Font Size: a A A

Design And Implementation Of An End-to-end Encryption System Based On Tetra

Posted on:2009-05-02Degree:MasterType:Thesis
Country:ChinaCandidate:J SangFull Text:PDF
GTID:2198360308477786Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Command and scheduling are extremely frequent in the departments of railway, police, military, civil aviation, etc. Adapt to the needs of society, trunking communications system, developed from the professional mobile radio, comes into being and plays an increasingly important role in dealing with the daily work and major events. Meanwhile, the security and confidentiality problem of this kind of communication has been arousing the concern of more and more people.Based on TDMA technology, TETRA is the standard for digital trucking mobile communication system. Services it provided cover group calling schedule, direct mode operation (DMO), full duplex phone call, packed data service and short data service. Air interface (AI) authentication, enable and disabled mechanism, AI encryption and end-to-end encryption (E2EE) were also supported by it. TETRA is, not only fit for railway system, police segment, military use, civil aviation, etc. used as professional mobile radio, but also could work as public access mobile radio (PAMR).The development of TETRA is first described in this paper, and then the technical specifications, network constitution and configuration of TETRA are introduced. Based on the detailed threat analysis of TETRA, the TETRA security architecture is proposed. Further more, research and analysis about technical related security policy of TETRA-the AI authentication mechanism, enable and disable mechanism, AI encryption and E2EE mechanism are conducted. Following these, a kind of E2EE mechanism based on IDEA algorithm and RSA algorithms is brought forward and given a detailed address. At last, aided by Nokia TCS running in a simulated DXT environment, a simulation of this kind of E2EE design is implemented, also the summarized simulation result is given out. The simulation result suggests that this security design is feasible, the communication key encrypted using RSA is secure, and the rapid data encryption and decryption of IDEA meets the requirements of end-to-end communication, thus ensuring the security of data transmission from the transmitter to the receiver.
Keywords/Search Tags:TETRA, Security, Authentication, AI Encryption, End-to-End Encryption
PDF Full Text Request
Related items