Search Legislation

Council Regulation (EEC) No 3821/85Show full title

Council Regulation (EEC) No 3821/85 of 20 December 1985 on recording equipment in road transport

 Help about what version

What Version

 Help about advanced features

Advanced Features

Close

This is a legislation item that originated from the EU

After exit day there will be three versions of this legislation to consult for different purposes. The legislation.gov.uk version is the version that applies in the UK. The EU Version currently on EUR-lex is the version that currently applies in the EU i.e you may need this if you operate a business in the EU.

The web archive version is the official version of this legislation item as it stood on exit day before being published to legislation.gov.uk and any subsequent UK changes and effects applied. The web archive also captured associated case law and other language formats from EUR-Lex.

Status:

Point in time view as at 31/01/2020.

Changes to legislation:

There are currently no known outstanding effects for the Council Regulation (EEC) No 3821/85, MOTION SENSOR GENERIC SECURITY TARGET . Help about Changes to Legislation

Close

Changes to Legislation

Revised legislation carried on this site may not be fully up to date. At the current time any known changes or effects made by subsequent legislation have been applied to the text of the legislation you are viewing by the editorial team. Please see ‘Frequently Asked Questions’ for details regarding the timescales for which new effects are identified and recorded on this site.

[F1 [F2MOTION SENSOR GENERIC SECURITY TARGET U.K.

1. Introduction U.K.

This document contains a description of the motion sensor, of the threats it must be able to counteract and of the security objectives it must achieve. It specifies the required security enforcing functions. It states the claimed minimum strength of security mechanisms and the required level of assurance for the development and the evaluation.

Requirements referred to in the document, are those of the body of Annex I B. For clarity of reading, duplication sometimes arises between Annex I B body requirements and security target requirements. In case of ambiguity between a security target requirement and the Annex I B body requirement referred by this security target requirement, the Annex I B body requirement shall prevail.

Annex I B body requirements not referred by security targets are not the subject of security enforcing functions.

Unique labels have been assigned to threats, objectives, procedural means and SEF specifications for the purpose of traceability to development and evaluation documentation.

2. Abbreviations, definitions and references U.K.
2.1. Abbreviations U.K.
ROM

Read only Memory

SEF

Security enforcing function

TBD

To be defined

TOE

Target of evaluation

VU

Vehicle unit.

2.2. Definitions U.K.
Digital Tachograph

Recording equipment

Entity

A device connected to the motion sensor

Motion data

The data exchanged with the VU, representative of speed and distance travelled

Physically separated parts

Physical components of the motion sensor that are distributed in the vehicle as opposed to physical components gathered into the motion sensor casing

Security data

The specific data needed to support security enforcing functions (e.g. crypto keys)

System

Equipment, people or organisations, involved in any way with the recording equipment

User

A human user of the motion sensor (when not used in the expression user data )

User data

Any data, other than motion or security data, recorded or stored by the motion sensor.

2.3. References U.K.
ITSEC

ITSEC Information Technology Security Evaluation Criteria 1991.

3. Product rationale U.K.
3.1. Motion sensor description and method of use U.K.

The motion sensor is intended to be installed in road transport vehicles. Its purpose is to provide a VU with secured motion data representative of vehicle's speed and distance travelled.

The motion sensor is mechanically interfaced to a moving part of the vehicle, which movement can be representative of vehicle's speed or distance travelled. It may be located in the vehicle's gear box or in any other part of the vehicle.

In its operational mode, the motion sensor is connected to a VU.

It may also be connected to specific equipment for management purposes (TBD by manufacturer).

The typical motion sensor is described in the following figure:

3.2. Motion sensor life cycle U.K.

The typical life cycle of the motion sensor is described in the following figure:

3.3. Threats U.K.

This paragraph describes the threats the motion sensor may face.

3.3.1. Threats to access control policies U.K.
T.Access

Users could try to access functions not allowed to them.

3.3.2. Design related threats U.K.
T.Faults

Faults in hardware, software, communication procedures could place the motion sensor in unforeseen conditions compromising its security

T.Tests

The use of non invalidated test modes or of existing back doors could compromise the motion sensor security

T.Design

Users could try to gain illicit knowledge of design either from manufacturer's material (through theft, bribery, …) or from reverse engineering.

3.3.3. Operation oriented threats U.K.
T.Environment

Users could compromise the motion sensor security through environmental attacks (thermal, electromagnetic, optical, chemical, mechanical, …)

T.Hardware

Users could try to modify motion sensor hardware

T.Mechanical_Origin

Users could try to manipulate the motion sensor input (e.g. unscrewing from gearbox, …)

T.Motion_Data

Users could try to modify the vehicle's motion data (addition, modification, deletion, replay of signal)

T.Power_Supply

Users could try to defeat the motion sensor security objectives by modifying (cutting, reducing, increasing) its power supply

T.Security_Data

Users could try to gain illicit knowledge of security data during security data generation or transport or storage in the equipment

T.Software

Users could try to modify motion sensor software

T.Stored_Data

Users could try to modify stored data (security or user data).

3.4. Security objectives U.K.

The main security objective of the digital tachograph system is the following:

O.Main

The data to be checked by control authorities must be available and reflect fully and accurately the activities of controlled drivers and vehicles in terms of driving, work, availability and rest periods and in terms of vehicle speed

Therefore the security objective of the motion sensor, contributing to the global security objective, is:

O.Sensor_Main

The data transmitted by the motion sensor must be available to the VU so as to allow the VU to determine fully and accurately the movement of the vehicle in terms of speed and distance travelled.

3.5. Information technology security objectives U.K.

The specific IT security objectives of the motion sensor contributing to its main security objective, are the following:

O.Access

The motion sensor must control connected entities' access to functions and data

O.Audit

The motion sensor must audit attempts to undermine its security and should trace them to associated entities

O.Authentication

The motion sensor must authenticate connected entities

O.Processing

The motion sensor must ensure that processing of input to derive motion data is accurate

O.Reliability

The motion sensor must provide a reliable service

O.Secured_Data_Exchange

The motion sensor must secure data exchanges with the VU.

3.6. Physical, personnel or procedural means U.K.

This paragraph describes physical, personnel or procedural requirements that contribute to the security of the motion sensor.

3.6.1. Equipment design U.K.
M.Development

Motion sensor developers must ensure that the assignment of responsibilities during development is done in a manner which maintains IT security

M.Manufacturing

Motion sensor manufacturers must ensure that the assignment of responsibilities during manufacturing is done in a manner which maintains IT security, and that during the manufacturing process the motion sensor is protected from physical attacks which might compromise IT security.

3.6.2. Equipment delivery U.K.
M.Delivery

Motion sensor manufacturers, vehicle manufacturers and fitters or workshops must ensure that handling of the motion sensor is done in a manner which maintains IT security.

3.6.3. Security data generation and delivery U.K.
M.Sec_Data_Generation

Security data generation algorithms must be accessible to authorised and trusted persons only

M.Sec_Data_Transport

Security data must be generated, transported, and inserted into the motion sensor, in such a way to preserve its appropriate confidentiality and integrity.

3.6.4. Recording equipment installation, calibration, and inspection U.K.
M.Approved_Workshops

Installation, calibration and repair of recording equipment must be carried by trusted and approved fitters or workshops

M.Mechanical_Interface

Means of detecting physical tampering with the mechanical interface must be provided (e.g. seals)

M.Regular_Inpections

Recording equipment must be periodically inspected and calibrated.

3.6.5. Law enforcement control U.K.
M.Controls

Law enforcement controls must be performed regularly and randomly, and must include security audits.

3.6.6. Software upgrades U.K.
M.Software_Upgrade

Software revisions must be granted security certification before they can be implemented in a motion sensor.

4. Security enforcing functions U.K.
4.1. Identification and authentication U.K.

[UIA_101] The motion sensor shall be able to establish, for every interaction, the identity of any entity it is connected to.

[UIA_102] The identity of a connected entity shall consist of:

  • an entity group:

    • VU,

    • Management device,

    • Other,

  • an entity ID (VU only).

[UIA_103] The entity ID of a connected VU shall consist of the VU approval number and the VU serial number.

[UIA_104] The motion sensor shall be able to authenticate any VU or management device it is connected to:

  • at entity connection,

  • at power supply recovery.

[UIA_105] The motion sensor shall be able to periodically re-authenticate the VU it is connected to.

[UIA_106] The motion sensor shall detect and prevent use of authentication data that has been copied and replayed.

[UIA_107] After (TBD by manufacturer and not more than 20) consecutive unsuccessful authentication attempts have been detected, the SEF shall:

  • generate an audit record of the event,

  • warn the entity,

  • continue to export motion data in a non secured mode.

4.2. Access control U.K.

Access controls ensure that information is read from, created in, or modified into the TOE only by those authorised to do so.

4.2.1. Access control policy U.K.

[ACC_101] The motion sensor shall control access rights to function and data.

4.2.2. Data access rights U.K.

[ACC_102] The motion sensor shall ensure that motion sensor identification data can be written once only (requirement 078).

[ACC_103] The motion sensor shall accept and/or store user data from authenticated entities only.

[ACC_104] The motion sensor shall enforce appropriate read and write access rights to security data.

4.2.3. File structure and access conditions U.K.

[ACC_105] Application and data files structure and access conditions shall be created during the manufacturing process, and then locked from any future modification or deletion.

4.3. Accountability U.K.

[ACT_101] The motion sensor shall hold in its memory motion sensor identification data (requirement 077).

[ACT_102] The motion sensor shall store in its memory installation data (requirement 099).

[ACT_103] The motion sensor shall have a capability to output accountability data to authenticated entities at their request.

4.4. Audit U.K.

[AUD_101] The motion sensor shall, for events impairing its security, generate audit records of the events.

[AUD_102] The events affecting the security of the motion sensor are the following:

  • security breach attempts,

    • authentication failure,

    • stored data integrity error,

    • internal data transfer error,

    • unauthorised case opening,

    • hardware sabotage.

  • sensor fault.

[AUD_103] Audit records shall include the following data:

  • date and time of the event,

  • type of event,

  • connected entity identity.

when required data is not available, an appropriate default indication shall be given (TBD by manufacturer).

[AUD_104] The motion sensor shall send the generated audit records to the VU at the moment of their generation, and may also store them in its memory.

[AUD_105] In the case where the motion sensor stores audit records, it shall ensure that 20 audit records will be maintained independent of audit storage exhaustion, and shall have a capability to output stored audit records to authenticated entities at their request.

4.5. Accuracy U.K.
4.5.1. Information flow control policy U.K.

[ACR_101] The motion sensor shall ensure that motion data may only been processed and derived from sensor mechanical input.

4.5.2. Internal data transfers U.K.

The requirements of this paragraph apply only if the motion sensor makes use of physically separated parts.

[ACR_102] If data are transferred between physically separated parts of the motion sensor, the data shall be protected from modification.

[ACR_103] Upon detection of a data transfer error during an internal transfer, transmission shall be repeated and the SEF shall generate an audit record of the event.

4.5.3. Stored data integrity U.K.

[ACR_104] The motion sensor shall check user data stored in its memory for integrity errors.

[ACR_105] Upon detection of a stored user data integrity error, the SEF shall generate an audit record.

4.6. Reliability of service U.K.
4.6.1 Tests U.K.

[RLB_101] All commands, actions, or test points, specific to the testing needs of the manufacturing phase shall be disabled or removed before the end of the manufacturing phase. It shall not be possible to restore them for later use.

[RLB_102] The motion sensor shall run self-tests, during initial start-up, and during normal operation to verify its correct operation. The motion sensor self-tests shall include a verification of the integrity of security data and a verification of the integrity of stored executable code (if not in ROM).

[RLB_103] Upon detection of an internal fault during self-test, the SEF shall generate an audit record (sensor fault).

4.6.2. Software U.K.

[RLB_104] There shall be no way to analyse or debug the motion sensor software in the field.

[RLB_105] Inputs from external sources shall not be accepted as executable code.

4.6.3. Physical protection U.K.

[RLB_106] If the motion sensor is designed so that it can be opened, the motion sensor shall detect any case opening, even without external power supply for a minimum of 6 months. In such a case, the SEF shall generate an audit record of the event (It is acceptable that the audit record is generated and stored after power supply reconnection).

If the motion sensor is designed so that it cannot be opened, it shall be designed such that physical tampering attempts can be easily detected (e.g. through visual inspection).

[RLB_107] The motion sensor shall detect specified (TBD by manufacturer) hardware sabotage.

[RLB_108] In the case described above, the SEF shall generate an audit record and the motion sensor shall: (TBD by manufacturer).

4.6.4. Power supply interruptions U.K.

[RLB_109] The motion sensor shall preserve a secure state during power supply cut-off or variations.

4.6.5. Reset conditions U.K.

[RLB_110] In case of a power supply interruption, or if a transaction is stopped before completion, or on any other reset conditions, the motion sensor shall be reset cleanly.

4.6.6. Data availability U.K.

[RLB_111] The motion sensor shall ensure that access to resources is obtained when required and that resources are not requested nor retained unnecessarily.

4.6.7. Multiple applications U.K.

[RLB_112] If the motion sensor provides applications other than the tachograph application, all applications shall be physically and/or logically separated from each other. These applications shall not share security data. Only one task shall be active at a time.

4.7. Data exchange U.K.

[DEX_101] The motion sensor shall export motion data to the VU with associated security attributes, such that the VU will be able to verify its integrity and authenticity.

4.8. Cryptographic support U.K.

The requirements of this paragraph are applicable only where needed, depending upon security mechanisms used and upon the manufacturer's solutions.

[CSP_101] Any cryptographic operation performed by the motion sensor shall be in accordance with a specified algorithm and a specified key size.

[CSP_102] If the motion sensor generates cryptographic keys, it shall be in accordance with specified cryptographic key generation algorithms and specified cryptographic key sizes.

[CSP_103] If the motion sensor distributes cryptographic keys, it shall be in accordance with specified key distribution methods.

[CSP_104] If the motion sensor accesses cryptographic keys, it shall be in accordance with specified cryptographic keys access methods.

[CSP_105] If the motion sensor destroys cryptographic keys, it shall be in accordance with specified cryptographic keys destruction methods.

5. Definition of security mechanisms U.K.

The security mechanisms, fulfilling the motion sensor security enforcing functions, are defined by the motion sensor manufacturers.

6. Minimum strength of security mechanisms U.K.

The minimum strength of the motion sensor security mechanisms is High, as defined in (ITSEC).

7. Level of assurance U.K.

The target level of assurance for the motion sensor is ITSEC level E3, as defined in (ITSEC).

8. Rationale U.K.

The following matrixes give a rationale for the SEFs by showing:

  • which SEFs or means counteract which threats,

  • which SEFs fulfil which IT security objectives.

Threats IT Objectives
Access Faults Tests Design Environment Hardware Mechanical_Origin Motion_Data Power_Supply Security_Data Software Stored_Data Access Audit Authentication Processing Reliability Secured_Data_Exchange
Physical Personnel Procedural means
Development x x x
Manufacturing x x
Delivery x x x
Security Data Generation x
Security Data Transport x
Approved Workshops x
Mechanical interface x
Regular Inspection x x x x
Law enforcement controls x x x x x x
Software Upgrades x
Security Enforcing Functions
Identification and authentication
UIA_101 Entities identification x x x x x
UIA_102 Entities identity x x x
UIA_103 VU identity x
UIA_104 Entities authentication x x x x x
UIA_105 re-authentication x x x x x
UIA_106 Unforgeable authentication x x x x
UIA_107 Authentication failure x x x
Access control
ACC_101 Access control policy x x x x
ACC_102 Motion sensor ID x x
ACC_103 User data x x
ACC_104 Security Data x x x
ACC_105 File structure and access conditions x x x x
Accountability
ACT_101 Motion sensor ID data x
ACT_102 Pairing data x
ACT_103 Accountability data x
Audit
AUD_101 Audit records x
AUD_102 Audit events list x x x x x
AUD_103 Audit data x
AUD_104 Audit tools x
AUD_105 Audit records storage x
Accuracy
ACR_101 Information flow control policy x x x
ACR_102 Internal transfers x x
ACR_103 Internal transfers x
ACR_104 Stored data integrity x x
ACR_105 Stored data integrity x x
Reliability
RLB_101 Manufacturing tests x x x
RLB_102 Self tests x x x x x
RLB_103 Self tests x x x x
RLB_104 Software analysis x x x
RLB_105 Software input x x x
RLB_106 Case opening x x x x x x x
RLB_107 Hardware sabotage x x
RLB_108 Hardware sabotage x x
RLB_109 Power supply interruptions x x
RLB_110 Reset x x
RLB_111 Data Availability x x
RLB_112 Multiple Applications x
Data exchange
DEX_101 Secured motion data export x x
Cryptographic support
CSP_101 Algorithms x x
CSP_102 key generation x x
CSP_103 key distribution x x
CSP_104 key access x x
CSP_105 key destruction x x] ]

Back to top

Options/Help

Print Options

You have chosen to open the Whole Regulation

The Whole Regulation you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.

Would you like to continue?

You have chosen to open Schedules only

The Schedules you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.

Would you like to continue?

Close

Legislation is available in different versions:

Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area.

Original (As adopted by EU): The original version of the legislation as it stood when it was first adopted in the EU. No changes have been applied to the text.

Point in Time: This becomes available after navigating to view revised legislation as it stood at a certain point in time via Advanced Features > Show Timeline of Changes or via a point in time advanced search.

Close

See additional information alongside the content

Geographical Extent: Indicates the geographical area that this provision applies to. For further information see ‘Frequently Asked Questions’.

Show Timeline of Changes: See how this legislation has or could change over time. Turning this feature on will show extra navigation options to go to these specific points in time. Return to the latest available version by using the controls above in the What Version box.

Close

Opening Options

Different options to open legislation in order to view more content on screen at once

Close

More Resources

Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include:

  • the original print PDF of the as adopted version that was used for the EU Official Journal
  • lists of changes made by and/or affecting this legislation item
  • all formats of all associated documents
  • correction slips
  • links to related legislation and further information resources
Close

Timeline of Changes

This timeline shows the different versions taken from EUR-Lex before exit day and during the implementation period as well as any subsequent versions created after the implementation period as a result of changes made by UK legislation.

The dates for the EU versions are taken from the document dates on EUR-Lex and may not always coincide with when the changes came into force for the document.

For any versions created after the implementation period as a result of changes made by UK legislation the date will coincide with the earliest date on which the change (e.g an insertion, a repeal or a substitution) that was applied came into force. For further information see our guide to revised legislation on Understanding Legislation.

Close

More Resources

Use this menu to access essential accompanying documents and information for this legislation item. Dependent on the legislation item being viewed this may include:

  • the original print PDF of the as adopted version that was used for the print copy
  • correction slips

Click 'View More' or select 'More Resources' tab for additional information including:

  • lists of changes made by and/or affecting this legislation item
  • confers power and blanket amendment details
  • all formats of all associated documents
  • links to related legislation and further information resources