TETRA Security

@article{Parkinson2001TETRAS,
  title={TETRA Security},
  author={D. W. Parkinson},
  journal={BT Technology Journal},
  year={2001},
  volume={19},
  pages={81-88}
}
TETRA is a digital trunked radio standard for the private/professional mobile radio (PMR) market. BT's Airwave service, a nation-wide mobile radio service designed to serve the needs of the police and other public safety organisations in England, Wales and Scotland, is based on TETRA and the inherent security of TETRA is an essential element of the service. This paper describes the basic security mechanisms in TETRA and the various security services that are delivered using them. 
6 Citations

SECURITY ASPECTS: TETRA AND GSM

The comparison between the Tetra radio networks and GSM is described by the focus study on the functionality of group calls, which is one of the most important requirements for public safety and security (PSS) networks.

Exploring the human dimension of TETRA

This paper will investigate the potential of Social Engineering on a TETRA system, and the various vulnerabilities and possible escalation scenarios that could occur if TetRA users are not made aware of social engineering will be explored.

Reconfigurable Radio Systems : Towards Secure Collaboration for Peace Support and Public Safety

As military priorities are shifting from invasion defense to crisis management and peace support operations, the capability to partake in efficient inter-organizational collaboration is becoming in

Network Topology in Command and Control: Organization, Operation, and Evolution

Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science with timely research on topics pertaining to the C2 network evolution, security, and modeling.

References

SHOWING 1-2 OF 2 REFERENCES

Professional Mobile Radio — the BT Airwave Public Safety Service and the Path for Technology and Service Evolution

The BT Airwave service for public safety users is reviewed and how it may be developed to provide users with greater flexibility and increased working effectiveness is discussed.

Cryptographic algorithms in telecommunications systems