Security in Transnational Interoperable PPDR Communications: Threats, Requirements and Architecture Solution

被引:1
|
作者
Ferrus, Ramon [1 ]
Sallent, Oriol [1 ]
Verkoelen, Cor
Fransen, Frank [2 ]
Andersen, Keld [3 ]
Bjerrum-Niese, Christian [3 ]
Saijonmaa, Jaakko [4 ]
Olivieri, Claudia [5 ]
Duits, Michel [6 ]
Galin, Anita [7 ]
Pangallo, Franco [8 ]
Modi, Debora Proietti [8 ]
机构
[1] UPC, Signal Theory & Commun Dept, Barcelona, Spain
[2] TNO, The Hague, Netherlands
[3] Motorola Solut, Glostrup, Denmark
[4] Airbus Def & Space OY, Helsinki, Finland
[5] Finmeccan Spa, Genoa, Italy
[6] Direktoratet Nodkommuikasjon, Oslo, Norway
[7] MSB Swedish Civil Contingencies Agcy, Karlstad, Sweden
[8] Ist Super Comunicaz ISCOM, Radio Mobile Dept, Rome, Italy
关键词
Emergency Services Communications; Inter-System Interconnection; Public Safety Communications; Risk; Security Requirements; TETRA; TETRAPOL; Threat; Vulnerability Analysis;
D O I
10.4018/IJDST.2016100103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery and security against crime. Nevertheless, uncertainty on costs, timescale and functionalities have slowed down the interconnection of national PPDR networks and limited the transnational cooperation of their PPDR forces so far. Currently, the European research project ISITEP is aimed at developing the legal, operational and technical framework to achieve a cost effective solution for PPDR interoperability across European countries. Inter alia, ISITEP project is specifying a new Inter-System-Interface (ISI) for the interconnection of current TETRA and TETRAPOL networks through Internet Protocol (IP) connectivity. This approach turns communications security as a central aspect. In this context, this paper describes the framework and methodology defined to carry out the development of the security requirements for the interconnection of PPDR networks via the new IP ISI and provides a discussion on the undertaken security risk and vulnerability analysis. Furthermore, an overview of the designed security architecture solution for network interconnection is provided.
引用
收藏
页码:41 / 60
页数:20
相关论文
共 50 条
  • [31] Security Threats among DICOM Imaging Communications in Public Networks
    Zhou, Feng
    Zhang, Zhongqi
    Wang, Jin
    Li, Bin
    Kim, Jeong-Uk
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2014, 7 (06): : 241 - 250
  • [32] Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions
    Abbasi, Mahmoud
    Plaza-Hernandez, Marta
    Prieto, Javier
    Corchado, Juan M.
    [J]. IEEE ACCESS, 2022, 10 : 97197 - 97216
  • [33] A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
    Hassija, Vikas
    Chamola, Vinay
    Saxena, Vikas
    Jain, Divyansh
    Goyal, Pranav
    Sikdar, Biplab
    [J]. IEEE ACCESS, 2019, 7 : 82721 - 82743
  • [34] AN ADAPTIVE SECURITY ARCHITECTURE FOR FUTURE AIRCRAFT COMMUNICATIONS
    Ben Mahmoud, Mohamed Slim
    Larrieu, Nicolas
    Pirovano, Alain
    Varet, Antoine
    [J]. 29TH DIGITAL AVIONICS SYSTEMS CONFERENCE: IMPROVING OUR ENVIRONMENT THROUGH GREEN AVIONICS AND ATM SOLUTIONS, 2010,
  • [35] Security measures in a secure computer communications architecture
    Bottino, Louis J.
    [J]. 2006 IEEE/AIAA 25TH DIGITAL AVIONICS SYSTEMS CONFERENCE, VOLS 1- 3, 2006, : 1078 - 1095
  • [36] Deadly transfers and the global playground: Transnational security threats in a disorderly world.
    McHorney, C
    [J]. AMERICAN POLITICAL SCIENCE REVIEW, 2000, 94 (04) : 994 - 995
  • [37] Security Requirements in a Federated Cloud Networking Architecture
    Massonet, Philippe
    Levin, Anna
    Celesti, Antonio
    Villari, Massimo
    [J]. ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2015), 2016, 567 : 79 - 88
  • [38] Security Architecture and Requirements for Wireless Sensor Networks
    Gong, Yiguang
    Ruan, Feng
    Fan, Zhiyong
    Hou, Jianmin
    Mei, Ping
    Li, Tao
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 295 - 302
  • [39] Cloud Security: A Review of Recent Threats and Solution Models
    Ugorji, Betrand
    Abouzakhar, Nasser
    Sapsford, John
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 115 - 123
  • [40] Blockchain as a Countermeasure Solution for Security Threats of Healthcare Applications
    Iqbal, Mubashar
    Matulevicius, Raimundas
    [J]. BUSINESS PROCESS MANAGEMENT: BLOCKCHAIN AND ROBOTIC PROCESS AUTOMATION FORUM, BPM 2021 BLOCKCHAIN AND RPA FORUM, 2021, 428 : 67 - 84