Font Size: a A A

Research On Key Technology Of TETRA Digital Trunking Pseudo Base Station

Posted on:2020-10-27Degree:MasterType:Thesis
Country:ChinaCandidate:J SunFull Text:PDF
GTID:2428330575495019Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
TETRA digital trunking system is a professional commanding and dispatching communication system,which is mainly used in government,petrochemical,logistics,transportation,electricity,military and other departments.Although authentication and encryption technology of TETRA digital trunking system can guarantee the security of TETRA digital trunking system,TETRA digital trunking pseudo base station can attack TETRA digital trunking system and reduce the security of TETRA digital trunking system by exploiting the security vulnerabilities of TETRA digital trunking system.TETRA digital trunking pseudo base station can not only attack the enemies in the information war effectively,but also help to improve the security of TETRA digital trunking system.Therefore,the research on key technologies of TETRA digital trunking pseudo base station is of great practical value.Based on the previous contributions of pseudo base stations at home and abroad,the security of TETRA digital trunking system is analyzed and the key technologies of TETRA digital trunking pseudo base station are researched.The main contributions are listed as follows:1.Based on the air interface protocol stack and system architecture of TETRA digital trunking system,the security architecture of TETRA digital trunking system is analyzed and the security vulnerabilities of TETRA digital trunking system authentication protocol are analyzed by Scyther analysis tool.2.Attack methods of TETRA digital trunking pseudo base station are given against the security vulnerabilities of TETRA digital trunking system.TETRA digital trunking system and TETRA terminal are attacked respectively by TETRA digital trunking pseudo base station.Acquisition process of TETRA digital trunking system information,capture and ambient listening process of TETRA terminal and acquisition process for GPS data of TETRA terminal are designed.3.A kind of man-in-the-middle attack method for TETRA digital trunking system is proposed by analyses of key technologies such as synchronization,signaling analysis,terminal adsorption and man-in-the-middle attack.According to the security vulnerabilities of TETRA digital trunking system,man-in-the-middle attack method attacks mutual authentication mechanism of TETRA digital trunking system by discarding authentication signaling,tampering authentication signaling and tampering air interface cipher key.4.A software architecture of TETRA digital trunking pseudo base station is proposed.Based on SYS/BIOS operating system and CCS development environment,the data link layer protocol module of TETRA digital trunking pseudo base station is developed by C language.Based on Windows operating system and Visual Studio 2013 development environment,protocol signaling filtering module,situational awareness module and network layer protocol module are developed by C++language.The functions of TETRA digital trunking pseudo base station are implemented.5.The test system of TETRA digital trunking pseudo base station is built.Attack methods such as capturing TETRA terminal,sending short message to TETRA terminal,acquiring GPS data of TETRA terminal and ambient listening TETRA terminals are tested.The test results show that TETRA digital trunking pseudo base station can attack TETRA digital trunking system effectively.
Keywords/Search Tags:TETRA digital trunking system, authentication, pseudo base station, man-in-the-middle attack
PDF Full Text Request
Related items