing systems such as Automated Frequency Coordination (AFC), evolved License Shared Access (eLSA), or Citizens Broadband Radio Service Spectrum Access System (CBRS SAS), which could need to be adapted or simplified instead of developing a new system from scratch. It outlines which features of the previously mentioned systems can be removed, because they are unnecessary in the context of the intended use cases, and which features need to be added to fill identified gaps. In addition, the frequency ranges currently covered by AFC, eLSA, and CBRS SAS will be extended to other frequency ranges. Functional and technical requirements of the DSAS are described and defined for two different coordination approaches: • Inter-system coordination (INC): a sharing framework between different communication systems, in which Primary Users (PU) of the relevant frequency bands are protected against all users of lower tiers (i.e. Non-Primary Users (NPUs)).NPUs access is granted without any guaranteed level of Quality of Service (QoS). When only INC is enforced, NPUs may be requested to change their RF parameters and their overall system performance during their operation time. INC is comparable with the determination of available channels and its operational parameters on which a NPU device is allowed to operate at its geographic coordinates. • Intra-system coordination (IRC): a sharing framework in which PUs of the relevant frequency bands get protected against all user of lower tiers (NPUs) and NPUs are getting coordinated to minimize interference between them and to guarantee a certain level of QoS. The level of QoS experienced by the NPUs depends on its prioritization, the current demand for spectrum, the neighboring situation, and maybe the price the user is willing to pay. IRC is comparable with a channel assignment/licensing including its operational parameters to NPU devices at its geographic coordinates. The requirements captured in the present document are described in a technology neutral manner and are applicable for any wireless technology. DSAS enables dynamic spectrum sharing in any frequency band that is assigned for coordinated sharing. |
104 012 | Reconfigurable Radio Systems (RRS); Feasibility study of the usage of software reconfiguration for Radio Equipment Directive and Proposal for Cyber Resilience Act | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104012/01.01.01_60/tr_104012v010101p.pdf | The present document analyses the applicability of available ETSI deliverables on Software Reconfiguration to the implementation of regulation initiatives currently under way, including specifically: • Radio Equipment Directive Article 3(3)(i) and Article (4) [i.16]. NOTE: One aspect of those Articles relates to the combination of Software and Hardware. • Cyber Resilience Act [i.17]. |
104 013 | Cyber Security (CYBER); EUCC PP for ONDS management protocols and services | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104013/01.01.01_60/ts_104013v010101p.pdf | The present document is a protection profile for ONDS management of devices as described in ETSI TS 103 961 [1] and supporting management of devices described in ETSI TS 103 962 [2], ETSI TS 103 963 [3]. The Security Functional Requirements (SFRs) are extended from the Common Criteria Part 2 [5] and defined in support of the AVA_VAN class from Common Criteria Part 3 [6]. NOTE 1: The present document adopts the style and much of the structure of a PP adapted to conform to the ETSI Stylesheet. NOTE 2: The present document is structured in such a way to form part of the EUCC [i.15] submission. NOTE 3: The present document addresses the assurance levels identified in CSA [i.13] for EUCC [i.15] as Substantial (Article 52.6 of [i.13]). NOTE 4: In the present document the requirements from [1] and [2] in the conventional ETSI format are highlighted against the most relevant SFRs from [5], in clauses 9 and 10 and in Annex B. |
104 014 | Emergency Communications (EMTEL); PEMEA File Exchange Extension | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104014/01.01.01_60/ts_104014v010101p.pdf | The present document defines the PEMEA File Exchange (PFE) capability, and the need for this functionality. The required entities and actors are identified along with the protocol, specifying message exchanges between entities. The message formats are specified and procedural descriptions of expected behaviours under different conditions are detailed. |
104 015 | Cyber Security (CYBER); Quantum-Safe Cryptography (QSC); Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies | TS | 1.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/104015/01.01.01_60/ts_104015v010101p.pdf | The present document specifies methods to efficiently build and instantiate Key Encapsulation Mechanisms (KEMs) with hidden access policies, while having the privacy of encapsulated keys relying on the best security of two hybridized schemes, namely with an instantiation where the privacy relies on the Computational Diffie-Hellman (CDH) classical assumption and the Learning With Errors (LWE) post-quantum assumption. Both problems have to be broken to endanger the privacy of the encapsulated key. |
104 016 | CYBER; Quantum-Safe Cryptography (QSC); A Repeatable Framework for Quantum-Safe Migrations | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104016/01.01.01_60/tr_104016v010101p.pdf | The present document describes a repeatable divide and conquer-style framework for migrating, in a prioritized order, an enterprise's information security assets from quantum-vulnerable states to quantum-safe states. First, the approach gives recommendations for partitioning the enterprise into discrete elements. Following, through various analyses within and between the elements of the partition, a methodology is described for establishing quantum-safe migration plans for each of those partition elements. |
104 018-1 | Intelligent Transport Systems (ITS); Testing; Conformance test specifications for Vulnerable Road Users (VRU) awareness service; Part 1: Test requirements and Protocol Implementation Conformance Statement (PICS) pro forma; Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/10401801/02.01.01_60/ts_10401801v020101p.pdf | The present document provides the Protocol Implementation Conformance Statement (PICS) pro forma for the conformance test specifications for Vulnerable Road Users (VRU) Awareness Basic Service as defined in ETSI TS 103 300-3 [1] in compliance with the relevant requirements and in accordance with the relevant guidance given in ISO/IEC 9646-7 [i.2]. |
104 018-2 | Intelligent Transport Systems (ITS); Testing; Conformance test specifications for Vulnerable Road Users (VRU) awareness service; Part 2: Test Suite Structure and Test Purposes (TSS & TP); Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/10401802/02.01.01_60/ts_10401802v020101p.pdf | The present document provides the Test Suite Structure and Test Purposes (TSS & TP) for Vulnerable Road Users (VRU) Awareness Basic Service as defined in ETSI TS 103 300-3 [1] in compliance with the relevant requirements and in accordance with the relevant guidance given in ISO/IEC 9646-7 [i.5]. The ISO standard for the methodology of conformance testing (ISO/IEC 9646-1 [i.2] and ISO/IEC 9646-2 [i.3]) as well as the ETSI rules for conformance testing (ETSI ETS 300 406 [i.6]) are used as a basis for the test methodology. |
104 018-3 | Intelligent Transport Systems (ITS); Testing; Conformance test specifications for Vulnerable Road Users (VRU) awareness service; Part 3: Abstract Test Suite (ATS) and Protocol Implementation eXtra Information for Testing (PIXIT); Release 2 | TS | 2.1.1 | http://www.etsi.org/deliver/etsi_ts/104000_104099/10401803/02.01.01_60/ts_10401803v020101p.pdf | The present document contains the Abstract Test Suite (ATS) for Vulnerable Road Users (VRU) Awareness Basic Service as defined in ETSI TS 103 300-3 [1] in compliance with the relevant requirements and in accordance with the relevant guidance given in ISO/IEC 9646-7 [i.7]. The objective of the present document is to provide a basis for conformance tests for Vulnerable Road Users (VRU) Awareness Basic Service equipment giving a high probability of interoperability between different manufacturers' equipment. The ISO standards for the methodology of conformance testing (ISO/IEC 9646-1 [i.4] and ISO/IEC 9646-2 [i.5]) as well as the ETSI rules for conformance testing (ETSI ETS 300 406 [i.8]) are used as a basis for the test methodology. The development of ITS test specifications follows the guidance provided in the ETSI EG 202 798 [i.1]. Therefore, the ATS documentation outlined in the present document is also based on the guidance provided in ETSI EG 202 798 [i.1]. |
104 020 | Emergency Communications (EMTEL); Main terms and definitions for Emergency Communications | TR | 1.1.1 | http://www.etsi.org/deliver/etsi_tr/104000_104099/104020/01.01.01_60/tr_104020v010101p.pdf | The present document lists the terms used across ETSI Standards and Technical Reports that pertain to emergency communications and emergency services. It includes terms that, although defined in other technical domains, carry distinct meanings or require unequivocal definitions specific to the context of emergency communications and emergency services. For ease of reference, terms are organized in alphabetical order without adherence to any other sorting criteria. Additionally, the present document encompasses a list of abbreviations and acronyms, some of which are borrowed from other fields but are relevant and used within the scope of emergency communications and emergency services. In cases of ambiguity between definitions in EU legislation and existing ETSI technical deliverables within the scope of emergency communications and emergency services, the present document should be referenced for clarification; for new ETSI deliverables within the scope of emergency communications and emergency services, the definitions provided herein should be used. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.