id
stringlengths
7
13
title
stringlengths
7
396
type
stringclasses
2 values
version
stringclasses
249 values
url
stringlengths
90
98
scope
stringlengths
0
83.8k
118 525
oneM2M; Application Developer Guide (oneM2M version 1.0.0 Release 1)
TR
1.0.0
http://www.etsi.org/deliver/etsi_tr/118500_118599/118525/01.00.00_60/tr_118525v010000p.pdf
The present document provides a guide for application developers to develop applications using functionalities provided by any oneM2M compliant service platform with thescope of as follows: • Objective of the use case, • The architecture of the use case mapped into an oneM2M service platform, • The execution procedures for implementation of the use case, and • Implementation details of the use case.
118 522
oneM2M; Continuation & integration of HGI Smart Home activities (oneM2M TR-0022 version 2.0.0)
TR
2.0.0
http://www.etsi.org/deliver/etsi_tr/118500_118599/118522/02.00.00_60/tr_118522v020000p.pdf
The present document is a study of the continuation and integration of some HGI Smart Home activities into oneM2M, following the (PT2) HGI announcement of its closure by June 2016. It includes the description of HGI SH deliverables versus the appropriate oneM2M deliverables for the integration of these HGI achievements. It intends to be used as a liaison working document with HGI about the status progress of this continuation and integration and is expected to be useful for both HGI and oneM2M to check that all technical items from HGI SH Task Force expected to be integrated are appropriately handled by oneM2M.
118 518
oneM2M; Industrial Domain Enablement (oneM2M TR-0018 version 2.5.1 Release 2A)
TR
2.5.1
http://www.etsi.org/deliver/etsi_tr/118500_118599/118518/02.05.01_60/tr_118518v020501p.pdf
The present document collects the use cases of the industrial domain and the requirements needed to support the use cases collectively. In addition it identifies the necessary technical work needed to be addressed while enhancing future oneM2M specifications.
118 517
oneM2M; Home Domain Abstract Information Model (oneM2M TR-0017 version 2.0.0)
TR
2.0.0
http://www.etsi.org/deliver/etsi_tr/118500_118599/118517/02.00.00_60/tr_118517v020000p.pdf
The present document allows application developers to describe the status of devices as resources on oneM2M-based platform in various ways. Thus different application developers can create different resource trees even when they build the same kinds of applications. Moreover when handling the same kinds of devices from different vendors on M2M platforms, application developers may create disunited resource trees without common information model. In order to solve such issues, the present document intends to provide the common and unified APIs on one M2M platform for the home domain by defining an abstract information model for the home domain devices such as TV, refrigerator, air conditioner, smart meter, and lighting equipment. The definition of the abstract information model will be based on data models that currently exist in the home domain. The home domain abstract information model does not intend to define the interworking function between the oneM2M system and protocols of the data models from which the abstract data model is defined. Also, the present document intends to define how the developed abstract information model for a device could be represented in the CSEs of the oneM2M system.
118 516
oneM2M; Study of Authorization Architecture for Supporting Heterogeneous Access Control Policies (oneM2M TR-0016 version 2.0.0)
TR
2.0.0
http://www.etsi.org/deliver/etsi_tr/118500_118599/118516/02.00.00_60/tr_118516v020000p.pdf
The present document provides technical solutions for oneM2M authorization architecture, authorization procedures and access control policies. The present document also gives evaluations of these proposed technical solutions. ETSI TS 118 103 [i.2] only defines a high level authorization architecture that describes its major components and general authorization procedure. The objective of the present document is to provide candidate security solutions related to authorization architecture, authorization procedures and access control policies. The present document provides security solutions in the following three aspects: • Detailed design of authorization architecture: This part investigates the interfaces among authorization components (e.g. procedures and parameters), how these components could be distributed in different oneM2M entities (i.e. different CSEs), and how to implement Role Based Access Control (RBAC) and token based access control. • Supporting user specified access control policies: This part investigates how the oneM2M authorization system could be an extensible system that can support user-defined access control mechanisms and/or access control policy languages. • Investigating existing access control policy languages: This part investigates if some standardized access control policy languages could become oneM2M recommended access control policy description languages.
118 512
oneM2M; End-to-End Security and Group Authentication (oneM2M TR-0012 version 2.0.0)
TR
2.0.0
http://www.etsi.org/deliver/etsi_tr/118500_118599/118512/02.00.00_60/tr_118512v020000p.pdf
The present document provides options and analyses for the security features and mechanisms providing end-to-end security and group authentication for oneM2M. The scope of this technical report includes use cases, threat analyses, high level architecture, generic requirements, available options, evaluation of options, and detailed procedures for executing end-to-end security and group authentication.
118 508
Analysis of Security Solutions for the oneM2M System
TR
1.0.0
http://www.etsi.org/deliver/etsi_tr/118500_118599/118508/01.00.00_60/tr_118508v010000p.pdf
The scope of the present document is to create a common understanding on security within oneM2M systems. To achieve that, security services are explained, threats analysed and security requirements within oneM2M identified and derived from use cases. In addition the present document discusses how security mechanisms relate to the oneM2M architecture. Suitable security procedures and mechanisms are defined within [i.12].
118 506
Study of Management Capability Enablement Technologies for Consideration by oneM2M
TR
1.0.0
http://www.etsi.org/deliver/etsi_tr/118500_118599/118506/01.00.00_60/tr_118506v010000p.pdf
The present document describes and collects the state-of-art of the existing technologies on management capability, evaluates if the technologies can match the requirements defined in oneM2M, analyzes how the technologies can leverage the design of the architecture of oneM2M.
118 503
oneM2M Architecture Part 2: Study for the merging of architectures proposed for consideration by oneM2M
TR
1.0.0
http://www.etsi.org/deliver/etsi_tr/118500_118599/118503/01.00.00_60/tr_118503v010000p.pdf
The present document provides an evaluation of existing M2M-related Architecture work undertaken by the founding partners of oneM2M, including: the Association of Radio Industries and Businesses (ARIB) and the Telecommunication Technology Committee (TTC) of Japan; the Alliance for Telecommunications Industry Solutions (ATIS) and the Telecommunications Industry Association (TIA) of the USA; the China Communications Standards Association (CCSA); the European Telecommunications Standards Institute (ETSI); and the Telecommunications Technology Association (TTA) of Korea. Common Functional Entities and Reference Points are identified, as well as critical differences. New functionality will not be considered as part of this study. The present document is intended to ensure a common understanding of existing M2M Architectural approaches, in order to facilitate future normative work resulting in oneM2M Technical Specifications. The present document has been prepared under the auspices of the oneM2M Technical Plenary, by the oneM2M Architecture Working Group.
118 502
Architecture Part 1: Analysis of the architectures proposed for consideration by oneM2M
TR
1.0.0
http://www.etsi.org/deliver/etsi_tr/118500_118599/118502/01.00.00_60/tr_118502v010000p.pdf
The present document provides an analysis and comparison of existing M2M-related Architecture work undertaken by the founding partners of oneM2M, including: the Association of Radio Industries and Businesses (ARIB) and the Telecommunication Technology Committee (TTC) of Japan; the Alliance for Telecommunications Industry Solutions (ATIS) and the Telecommunications Industry Association (TIA) of the USA; the China Communications Standards Association (CCSA); the European Telecommunications Standards Institute (ETSI); and the Telecommunications Technology Association (TTA) of Korea. In addition, architectural work by other non-oneM2M Partner Type 1 organizations is provided for consideration. The present document is intended to ensure a common understanding of existing M2M Architectural approaches, in order to facilitate future normative work resulting in oneM2M Technical Specifications (TS). The present document has been prepared under the auspices of the oneM2M Technical Plenary, by the oneM2M Architecture Working Group.
118 501
oneM2M Use Case collection
TR
1.0.0
http://www.etsi.org/deliver/etsi_tr/118500_118599/118501/01.00.00_60/tr_118501v010000p.pdf
The present document includes a collection of use cases from a variety of M2M industry segments (listed in table 1.1). Each use case may include a description, source, actors, pre-conditions, triggers, normal and alternative flow of sequence of interactions among actors and system, post-conditions, illustrations and potential requirements. The potential requirements provide an initial view of what oneM2M requirements could arise from the Use Case as seen by the contributor. These are intended to help the reader understand the use case's needs. These potential requirements may have been subsequently submitted by the contributor for consideration as candidate oneM2M requirements, which may or may not have been agreed as a oneM2M requirement (often after much editing). As such, there may not be a direct mapping from the potential requirements to agreed oneM2M requirements [i.14]. Table 1.1 Industry Segment oneM2M Use Cases Agriculture Energy Wide area Energy related measurement/ control system for advanced transmission and distribution automation Analytics for oneM2M Smart Meter Reading Environmental Monitoring for Hydro-Power Generation using Satellite M2M Oil and Gas Pipeline Cellular /Satellite Gateway Enterprise Smart building Finance Healthcare M2M Healthcare Gateway Wellness services Secure remote patient care and monitoring Industrial Public Services Street Light Automation Devices, Virtual devices and Things Car/Bicycle Sharing Services Smart parking Information Delivery service in the devastated area Residential Home Energy Management Home Energy Management System Plug-In Electrical Charging Vehicles and power feed in home scenario Real-time Audio/Video Communication Event Triggered Task Execution Semantic Home Control Semantic Device Plug and Play Retail Transportation Vehicle Diagnostic & Maintenance Report Remote Maintenance services Neighbourhood Alerting on Traffic Accident Fleet management service using Digital Tachograph Other Extending the M2M Access Network using Satellites M2M data traffic management by underlying network operator Optimizing connectivity management parameters with mobile networks Optimizing mobility management parameters with mobile networks Sleepy nodes Collection of M2M system data Leveraging Broadcasting/ Multicasting Capability of Underlying Networks Service Provisioning for Equipment with Built-in Device ETSI ETSI TR 118 501 V1.0.0 (2015-05) 12
105 178
Access, Terminals, Transmission and Multiplexing (ATTM); Comparison of sustainability parameters between internal and external, including "cloud-based", ICT hosting solutions
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/105100_105199/105178/01.01.01_60/tr_105178v010101p.pdf
The present document provides methods to enable a comparison of sustainability parameters between both internal and external (including "cloud-based") ICT hosting solutions addressing: • energy consumption; • Green House Gas (GHG) emission; • water consumption; • treatment of electrical and electronic equipment including maintenance at End of Life (EoL). The present document does not address: • technical aspects of whether a given external hosting solution is able to provide a functional replacement of Users ICT needs; • methods of improving resource management within data centres/ICT sites (reference should be made to ETSI EN 305 174-2 [i.8] and ETSI TS 105 174-2 [i.12].
105 177
Access, Terminals, Transmission and Multiplexing (ATTM); Benefit Analysis of Ethernet and power over coaxial cables - IP Video Surveillance Case Studies
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/105100_105199/105177/01.01.01_60/tr_105177v010101p.pdf
The present document reviews the benefit analyses and environmental impact for selected use cases (such as mass transit systems) of using coaxial cables to support both Ethernet and power over coaxial equipment for IP Video Surveillance Systems (VSS) when: a) upgrading existing analogue VSS using legacy coaxial cables as compared with installation of alternative transmission media; and b) building new VSS by installing coaxial cables as compared with other transmission media.
181 003
Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Services Capabilities, Requirements and strategic direction for NGN services
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/181000_181099/181003/01.01.01_60/tr_181003v010101p.pdf
The present document provides the results of an analysis of the current work and strategic direction of relevant SDOs (ITU-T, FGNGN, IETF, etc.) and other fora (EURESCOM, CJK, ATIS, etc.) in relation to services and network requirements to support ETSI TISPAN. The purpose of this analysis is to ensure synthesis of the current studies on NGN services. The present document enables ETSI to identify strategic directions for standardization of NGN services and service requirements beyond Release 1. A catalogue of existing and proposed service documents is given in annex B. This catalogue does not provide any prioritization.
122 960
Universal Mobile Telecommunications System (UMTS); Mobile multimedia services including mobile Intranet and Internet services (3G TR 22.960 version 3.0.1 Release 1999)
TR
3.0.1
http://www.etsi.org/deliver/etsi_tr/122900_122999/122960/03.00.01_60/tr_122960v030001p.pdf
105 174-5-1
Access, Terminals, Transmission and Multiplexing (ATTM); Broadband Deployment - Energy Efficiency and Key Performance Indicators; Part 5: Customer network infrastructures; Sub-part 1: Homes (single-tenant)
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/105100_105199/1051740501/01.01.01_60/tr_1051740501v010101p.pdf
The present document details measures which may be taken to improve the energy efficiency within homes (single-tenant) by virtue of broadband deployment. Clauses 2 and 3 contain references, definitions of terms and abbreviations which relate to this part; similar information will be included in the corresponding clauses of the other parts, thus ensuring that each document can be used on a "stand-alone" basis. Within the present document: • clause 4 describes the nature of customer premises networks in homes (single tenant), defines the interfaces to those networks and identifies the standardization bodies working on the design and installation of those networks; • clause 5 describes the strategies that may be employed within homes (single tenant) to both increase the energy efficiency of installed information technology equipment and to use the facilities offered by information technology services to reduce overall energy consumption. This will enable the proper implementation of services, applications and content on an energy efficient infrastructure, though it is not the goal of this multi-part deliverable to provide detailed standardized solutions for home broadband network architecture.
105 174-4
Access, Terminals, Transmission and Multiplexing (ATTM); Broadband Deployment - Energy Efficiency and Key Performance Indicators; Part 4: Access networks
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/105100_105199/10517404/01.01.01_60/tr_10517404v010101p.pdf
The present document details measures which may be taken to improve the energy efficiency the access networks for broadband deployment. Clauses 2 and 3 contain references, definitions and abbreviations which relate to this part; similar information will be included in the corresponding clauses of the other parts, thus ensuring that each document can be used on a "stand-alone" basis. Clause 4 of the present document: • identifies the standardization bodies working on interfaces to, cabling within, installation of, and other aspects of the communication infrastructures of, access networks; • outlines some of the principal access network topographies and their differences in respect of energy consumption; • provides strategic analysis of energy consumption trends within access networks; • develops the concept of Key Performance Indicators (KPI), introduced in Part 1 of this multi-part set of documents, to enable consistent monitoring of energy efficiency; • outlines further work needed to ensure the improvement of energy efficiency in communication networks. This will enable the proper implementation of services, applications and content on an energy efficient infrastructure, though it is not the goal of the present document to provide detailed standardized solutions for network architecture.
105 174-2-1
Access, Terminals, Transmission and Multiplexing (ATTM); Broadband Deployment - Energy Efficiency and Key Performance Indicators; Part 2: Network sites; Sub-part 1: Operator sites
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/105100_105199/1051740201/01.01.01_60/tr_1051740201v010101p.pdf
The present document details measures which may be taken to improve the energy efficiency within operator's sites for broadband deployment. Clauses 2 and 3 contain references, definitions and abbreviations which relate to this part; similar information will be included in the corresponding clauses of the other parts, thus ensuring that each document can be used on a "stand-alone" basis. Within the present document: • clause 4 introduces operator sites concepts; • clause 5 details the approaches that may be employed to improve energy efficiency within the areas of the operator site containing network telecommunications equipment; • clause 6 details the approaches that may be employed to improve energy efficiency within the areas of the operator site containing information telecommunications equipment. This will enable the proper implementation of services, applications and content on an energy efficient infrastructure, though it is not the goal of this multi-part deliverable to provide detailed standardized solutions for network architecture. The present document focuses on energy efficiency. The CO2 footprint is not taken in account in the present document.
105 174-1-1
Access and Terminals (AT); Relationship between installations, cabling and communications systems; Standardization work published and in development; Part 1: Overview, common and generic aspects; Sub-part 1: Generalities, common view of the set of documents
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/105100_105199/1051740101/01.01.01_60/tr_1051740101v010101p.pdf
The present document gives an overview of the set of documents relevant for installations, interfaces and cabling for communications infrastructures and studies common and generic aspects. This multi-part deliverable studies the relationship between installations, cabling, their interfaces and other aspects of communications infrastructures. It identifies standardization work published and in development. It also provides guidance for standardization work needed for implementation of communications networks. It is not the goal of this multi-part deliverable to provide detailed standardized solutions. This multi-part deliverable will be used to properly implement services, applications and content on infrastructure.
126 915
Universal Mobile Telecommunications System (UMTS); Echo Control For Speech and Multi-Media Services (3G TR 26.915 version 3.0.0 Release 1999)
TR
3.0.0
http://www.etsi.org/deliver/etsi_tr/126900_126999/126915/03.00.00_60/tr_126915v030000p.pdf
........................................................................................................................................................5
104 409
Data Solutions (DATA); Data Act (art. 33) requirement and references analysis
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104400_104499/104409/01.01.01_60/tr_104409v010101p.pdf
The present document supports the preparation of the answer to the EU standardisation request "Standardisation request to the European standardisation organisations as regards a European Trusted Data Framework in support of Regulation (EU) 2023/2854 of the European Parliament and of the Council" [i.3] further on called "SReq" in the present document. The scope of the present document is to analyse the requirements contained in the "Regulation (EU) 2023/2854 of the European Parliament and of the Council of 13 December 2023 on harmonised rules on fair access to and use of data and amending Regulation (EU) 2017/2394 and Directive (EU) 2020/1828 (Data Act)" [i.4], further on called "EU Data Act" in the present document, with particular reference to its article 33, and those in the final version of the SReq [i.3] including their references (e.g. the "DSSC Blueprint V1.5" [i.5]). This analysis is conducted with reference to the existing ETSI applicable specifications and standards (e.g. oneM2M [i.6], SAREF [i.1], NGSI-LD [i.7], [i.8], etc.). The present document provides the input for the ETSI Technical Report on "Data ACT (art. 33) standardization suggestions" ETSI TR 104 410 [i.2]. Both reports (the present document and ETSI TR 104 410 [i.2]) will prepare the normative work to satisfy the SReq. The present document is structured as follows: • Clauses 1 to 3 set the scene and provide references as well as definitions of terms, symbols and abbreviations, which are used in the present document. • Clause 4 provides an introduction to the EU Data Act [i.4] with a focus on its structure and the technically relevant parts of it. Specifically, it establishes the reference to standardisation in the field of interoperability of data and services. Further on, it lists requirements derived from the EU Data Act [i.4] article 33 ("Essential requirements regarding interoperability of data, of data sharing mechanisms and services, as well as of common European data spaces)". The draft of the SReq [i.3] is addressing this article 33. Also, clause 4 provides a list of requirements derived from the EU Data Act [i.4] article 35 (Interoperability of data processing services). It addresses several items, which are related to, even if not being in the focus of, the SReq. • Clause 5 provides an introduction to the SReq to European Standards Organisations as regards to a European Trusted Data Framework [i.3]. The focus is on ontologies and data models as well as on approaches to manage them. It lists requirements derived from the SReq, which are additional to the published EU Data Act [i.4]. Clause 5 provides an overview of the "DSSC Blueprint, version 1.5" [i.5] and an overview of the "Data Catalog Vocabulary (DCAT) - Version 3" [i.9] within the context of potential application to SAREF [i.1]. • Clause 6 provides an overview of which parts of the standardisation requirements derived from the documents EU Data Act [i.4] and SReq [i.3] can be satisfied by the oneM2M standards [i.6], the SAREF ecosystem [i.1] with the SAREF core and on all extensions and the NGSI-LD specifications [i.7], [i.8]. Also it identifies the gaps which need to be filled. It also describes the relationship between oneM2M and SAREF, with special emphasis on how oneM2M standards [i.6] can be used as the means for practical SAREF deployment. Furthermore, clause 6 analyses the relation between DSSC Blueprint [i.5] and the oneM2M standards [i.6]. • Clause 7 provides a summary of conclusions from the requirements and references analysis and gives an outlook to further potential activities. • Annex A provides an overview of the EU Data Act structure. • Annex B shows some highlights of articles with technical/standardisation relevance.
104 225
Securing Artificial Intelligence TC (SAI); Privacy aspects of AI/ML systems
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104200_104299/104225/01.01.01_60/tr_104225v010101p.pdf
The present document identifies the role of privacy as one of the components of the Security of AI, and defines measures to protect and preserve privacy in the context of AI that covers both, safeguarding models and protecting data, as well as the role of privacy-sensitive data in AI solutions. It documents and addresses the attacks and their associated remediations where applicable, considering the existence of multiple levels of trust affecting the lifecycle of data. The investigated attack mitigations include Non-AI-Specific (traditional Security/Privacy redresses), AI/ML-specific remedies, proactive remediations ("left of the boom"), and reactive responses to an adversarial activity ("right of the boom").
133 902
Universal Mobile Telecommunications System (UMTS); Formal Analysis of the 3G Authentication Protocol (3G TR 33.902 version 3.1.0 Release 1999)
TR
3.1.0
http://www.etsi.org/deliver/etsi_tr/133900_133999/133902/03.01.00_60/tr_133902v030100p.pdf
........................................................................................................................................................5
104 221
Securing Artificial Intelligence (SAI); Problem Statement
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104200_104299/104221/01.01.01_60/tr_104221v010101p.pdf
The present document describes the problem of securing AI-based systems and solutions, with a focus on machine learning, and the challenges relating to confidentiality, integrity and availability at each stage of the machine learning lifecycle. It also describes some of the broader challenges of AI systems including bias, ethics and explainability. A number of different attack vectors are described, as well as several real-world use cases and attacks. NOTE: The present document updates and replaces ETSI GR SAI 004 [i.32].
104 169
Cyber Security (CYBER); Critical Security Controls for the Digital Operational Resilience Act (DORA)
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104100_104199/104169/01.01.01_60/tr_104169v010101p.pdf
The present document provides a mapping between the Critical Security Controls and DORA provisions.
100 392-3-10
Terrestrial Trunked Radio (TETRA); Voice plus Data (V+D); Part 3: Interworking at the Inter-System Interface (ISI); Sub-part 10: General design, PSS1 over E.1
TS
1.1.1
http://www.etsi.org/deliver/etsi_ts/100300_100399/1003920310/01.01.01_60/ts_1003920310v010101p.pdf
The present document defines the transport of the Inter-System Interface (ISI) using PSS1 as transport layer. It specifies:  the PSS1 signalling used for transport of ISI APDUs; and  the general protocol mechanism, called ISI Mediation Function which coordinates the communication between TETRA systems. The ISI Mediation Function applies to any TETRA Switching and Management Infrastructure (SwMI) which supports the ISI.
104 160
Cyber Security (CYBER); Observation from the ERATOSTHENES and CERTIFY projects regarding IoT security lifecycle
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104100_104199/104160/01.01.01_60/tr_104160v010101p.pdf
The present document will focus on presenting the results, observations and lessons learnt from the ERATOSTHENES and CERTIFY projects that tackle the complex security challenges of the Internet of Things (IoT) with a focus on managing the entire lifecycle of these networks, with a specific focus on distributed trust management and digital identity solutions, and the certification process.
104 140
Propagation measurement and modelling for PtP radio links in the E, W and D bands
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104100_104199/104140/01.01.01_60/tr_104140v010101p.pdf
The present document provides information about electromagnetic propagation at millimetre wave, considering the available models, both derived from physical analysis and from real data fitting and comparing them with measurements.
105 174-5-2
Access, Terminals, Transmission and Multiplexing (ATTM); Broadband Deployment - Energy Efficiency and Key Performance Indicators; Part 5: Customer network infrastructures; Sub-part 2: Office premises (single-tenant)
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/105100_105199/1051740502/01.01.01_60/tr_1051740502v010101p.pdf
The present document details measures which may be taken to improve the energy efficiency within office premises (single-tenant) by virtue of broadband deployment. Clauses 2 and 3 contain references, definitions and abbreviations which relate to this part; similar information will be included in the corresponding clauses of the other parts, thus ensuring that each document can be used on a "stand-alone" basis. Within the present document: • clause 4 describes the nature of customer premises networks in homes (single tenant), defines the interfaces to those networks and identifies the standardization bodies working on the design and installation of those networks; • clause 5 describes the strategies that may be employed within office premises (single tenant) to both increase the energy efficiency of installed information technology equipment and to use the facilities offered by information technology services to reduce overall energy consumption. This will enable the proper implementation of services, applications and content on an energy efficient infrastructure, though it is not the goal of this multi-part deliverable to provide detailed standardized solutions for home broadband network architecture.
104 128
Securing Artificial Intelligence (SAI); Guide to Cyber Security for AI Models and Systems
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104100_104199/104128/01.01.01_60/tr_104128v010101p.pdf
The present document gives guidance to help stakeholders in the AI supply chain in meeting the cyber security provisions defined for AI models and systems in ETSI TS 104 223 [i.1]. These stakeholders could include a diverse range of entities, including large enterprises and government departments, independent developers, Small and Medium Enterprises (SMEs), charities, local authorities and other non-profit organizations. The present document will also be useful for stakeholders planning to purchase AI services. Additionally, the present document has been designed to support the future development of AI cyber security standards, including specifications that could inform future assurance and certification programmes. Where relevant, the present document signposts supporting specifications and international frameworks.
104 119
Methods for Testing & Specification (MTS); AI Testing; Guidelines for Documentation of AI-enabled Systems
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104100_104199/104119/01.01.01_60/tr_104119v010101p.pdf
The present document provides guidelines and recommendations for documentation schemes that support the continuous and consistent documentation of quality and quality related attributes for AI-enabled systems. This includes an analysis of current documentation schemes and Use case examples. It also defines a process how to document AI-enabled systems.
119 411-5
Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 5: Guidelines for the coexistence of web browser and EU trust controls
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/119400_119499/11941105/01.01.01_60/tr_11941105v010101p.pdf
The present document defines two approaches for issuing qualified certificates for website authentication, deploying them to websites, and their consumption by web browsers. Objectives of Approach #1 (i.e. "1-QWAC Approach") 1-QWACs: a) Support coexistence of trust controls based upon meeting requirements from both the Web Browser Vendor within the meaning of Recital 65 of the Regulation (EU) 2024/1183 [i.3] and EU Trusted Lists with ETSI standards aimed at supporting EU trust controls. b) Include requirements for TLS certificates based on CA/Browser Forum Requirements [i.4] and [i.5] as applied in ETSI standards [4]. c) Authenticate the website directly by using the QWAC to establish a TLS connection between the web browser and the server. NOTE: TLS uses encryption to secure data transmitted over a network providing confidentiality, integrity, and authentication. Objectives of Approach #2 (i.e. "2-QWAC with Certificate Binding Validation Approach") 2-QWACs with Certificate Binding Validation: - Support trust controls based upon EU Trusted Lists with ETSI standards aimed at supporting EU trust controls for a QWAC, which is used to bind the identity in the QWAC to the TLS certificate(s) to be used by the web browser to establish a TLS connection between the web browser and the server. - Support trust controls based upon Web Browser Vendor Root Stores for the TLS certificate which is used to establish a TLS connection between the web browser and the server. All approaches: • aim to meet the requirements of Article 45, Article 45a, and Recital 65 of Regulation (EU) 2024/1183 [i.3]; • include requirements of qualified certificates for website authentication as specified in Regulation (EU) 2024/1183 [i.3]; and • enable the display of identity data contained in qualified certificates for website authentication and validated by the EU trust schemes in a user-friendly manner. Clause 4 specifies Trust Service Provider requirements for issuing QWACs. Clause 5 provides website operator guidance for using QWACs. Clause 6 specifies web browser requirements for consuming QWACs.
105 174-6
Integrated broadband cable telecommunication networks (CABLE); Broadband Deployment and Energy Management; Part 6: Cable Access Networks
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/105100_105199/10517406/01.01.01_60/tr_10517406v010101p.pdf
The present document describes the cable access network, and progressive network access architectures that reduce the network energy consumption and the metrics required to benchmark the network and its components to support and enable the proper implementation of services, applications and content on an energy efficient infrastructure and describe measures that may improve the energy efficiency of cable access networks. Within the present document: • clause 4 presents the schematic for cable access network infrastructures, the evolution of the network architectures to meet consumer capacity demand and bandwidth growth and the main components of the cable access network energy consuming elements; • clause 5 presents measurement key performance indicators to baseline and measure network energy performance; • clause 6 explains power consumption metrics of the CAN; • clause 7 describes and gives consideration to power metrics of field deployed access network elements; • clause 8 describes the electrical powering of the CAN components and the distributed usage of the electrical power. This clause explains ways to improve the power consumption and benchmarking the HFC CAN plant; • clause 9 considers the calculations to measure the data throughput of a CAN.
104 139
Use of innovative antenna systems within millimetre Wave Transmission and impacts on standards and regulations
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104100_104199/104139/01.01.01_60/tr_104139v010101p.pdf
The present document deals with innovative technologies applicable to mmW transmission for what regards the antenna system.
104 168
Cyber Security (CYBER); Critical Security Controls for Network and Information Security Directive 2 (NIS2)
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104100_104199/104168/01.01.01_60/tr_104168v010101p.pdf
The present document item provides a mapping between the Critical Security Controls and NIS2 provisions.
104 410
Data Solutions (DATA); Data Act (art. 33) standardization suggestions
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104400_104499/104410/01.01.01_60/tr_104410v010101p.pdf
The present document supports the preparation of the answer to C(2025)4135 - Standardisation Request M/614 [i.3] further on called "SReq" in the present document. The present document is based on the input from ETSI TR 104 409 [i.1]. Both reports (the present document and ETSI TR 104 409 [i.1]) will prepare the normative work to satisfy the SReq [i.3]. The present document is structured as follows: • Clauses 1 to 3 set the scene and provide references as well as definitions of terms, symbols and abbreviations, which are used in the present document. • Clause 4 provides a summary of the findings highlighted in ETSI TR 104 409 [i.1] about how oneM2M fulfils the EU Data Act [i.2] with particular reference to Article 33 and the SReq [i.3]. It presents guidelines about how oneM2M can be used to fulfil as much as possible the standardization requirements of these two documents without the need for changes to oneM2M specifications. Additionally, this clause lists potential Change Requests (CRs) that would enable oneM2M to fulfil some of the aspects of these two documents (i.e. ETSI TR 104 409 [i.1] and the present document) that are currently not covered. The content focuses on improvements that can be implemented in a reasonable manner according with the timing available to make oneM2M compliant with the EU Data Act [i.2] with particular reference to Article 33 and the SReq [i.3]. Some requirements of the two documents fall outside the scope of oneM2M specifications. Where possible, this clause provides clarification of such boundaries together with additional guidelines that may help define a clear positioning for oneM2M in the context of the two documents. • Clause 5 provides a summary of the findings highlighted in ETSI TR 104 409 [i.1] about how SAREF fulfils the EU Data Act [i.2] with particular reference to Article 33 and the SReq [i.3]. It lists feasible improvements that would enable SAREF [i.4] to fulfil the standardization requirements of these two documents. The content focuses on improvements that can be implemented in a reasonable manner according with the timing available to make SAREF compliant with the two documents. Clause 5 provides possible additional guidelines for aligning SAREF with the EU Data Act [i.2] with particular reference to Article 33 and the SReq [i.3]. • Clause 6 provides a summary of the findings highlighted in ETSI TR 104 409 [i.1] about how NGSI-LD fulfils the EU Data Act [i.2] with particular reference to Article 33 and the SReq [i.3]. It provides guidelines about how NGSI-LD can be used to fulfil as much as possible the two documents without carrying out changes within the NGSI-LD methodology. Clause 6 lists feasible improvements that would enable NGSI-LD to fulfil the standardization requirements of these two documents. The content focuses on improvements that can be implemented in a reasonable manner according with the timing available to make NGSI-LD compliant with the EU Data Act [i.2] with particular reference to Article 33 and the EU Standardisation Request, e.g. the definition of the mappings between NGSI-LD and DCAT-AP provided in [i.7]. • Clause 7 provides insights about if the union of the three assets enables the fulfilment of the EU Data Act [i.2] with particular reference to Article 33 and the SReq [i.3]. • Clause 8 provides a summary of conclusions from the standardization suggestions.
119 460
Electronic Signatures and Infrastructures (ESI); Survey of technologies and regulatory requirements for identity proofing for trust service subjects
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/119400_119499/119460/01.01.01_60/tr_119460v010101p.pdf
The present document provides the results of a survey on the technologies, legislations, specifications, guidelines and standards related to or used for identity proofing. Information has been collected as comprehensively as possible, and is analysed in the present document. The aim is to identify trends and select relevant elements for ETSI DTS/ESI-0019461 [i.50] to address both security policy and security requirements for enrolment of Trust Services subjects. The methodology to achieve this goal is presented in clause 4 and is followed by the analysis.
104 222
Securing Artificial Intelligence; Mitigation Strategy Report
TR
1.2.1
http://www.etsi.org/deliver/etsi_tr/104200_104299/104222/01.02.01_60/tr_104222v010201p.pdf
The present document summarizes and analyses existing and potential mitigation against threats for AI-based systems as discussed in ETSI GR SAI 004 [i.1]. The goal is to have a technical survey for mitigating against threats introduced by adopting AI into systems. The technical survey shed light on available methods of securing AI-based systems by mitigating against known or potential security threats. It also addresses security capabilities, challenges, and limitations when adopting mitigation for AI-based systems in certain potential use cases.
104 117
Cyber Security (CYBER); Risk Management Ecosystem
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104100_104199/104117/01.01.01_60/tr_104117v010101p.pdf
The present document provides an overview of the history and facets of the risk management ecosystem. The overview includes the history of this activity, the concepts and specifications that emerged, the diverse venues, use cases, and the contemporary state-of-the-art mechanisms for meeting imposed obligations.
104 112
Lawful Interception (LI); Collection of test cases for Lawful Interception and Lawful Disclosure
TR
1.2.1
http://www.etsi.org/deliver/etsi_tr/104100_104199/104112/01.02.01_60/tr_104112v010201p.pdf
The present document provides an informative basis for LI and LD related testing procedures, thus giving an international and inter-organizational understanding about applicable tests. By using the present document, communication and examination of tests is simplified by creating an equal understanding and structure of testing, regardless of time and organization. The test cases and test scenario components describe as many use cases as possible.
104 106
Publicly Available Specification (PAS); O-RAN Security Threat Modeling and Risk Assessment (O-RAN.WG11.Threat-Modeling.O-R003-v03.00)
TR
3.0.0
http://www.etsi.org/deliver/etsi_tr/104100_104199/104106/03.00.00_60/tr_104106v030000p.pdf
The present document describes the O-RAN Security Threat Modeling and Risk Assessment. It identifies assets to be protected, analyses the O-RAN components for vulnerabilities, examines potential threats associated with those vulnerabilities, provides security principles which stakeholders should address when building a secure end-to-end O-RAN system and assesses the risks of the identified threats based on impact and likelihood factors. NOTE: The present document is transformed from a Technical Specification (TS) to a Technical Report (TR) as it does not contain normative requirements. Instead, it is an informative document that serves as a vital resource for understanding the potential risks within O-RAN and defining appropriate requirement/controls to mitigate them effectively.
104 098
Technical mitigation measures to protect RAS against interference from ground based vehicular radars within 77 - 81 GHz to support revision of ECC/DEC/(04)03
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104098/01.01.01_60/tr_104098v010101p.pdf
The present document describes technical interference mitigation measures to protect RAS against interference from ground based vehicular radars (as potential alternatives to protection zones). The present document is based on the existing studies in ECC report 350 [i.12] and is focused on the open question (see LS in ERM(24)083040) on practicality of protection zones raised by the industry during ECC discussions (FM and SRD/MG) on the public consultation comments for revision of ECC/DEC/(04)03 [i.1].
104 097
Access, Terminals, Transmission and Multiplexing (ATTM); Deployment of Indoor Fibre Distribution Network Hybrid Cabling System
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104097/01.01.01_60/tr_104097v010101p.pdf
The present document describes the structure of the Indoor Fibre Distribution Network (IFDN) Hybrid Cabling System, main functional elements and their characteristics, deployment details and acceptance items.
104 096
System Reference document (SRdoc); Short Range Devices; Vehicular applications operating in 300 GHz to 400 GHz and 600 GHz to 700 GHz ranges
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104096/01.01.01_60/tr_104096v010101p.pdf
The present document describes Terahertz Imaging for ground based vehicular RADARs, as defined in ECC Decision (04)03 [i.6], operating in the 300 - 400 GHz and 600 - 700 GHz bands. The present document provides information on the existing and intended applications, the technical parameters and the relation to the existing spectrum regulation in Europe. The present document includes in particular: • market information; • technical information including expected sharing and compatibility issues; • regulatory issues.
104 094
Digital Video Broadcasting (DVB); Adaptive media streaming over IP multicast; Implementation guidelines and worked examples
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104094/01.01.01_60/tr_104094v010101p.pdf
The present document provides implementation guidelines for the system specified in ETSI TS 103 769 [i.1] and describes some example implementations of it. These examples are non-exhaustive, and as such do not detail every possible combination of configuration that is possible with ETSI TS 103 769 [i.1]. The baseline procedures and illustrative call flows for such a system are documented in annex A.
104 080
Environmental Engineering (EE); Example of a Life Cycle Assessment (LCA) of a mobile phone
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104080/01.01.01_60/tr_104080v010101p.pdf
The present document aims to present an example of an objective and transparent Life Cycle Assessment (LCA) of a mobile phone. The present document will provide an example of an LCA of a mobile phone fully compliant with ETSI ES 203 199 [i.1]. The present document will be technically aligned with ITU-T L.Suppl.60. The present document can be read by anyone aiming for a better understanding of LCA of mobile phones. However, the present document is especially intended for LCA practitioners with a prior knowledge of ETSI ES 203 199 [i.1]. The purpose of the present document is to: • provide an example of an LCA of a mobile phone, aligned with the requirements of ETSI ES 203 199 [i.1] to ensure a sufficient quality of LCA studies of mobile phones; • harmonize the LCAs of mobile phones; • increase the credibility of LCAs of mobile phones; • increase the transparency and facilitate the interpretation of LCA studies of mobile phones; • facilitate the communication of LCA studies of mobile phones. Recognizing ETSI ES 203 199 [i.1] as reference, the present document will apply it for the LCA of a mobile phone. The present document is valid for all types of mobile phones. While ETSI ES 203 199 [i.1] defines a set of requirements which reflect the quality that practitioners should strive for, the present document does not contain any requirements. Comparisons of results from environmental assessments of mobile phones which have been performed by different organizations and with different tools, are beyond the scope of ETSI ES 203 199 [i.1], as such comparisons would require that the assumptions and context of each study are exactly equivalent.
104 078
System Reference document (SRdoc); Short Range Devices; Radar equipment operating in 57 GHz to 64 GHz and 76 GHz to 77 GHz for applications on drones
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104078/01.01.01_60/tr_104078v010101p.pdf
The present document describes SRD radar equipment operating in 57 - 64 GHz and 76 - 77 GHz for applications upon drones which may require a change in the present regulatory framework for the proposed band. It includes in particular: • Market information. • Technical information regarding equipment type and typical installation. • Regulatory issues.
104 077-3
Human Factors (HF); Age Verification Pre-Standardization Study Part 3 : Proposed Standardization Roadmap
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/10407703/01.01.01_60/tr_10407703v010101p.pdf
The present document elaborates a set of proposals for further definition of work items within the standardization community to address the requirements identified in ETSI TR 104 077-1 [i.1] against the gaps identified and summarized in ETSI TR 104 077-2 [i.2]. The present document is intended for the SDOs identified in the proposals for their further consideration.
104 077-2
Human Factors (HF); Age Verification Pre-Standardization Study Part 2: Solutions and Standards Landscape
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/10407702/01.01.01_60/tr_10407702v010101p.pdf
The present document reviewed from a perspective of the stakeholder requirements identified in ETSI TR 104 077-1 [i.7] is a study of the landscape of international, regional and national existing solutions (identified in ETSI TR 104 077-1 [i.7]), approaches (frameworks/architecture) and standards for age verification in Europe.
104 077-1
Human Factors (HF); Age Verification Pre-Standardization Study Part 1: Stakeholder Requirements
TR
1.1.2
http://www.etsi.org/deliver/etsi_tr/104000_104099/10407701/01.01.02_60/tr_10407701v010102p.pdf
The present document identifies stakeholder requirements for age verification. NOTE: The present document may assist in providing the groundwork for defining standards as outlined in the Digital Services Act [i.1]. Its purpose is to establish the foundation for developing European standards in age verification and protecting minors online. The present document presents the analysis of requirements of identified stakeholders in the age verification process for whom accurate age information is essential to their service access or to their business operation.
104 074
Core Network and Interoperability Testing (INT); Methodologies for Testing & Validation of Network Application based services over 5G networks
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104074/01.01.01_60/tr_104074v010101p.pdf
The present document provides recommendations on methodologies for testing and validation of Network Application based services over 5G networks. The present document includes recommendations covering the aspects of a Network Application validation framework by providing definitions of 5G relevant KPIs for Network Applications, the application and network functions making up Network Applications, and the services composed of the Network Applications. Moreover, recommendations on the testing and validation environment, on involved processes, and, finally, on the design of the Network Applications and services under test. Such recommendations can be equally applicable to a wide range of Network Applications composed services, application cases and may also be applicable beyond 5G scenarios.
104 073
Intelligent Transport Systems (ITS); Facilities layer; Radio Resource Management Study; Release 2
TR
2.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104073/02.01.01_60/tr_104073v020101p.pdf
The present document identifies Radio Resource Management (RRM) at the Facilities Layer in relation to critical control requirements, capabilities, principles and parameters which could enable the definition of a mechanism supporting highly time and size dynamic data exchanging services to operate robust, interoperable and backward compatible with existing ITS Release 1 and upcoming Release 2 ITS services in the 5,9 GHz ITS allocated band.
104 071
Cyber Security (CYBER); Mapping of the Consumer Mobile Device Protection Profile security requirements to the CRA essential cybersecurity requirements
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104071/01.01.01_60/tr_104071v010101p.pdf
The present document provides a mapping between the Consumer Mobile Device Protection Profile (CMDPP) in the ETSI TS 103 732 series ([i.2], [i.3], [i.4], [i.5], [i.6] and [i.7]) security requirements and the essential cybersecurity requirements from the Annexes of the Cyber Resilience Act (CRA) [i.1]. The present document will also analyse the gaps between the CMDPP ([i.2], [i.3], [i.4], [i.5], [i.6] and [i.7]) (if any) and the CRA [i.1], considering how to address them where necessary.
104 067
Securing Artificial Intelligence (SAI); Proofs of Concepts Framework
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104067/01.01.01_60/tr_104067v010101p.pdf
The present document provides information about the "lightweight" framework to be used by ETSI TC SAI to create multi-partner Proofs of Concepts (PoCs).
104 066
Securing Artificial Intelligence (SAI); Security Testing of AI
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104066/01.01.01_60/tr_104066v010101p.pdf
The present document identifies methods and techniques that are appropriate for security testing of ML-based components. Security testing of AI does not end at the component level. As for testing of traditional software, the integration with other components of a system needs to be tested as well. However, integration testing is not the subject of the present document. The present document addresses: • security testing approaches for AI; • security test oracles for AI; • definition of test adequacy criteria for security testing of AI. Techniques of each of these topics should be applied together to security test of a ML component. Security testing approaches are used to generate test cases that are executed against the ML component. Security test oracles enable to calculate a test verdict to determine if a test case has passed, that is, no vulnerability has been detected, or failed, that is a vulnerability has been identified. Test adequacy criteria are used to determine the entire progress and can be employed to specify a stop condition for security testing.
104 065
Securing Artificial Intelligence (SAI); AI Act mapping and gap analysis to ETSI workplan
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104065/01.01.01_60/tr_104065v010101p.pdf
The present document provides an analysis of the standardization requirements of the AI Act [i.1] against the workplan of ETSI (across all TBs) in order to identify gaps and the means to fill them. NOTE: The present document is a Technical Report and contains no requirements, however the text does contain quotes from the AI Act [i.1] where mandates are stated, but where quoted these have no normative effect.
104 062
Securing Artificial Intelligence; Automated Manipulation of Multimedia Identity Representations
TR
1.2.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104062/01.02.01_60/tr_104062v010201p.pdf
The present document covers AI-based techniques for automatically manipulating existing or creating fake identity data represented in different media formats, such as audio, video and text (deepfakes). The present document describes the different technical approaches and analyses the threats posed by deepfakes in different attack scenarios. It then provides technical and organizational measures to mitigate these threats and discusses their effectiveness and limitations.
104 060
Human Factors (HF); Guidance on how to apply the EN 301 549 to digital television products
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104060/01.01.01_60/tr_104060v010101p.pdf
The present document describes the application of accessibility requirements as listed in ETSI EN 301 549 [i.1] herein called "ETSI EN 301 549 [i.1]" to TVs. The focus is on the device capability rather than the whole digital TV field. The scope excludes content provision and delivery.
104 052
System Reference document (SRdoc); Short Range Devices; Radar equipment operating in the 76 GHz to 77 GHz range; additional applications
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104052/01.01.01_60/tr_104052v010101p.pdf
The present document describes applications for SRDs in the 76 - 77 GHz which may require a change in the present regulatory framework for the proposed band. It includes in particular: • Market information; • Technical information regarding equipment type and typical installation; • Regulatory issues. For the applications described, the intended and unwanted emissions are within the current harmonized regulations for SRDs. The regulatory changes that would be required for their realization are relaxations on usage restrictions.
104 051
Securing Artificial Intelligence (SAI); Security aspects of using AI/ML techniques in telecom sector
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104051/01.01.01_60/tr_104051v010101p.pdf
The use of AI to facilitate the use cases may cause AI security and privacy issues specific to the telecom industry. The scope of this proposed work item will be to investigate security and privacy issues related to the use of AI in the telecom industry sector. Harmonisation with 3GPP work in SA1, SA2, and SA3 is anticipated. Key AI use cases in telecom networks are (non-exhaustive list): • Network as a service. • Network optimization. • Network planning and upgrades. • Automating security operations (anomaly detection, planning mitigation and response). This investigation may use but is not limited to the Network Operations Lifecycle Phases methodology.
104 048
Securing Artificial Intelligence (SAI); Data Supply Chain Security
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104048/01.01.01_60/tr_104048v010101p.pdf
The present document addresses the security problems arising from data supply chains in in the development of Artificial Intelligence (AI) and Machine Learning (ML) systems. Data is a critical component in the development of AIML systems. Compromising the integrity of data has been demonstrated to be a viable attack vector against such systems (see clause 4). The present document summarizes the methods currently used to source data for training AI, along with a review of existing initiatives for developing data sharing protocols. It then provides a gap analysis on these methods and initiatives to scope possible requirements for standards for ensuring integrity and confidentiality of the shared data, information and feedback. The present document relates primarily to the security of data, rather than the security of models themselves. It is recognized, however, that AI supply chains can be complex and that models can themselves be part of the supply chain, generating new data for onward training purposes. Model security is therefore influenced by, and in turn influences, the security of the data supply chain. Mitigation and detection methods can be similar for data and models, with poisoning of one being detected by analysis of the other. The present document focuses on security; however, data integrity is not only a security issue. Techniques for assessing and understanding data quality for performance, transparency or ethics purposes are applicable to security assurance too. An adversary aim can be to disrupt or degrade the functionality of a model to achieve a destructive effect. The adoption of mitigations for security purposes will likely improve performance and transparency, and vice versa. The present document does not discuss data theft, which can be considered a traditional cybersecurity problem. The focus is instead specifically on data manipulation in, and its effect on, AI/ML systems.
104 037
Publicly Available Specification (PAS); O-RAN Use Cases Analysis Report (O-RAN.WG1.Use-Cases-Analysis-Report-R003-v12.00)
TR
12.0.0
http://www.etsi.org/deliver/etsi_tr/104000_104099/104037/12.00.00_60/tr_104037v120000p.pdf
The present document specifies potential O-RAN use cases as defined by O-RAN WG1 UCTG (Use Case Task Group). The use cases are described at a very high level, emphasizing how the use is enabled by O-RAN architecture along with basic input data expectations and resulting actions. These high level use cases are prioritized within O-RAN, and selected use cases are further detailed in O-RAN WG1 UCTG and relevant O-RAN WGs to define the requirements for O-RAN components and their interfaces.
104 034
Cyber Security (CYBER); Software Bill of Materials (SBOM) Compendium
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104034/01.01.01_60/tr_104034v010101p.pdf
The present document identifies Software Bill of Material challenges, types, existing specifications, existing tools and cybersecurity uses, including compliance obligations (e.g. regulatory or contractual). The present document identifies gaps and makes recommendations for further work.
104 032
Securing Artificial Intelligence (SAI); Traceability of AI Models
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104032/01.01.01_60/tr_104032v010101p.pdf
The present document describes the role of traceability in the challenge of Securing AI and explores issues related to sharing and re-using models across tasks and industries. The scope includes threats, and their associated remediations where applicable, to ownership rights of AI creators as well as to verification of models origin. Mitigations can be non- AI-Specific (Digital Right Management applicable to AI) and AI-specific techniques (e.g. ML watermarking) from prevention and detection phases. They can be both model-agnostic and model enhancement techniques. The present document aligns terminology with existing ETSI ISG SAI documents and studies, and references/complements previously studied attacks and remediations (ETSI GR SAI 004 [i.2] and ETSI GR SAI 005 [i.3]). It also gathers industrial and academic feedback on traceability and ownership rights protection and model verification in the context of AI.
104 031
Securing Artificial Intelligence (SAI); Collaborative Artificial Intelligence
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104031/01.01.01_60/tr_104031v010101p.pdf
The present document describes collaborative Artificial Intelligence (AI) from securing AI perspectives. Collaborative AI could take place among AI agents, between AI agents and human, and even among people who provide and use AI. As such, the security and performance of collaborative AI may range from AI/ML-specific issues to other system- specific issues (e.g. AI-to-AI communications, joint computing and communicating optimization, etc.). The present document investigates collaborative AI use cases and involved technical aspects, and analyses potential security and performance issues (e.g. AI-to-AI communications, trustworthy collaboration, etc.) among those AI-related entities. The present document also overviews existing approaches to tackle and/or mitigate these issues.
104 030
Securing Artificial Intelligence (SAI); Critical Security Controls for Effective Cyber Defence; Artificial Intelligence Sector
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104030/01.01.01_60/tr_104030v010101p.pdf
The present document applies the latest version of the Critical Security Controls [i.5] and risk measurement tools [i.6] for effective risk control and enhanced resilience of the AI sector together with other industry AI controls.
104 027
User-Centric Approach in the digital ecosystem; The User Information System and Smart Customized Services; Concept, definition and services
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104027/01.01.01_60/tr_104027v010101p.pdf
The present document presents an analysis of the user expectations, with respect to the study of data driven technologies (Artificial Intelligence (AI), deep learning, Machine Learning (ML)) to present the definition and concept of the User Information System (UIS), that enables Smart Customized Services (SCS) from both user and provider side. These services aim to provide personalization, adaptability, and intelligent decision support within the digital ecosystem. NOTE: The UIS and SCS are designed to serve a broad spectrum of users. Their objective is to empower and protect all citizens. By integrating smart and assistive technologies, the system seeks to enhance participation in public, social, and economic activities, while also offering advanced users more autonomy and self-management capabilities.
104 020
Emergency Communications (EMTEL); Main terms and definitions for Emergency Communications
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104020/01.01.01_60/tr_104020v010101p.pdf
The present document lists the terms used across ETSI Standards and Technical Reports that pertain to emergency communications and emergency services. It includes terms that, although defined in other technical domains, carry distinct meanings or require unequivocal definitions specific to the context of emergency communications and emergency services. For ease of reference, terms are organized in alphabetical order without adherence to any other sorting criteria. Additionally, the present document encompasses a list of abbreviations and acronyms, some of which are borrowed from other fields but are relevant and used within the scope of emergency communications and emergency services. In cases of ambiguity between definitions in EU legislation and existing ETSI technical deliverables within the scope of emergency communications and emergency services, the present document should be referenced for clarification; for new ETSI deliverables within the scope of emergency communications and emergency services, the definitions provided herein should be used.
104 016
CYBER; Quantum-Safe Cryptography (QSC); A Repeatable Framework for Quantum-Safe Migrations
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104016/01.01.01_60/tr_104016v010101p.pdf
The present document describes a repeatable divide and conquer-style framework for migrating, in a prioritized order, an enterprise's information security assets from quantum-vulnerable states to quantum-safe states. First, the approach gives recommendations for partitioning the enterprise into discrete elements. Following, through various analyses within and between the elements of the partition, a methodology is described for establishing quantum-safe migration plans for each of those partition elements.
104 012
Reconfigurable Radio Systems (RRS); Feasibility study of the usage of software reconfiguration for Radio Equipment Directive and Proposal for Cyber Resilience Act
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104012/01.01.01_60/tr_104012v010101p.pdf
The present document analyses the applicability of available ETSI deliverables on Software Reconfiguration to the implementation of regulation initiatives currently under way, including specifically: • Radio Equipment Directive Article 3(3)(i) and Article (4) [i.16]. NOTE: One aspect of those Articles relates to the combination of Software and Hardware. • Cyber Resilience Act [i.17].
104 006
Rail Telecommunications (RT); Future Railway Mobile Communication System (FRMCS); Study on Onboard Radio Interface (OBrad)
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104006/01.01.01_60/tr_104006v010101p.pdf
The present document is a study of the Onboard Radio Interface (OBRAD). The following is covered: • An analysis of the requirements on OBRAD captured in UIC FRMCS TOBA FRS [i.1], UIC FRMCS SRS [i.3] and other relevant UIC specifications. • An analysis and identification of available protocols, suitable for OBRAD Data Transport protocol and OBRAD Management and Control protocol. • A proposal on potential solution(s) and possible technical realization(s), covering the physical and functional OBRAD interface as well as physical implementations of the OBRAD interface. • An analysis of the impact of the proposed OBRAD solution/realization to chipset, On-Board FRMCS architecture (Gateway Function, Radio Function, Operation and Maintenance) and migration aspects (existing versus new installations). • An analysis of the capability of the proposed OBRAD solution/realization for performance aspects like responsiveness of the interface, latency, timing, and for availability (redundancy) aspects.
104 005
<empty>
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104005/01.01.01_60/tr_104005v010101p.pdf
The present document analyses the mechanisms that use cryptography in the specifications under ETSI TC SET responsibility. It describes the potential changes for a responsible industry transition to Quantum-Safe technology.
104 004
Environmental Engineering (EE); Processor power management functionality of servers
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104004/01.01.01_60/tr_104004v010101p.pdf
The present document is focused on addressing the characterization of the process power management functionality of servers. The processor power management of servers is limited to those within scope of Commission Regulation (EU) 2019/424 [i.1].
104 003
Cyber Security (CYBER); The vulnerability disclosure ecosystem
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/104000_104099/104003/01.01.01_60/tr_104003v010101p.pdf
The present document provides an overview of the history and facets of the cyber vulnerability disclosure ecosystem. The overview includes the history of this activity, the concepts and specifications that emerged, the diverse venues and use cases, imposed obligations, and the technological and social challenges faced.
103 990
Cyber Security (CYBER); Standards mapping and gap analysis against regulatory expectations
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103990/01.01.01_60/tr_103990v010101p.pdf
The present document provides a standards gap analysis against the regulatory expectations of a number of extant, planned, or in development, regulatory instruments in order to identify where existing standards can be used in support, or where new standards are required to enable regulatory conformance. The primary focus of the present document is the Cyber Resilience Act [i.1] with some consideration of the NIS2 Directive [i.2] and the Cyber Security Act (CSA) [i.3]. NOTE 1: The mapped standards listed in clause 2, whilst they are not directly applicable to the application of the present document, are identified as satisfying in whole or in part, one or more of the regulatory expectations identified. NOTE 2: Matters related to EU policy are not addressed by the present document.
103 977
RFID Measurement methods for transmit spectrum using modern spectrum analysers
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103977/01.01.01_60/tr_103977v010101p.pdf
The present document specifies technical characteristics and methods of measurements for Radio Frequency IDentification (RFID) devices used in the frequency ranges 865 MHz to 868 MHz and 915 MHz to 921 MHz. Power limits up to a maximum of 2 W e.r.p. are specified for this equipment in the frequency band 865 MHz to 868 MHz and up to a maximum of 4 W e.r.p. in the frequency band 915 MHz to 921 MHz. NOTE: The term frequency band is typically used for reference to dedicated bands as described in CEPT ECC ERC Recommendation 70-03 [i.7], while frequency range is used in the other cases. While ETSI EN 302 208 [i.2] covers a comprehensive set of technical characteristics and methods of measurements, the focus of the present document is on transmitter spectrum mask using modern spectrum analysers, and ETSI EN 302 208 [i.2] applies for all other aspects. The types of equipment covered by the present document are as follows: • fixed interrogators; • portable interrogators. The present document contains measurement methods to demonstrate that the specified radio equipment both effectively uses and supports the efficient use of radio spectrum in order to avoid harmful interference.
103 972
DVB-I service delivery over 5G Systems; Deployment Guidelines
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103972/01.01.01_60/tr_103972v010101p.pdf
The present document maps the commercial use cases and requirements from DVB BlueBook C100 [i.1] into deployment guidelines including a reference deployment architecture.
103 967
Cyber Security (CYBER); Quantum-Safe Cryptography (QSC); Impact of Quantum Computing on Symmetric Cryptography
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103967/01.01.01_60/tr_103967v010101p.pdf
The present document gives an overview of the impact of quantum computing on symmetric algorithms such as block ciphers and hash functions. It discusses the practicality of parallelising Grover's algorithm, the effect of limiting quantum circuit depth, and the overhead from quantum error correction. The present document supplements ETSI GR QSC 006 [i.1] by summarizing quantum resource estimates for attacks against widely used symmetric algorithms with reasonable circuit depth assumptions. It also provides guidance on the need to increase symmetric key lengths for a range of different use cases.
103 966
CYBER Security (CYBER); Quantum-Safe Cryptography (QSC); Deployment Considerations for Hybrid Schemes
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103966/01.01.01_60/tr_103966v010101p.pdf
The present document explores issues around combining traditional and post-quantum algorithms to construct hybrid cryptographic schemes. Specifically, the present document examines some of the reasons for proposing and adopting hybrid schemes, both for key establishment and digital signatures; clarifies some of the terminology used to describe hybrid schemes; discusses some of the security, efficiency, and agility trade-offs; highlights some important things to consider when selecting algorithm and parameter combinations; explores some potential deployment and migration issues; and identifies situations where hybrid schemes will need to be deprecated in favour of purely post-quantum algorithms. The present document does not provide guidance on whether or not to use hybrid schemes.
103 965
CYBER; Quantum-Safe Cryptography (QSC); Impact of Quantum Computing on Cryptographic Security Proofs
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103965/01.01.01_60/tr_103965v010101p.pdf
The present document is intended to provide an overview of the impact of quantum computing on the security proofs of several cryptographic protocols. It focuses on cryptographic protocols that can be run on classical hardware; further, it discusses which security proofs are invalidated, or otherwise affected, in the presence of an attacker with access to a CRQC, and discusses for each affected system whether: a) an alternative proof has been found that does provide security against quantum attacks, but possibly with a reduced security level; b) no alternative proof has been found, but security is expected to still hold; c) the cryptographic system is expected to be broken by quantum attacks, in a way which is not captured by the classical security proof, although no concrete quantum attack exists yet; or d) a concrete quantum attack that breaks security, in a way which is not captured by the classical proof, is available. In terms of the security proofs and problems under consideration, the present document includes the following: 1) The quantum random oracle model, and in particular its usage in: a) The Fiat-Shamir transformation. b) The Fujisaki-Okamoto transformation. 2) The rewinding technique for zero-knowledge proof systems. 3) The binding property of commitment schemes. 4) The universal-composability framework. 5) The indifferentiability framework. 6) Security proofs of pseudo-random functions. In addition to presenting the theoretical developments on these topics, the present document elaborates on the practical consequences. In some cases, the security of classically secure schemes is uncertain in the face of a quantum adversary. In other cases, the security of the scheme holds, but the parameters need to be adjusted to retain the same level of security. NOTE: The present document does not discuss so-called "quantum-annoying" schemes, which still base their security on computational problems that can be solved (relatively) efficiently by a quantum computer, but force such an attack to perform a high number of operations, hence making it impractical for the expected first generation of quantum computers.
103 960
Cyber Security (CYBER); Implementation of the Digital Operational Resilience Act (DORA)
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103960/01.01.01_60/tr_103960v010101p.pdf
The present document studies the requirements, available standards, tools, and gaps for implementing the DORA (Regulation (EU) 2022/2554 [i.1]) together with guidance relating to the use of encryption and post-quantum safeguards.
103 959
Cyber Security (CYBER); Critical Security Controls for Effective Cyber Defence; Cloud Sector
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103959/01.01.01_60/tr_103959v010101p.pdf
The present document applies the latest version of the Critical Security Controls [i.20] for effective risk control and enhanced resilience of the Cloud Sector and adds mappings to CSA Security Controls and Cloud Data Centre Hardened Image implementations [i.21].
103 958
Cyber Security (CYBER); Study Implementation of the Resilience of Critical Entities Directive
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103958/01.01.01_60/tr_103958v010101p.pdf
The present document studies and identifies gaps aimed at implementation guidance for relevant provisions of the EU Resilience of Critical Entities (CER) Directive, especially related to transportation, eHealth, space systems and encryption.
103 957
Cyber Security (CYBER); Metaverse Cyber Security Analysis
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103957/01.01.01_60/tr_103957v010101p.pdf
The present document from the perspective of a use case driven risk analysis, including gaps, applicable to the virtual world (termed Metaverse), respecting environmental constraints, represented as an immersive and constant virtual 3D world where users (people) interact by means of an avatar to carry out a wide range of activities, analyse uniquely new cyber security requirements and technical standards. References to EU/CEPT requirements and ETSI work are provided [i.1] thru [i.5].
103 956
Satellite Earth Stations and Systems (SES); Technical analysis for the Radio Frequency, Modulation and Coding for Telemetry Command and Ranging (TCR) of Communications Satellites
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103956/01.01.01_60/tr_103956v010101p.pdf
The present document provides the rationale for the revision of the ETSI TCR Standard ETSI EN 301 926 [i.1] in the following areas: • frequency plan; • operational phases; • hosted payload management application; • mega-constellation application; • spread spectrum modulation; • phase and frequency modulation; and • coding and interleaving.
103 954
Cyber Security (CYBER); Critical Security Controls for Effective Cyber Defence; Mobile Communications Sector
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103954/01.01.01_60/tr_103954v010101p.pdf
The present document applies the latest version of the Critical Security Controls ([i.10] and [i.15]) for effective risk control and enhanced resilience of the Mobile Communications sector and includes mappings to latest version of the GSMA Security Controls.
103 953
Cyber Security (CYBER); Guidelines for TLMSP Usage
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103953/01.01.01_60/tr_103953v010101p.pdf
The present document provides guidelines on how to use ETSI TS 103 523-2 [i.6] (TLMSP) in different scenarios; for example, when different application layer protocols are used, or when TLMSP is used for different services. It provides guidelines on the following topics: • How to map different parts of the application layer protocol onto different TLMSP contexts. • Which middlebox functionality that is relevant and how to assign access rights to allow the corresponding middlebox operations. • Suitable trust model(s). • Use of the different optional TLMSP features. • Implementation and usability aspects.
103 952
Smart Body Area Network (SmartBAN); Brain Computer Interface (BCI)
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103952/01.01.01_60/tr_103952v010101p.pdf
The present document is limited to providing information for the brain computer interface use case. The present document discusses proof of concept in the design of the wireless interface for the next-generation of μECoG electrode arrays implanted in the human brain. This includes recording and stimulation of large regions of the brain at a high spatial resolution, as well as energy harvesting, power management, and data communications processing. In particular, the present document focuses on the wireless communication interface.
103 950
Speech and multimedia Transmission Quality (STQ); Gender-related aspects of listening quality and effort in speech communication systems
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103950/01.01.01_60/tr_103950v010101p.pdf
The present document addresses the effects of the speaker's gender-related aspects on transmission quality. It provides recommendations on test procedures and implementation means for future technologies dedicated to human speech communication systems, in order to balance transmission quality among genders.
103 949
Quantum-Safe Cryptography (QSC) Migration; ITS and C-ITS migration study
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103949/01.01.01_60/tr_103949v010101p.pdf
The present document reviews the state of deployment of cryptographic security mechanisms in Intelligent Transport Systems (ITS) and Cooperative Intelligent Transport Systems (C-ITS) and their susceptibility to attack by a quantum computer. The present document makes a number of recommendations regarding the adoption of Quantum Safe Cryptography in order to minimize the exposure of ITS and C-ITS to attack.
103 948
Wireline Access Network Systems; General engineering for existing network reuse; Implementation of IP equipment on existing coaxial networks
TR
1.1.2
http://www.etsi.org/deliver/etsi_tr/103900_103999/103948/01.01.02_60/tr_103948v010102p.pdf
The present document supports deployment of video surveillance equipment standardized in ETSI TS 105 176-2 [i.1] and ETSI TR 105 177 [i.2] on existing networks.
103 946
Methods for Testing & Specification (MTS); Security validation of IoT architecture application and conformity; Case Study Experiences
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103946/01.01.01_60/tr_103946v010101p.pdf
The goal of the present document is to compile case study experiences related to the security validation and assurance for the integration and conformity of IoT applications with an existing IoT architecture in order to have a common understanding in MTS and related committees and to support trustworthiness. Industrial experiences may cover but are not restricted to the following domains: smart home, smart grid, unmanned air systems, automated driving.
103 944
Smart Body Area Network (SmartBAN); Technical Report on Smart Coordinator for SmartBAN Networks
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103944/01.01.01_60/tr_103944v010101p.pdf
The present document is limited to providing information about the smart coordinator operating at the link layer.
103 943
System Reference document (SRdoc); DECT-2020 NR technology operating in frequency bands below 6 GHz
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103943/01.01.01_60/tr_103943v010101p.pdf
The present document provides information on the intended applications, markets and the technical parameters and functionalities of DECT-2020 NR technology and its deployment capabilities. The SRDoc contains information to support the CEPT activities e.g. for the EC mandate on technical conditions regarding the shared use of the 3,8 to 4,2 GHz frequency band. In addition, the present document contains information and proposals for operation on additional frequency bands outside the 1 880 to 1 900 MHz frequency band. The present document includes the necessary information to support the co-operation between ETSI and the Electronic Communications Committee (ECC) of the European Conference of Post and Telecommunications Administrations (CEPT).
103 937
Cyber Security (CYBER); Cyber Resiliency and Supply Chain Management
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103937/01.01.01_60/tr_103937v010101p.pdf
The present document addresses cyber resiliency throughout the supply chain and the various related frameworks and measures using risk-based, system of trust, and zero trust approaches, including the proposed EU Cyber Resilience Act, [i.1] through [i.8].
103 936
Cyber Security (CYBER); Implementing Design practices to mitigate consumer IoT-enabled coercive control
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103936/01.01.01_60/tr_103936v010101p.pdf
The present document is an informative ETSI Technical Report (TR) that recommends initial design practices to minimize the potential of coercive control through the use of consumer Internet of Things (IoT) devices. The diversity and proliferation of consumer IoT devices provides new mechanisms that attackers might misuse, and this is a risk that should be addressed by industry. The present document provides emerging design practices through examples and explanatory text for organizations involved in the development and manufacturing of Consumer IoT devices and associated services. The intent of the present document is to identify design practices to minimize potential misuse of Consumer IoT devices and associated services for coercive control whilst not limiting the intended functionality of the device by the user. Although the present document is focused on design practices for Consumer IoT devices, the guidance also applies to multiple other types of smart technologies including but not limited to Smart TVs, alarm systems, stereos, etc. The present document also covers the surrounding eco-system around consumer IoT devices, this includes how related technology, services, and the user behaviour of consumer IoT devices relates to the issues of coercive control.
103 935
Cyber Security (CYBER); Assessment of cyber risk based on products’ properties to support market placement
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103935/01.01.01_60/tr_103935v010101p.pdf
The present document examines the background to the assessment of cybersecurity risks and identifies issues that may arise in the context of placing ICT products and services in the EU Single Market under the applicable legal requirements. Issues relevant to that scope are explored and options identified for possibly consideration in ETSI working practices to addresses these issues. Under the New Legislative Framework (NLF) that governs the placement of products and services in the EU Single Market, harmonised standards provide a path of minimal economic friction for the agile introduction of technological innovations across EU Member States. In turn, risk assessment plays a pivotal role in the development of harmonised standards that, whilst supporting conformance to the applicable legal requirements, are also economically efficient. The importance of harmonised standards to the smooth and efficient design and development of products and services to be placed on the EU Single Market has been recognized by the European Commission and the European Standardization Organizations. Because the assessment of cyber risks is a fundamentally combinatorial exercise, the complexity and time it takes for a European Standardization Organization to identify and analyse the risk that should be considered in the harmonised standards increases exponentially with the scope that the respective legislation covers and the portfolio of ICT products and services it applies to. In simple terms, the greater the range of products and services within the scope of a particular legislation, the larger the set of possible use cases to consider will be, and thus the larger the workload of the risk assessment. The present document presents the framework that underpins the placement of products in the EU Single Market in regard to risk assessment matters. It highlights of the salient features that, in accordance to common knowledge in the domain, good risk assessment approaches demonstrate. It also outlines the most common standards that underpin the application of risk assessment in an international context. In addition, it presents key characteristics of good approaches to the assessment of risks. Finally, it scopes the space of solutions that includes risk assessment approaches fit to inform the development and the application of harmonised standards in support of market placement. The concepts and the approach put forth in the present document are applicable to products, as defined in [i.14], that are or can be described through properties that take distinct values. The present document does not address the estimation of probability distributions that characterize the occurrence of events that contribute to particular risks. More specifically, it assumes that a stable body of knowledge in support of such estimates exists and builds on such estimates, if any, that apply in a given risk assessment scenario. A solution that, for illustration purposes, is shown in Annex A of the present document, assumes that errors in the estimation of numerical boundaries of risk classes follow a normal distribution. However, this assumption serves exclusively illustration purposes and does not restrict the application of the solution under the assumption of a different distribution. Finally, in regard to the ICT industry's recent focus on zero trust [i.41] and vulnerability disclosure: zero trust is beyond the scope of risk assessment, as according to ISO 31000:2018 [i.2], enforcement actions are part of risk treatment, which, while informed by the outcomes of risk assessment, is beyond the scope of risk assessment. Likewise, vulnerability disclosure, whose ecosystem is presented in ETSI TR 104 003 [i.42], while informed by the outcomes of risk assessment, is beyond the scope of the risk assessment process itself.
103 930
Guide for the development of Harmonised Standards falling under article 3.2 of the Radio Equipment Directive (RED); Meteorological and Primary Radars
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103930/01.01.01_60/tr_103930v010101p.pdf
The present document describes the applicability of the technical requirements related to article 3.2 of the RED [i.2] as defined in ETSI EG 203 336 [i.1] for the following types of primary, monostatic radar systems: • ground-based aeronautical radars (e.g. air surveillance radars, surface movement radars and runway debris detection radars); • meteorological radars (e.g. weather radars and wind profilers); • land-based surveillance maritime radars (e.g. coastal and VTS radars); • shipborne maritime radars not falling under the MED Directive [i.8] (i.e. non-SOLAS radars and river radars). The present document also addresses technical issues and provide guidelines (such as spurious emission measurements for waveguide-based systems) for the test procedures related to the applicable technical requirements.
103 910
Methods for Testing and Specification (MTS); AI Testing; Test Methodology and Test Specification for ML-based Systems
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103910/01.01.01_60/tr_103910v010101p.pdf
The present document describes test types, test items, quality criteria, and testing methodologies associated with testing ML-based systems, with an emphasis on supervised, unsupervised, and reinforcement learning. The present document outlines how these testing practices can be effectively integrated into the life cycle of typical ML-based systems. The present document applies to all types of organizations involved in any of the lifecycle stages of developing and operating ML-based systems as well as to any other stakeholder roles.
103 907
Speech and multimedia Transmission Quality (STQ); Test methods for insert type headsets enabled with structure-borne speech capture
TR
1.1.1
http://www.etsi.org/deliver/etsi_tr/103900_103999/103907/01.01.01_60/tr_103907v010101p.pdf
The present document provides test setups and test methods for headsets, which use human bone conduction as an additional input signal to the air-borne transmitted voice of the near-end talker. The work described in the present document includes test setup description, validation procedures and standardized test methods focusing on the time- variant behaviour of headset devices that utilize bone conduction in their signal processing.