Font Size: a A A

Research And Implementation On Key Technology Of TETRA Digital Trunking Pseudo Terminal

Posted on:2021-05-07Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhuoFull Text:PDF
GTID:2428330614472400Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
TETRA digital trunking communication system is a professional communication system based on time division multiple access,which is widely used in government,petrochemical,logistics,transportation,electric power and military departments.Although authentication and encryption technology of TETRA system can guarantee the security of TETRA system,TETRA digital trunking pseudo terminal can obtain the relevant information of the specific TETRA system by exploiting the security vulnerabilitiest of the authentication and encryption protocol,and undermine the communication security of the specific TETRA system by attack the target TETRA system with a specific identity.The key technology of TETRA digital trunking pseudo terminal can not only improve the effectiveness and diversity of pseudo terminal attacks,but also help to improve the security of its own TETRA digital trunking system.Therefore,the research on the key technology of the pseudo terminal of TETRA digital trunking has important practical value.Based on the review of research status on security vulnerabilities and attack technologies of mobile communication systems at home and abroad,the security of TETRA system is analyzed and the key technologies of TETRA digital trunking pseudo terminal are researched.The main works are listed as follows:1.According to the air interface protocol stack and system architecture of the TETRA digital trunking system,the security architecture of the TETRA digital trunking system is elaborated,the authentication and encryption protocols of the TETRA digital trunking system are analyzed,and the security vulnerabilities of the TETRA digital trunking system are studied.2.The access protocol of the TETRA digital trunking system is analyzed,the process of random access and reserved access of TETRA digital trunking pseudo terminal are designed;based on the air interface signaling structure of the TETRA system,a common air interface signaling analysis method of TETRA system is proposed,which can improve the accuracy of air interface signaling analysis of target TETRA system;based on the air interface signaling analysis results of TETRA system,an information extraction method and user classification method of TETRA system are proposed to realize user-defined information extraction and improve the accuracy of user classification.3.Aiming at the security risks of TETRA digital trunking,a series of TETRA digital trunking pseudo terminal attack programmes are proposed.Based on the attack programmes of TETRA digital trunking pseudo terminal,the TETRA digital trunking pseudo terminal's identity intrusion process,forced offline process,voice attack process,SMS attack process,denial of service attack process,environment interception process and GPS reporting process are designed.An effective attack on the target TETRA system is realized.4.A software architecture of TETRA digital trunking pseudo terminal is proposed.Based on the software radio platform composed of zynq and ad9361,the attack module of TETRA digital trunking pseudo terminal is developed by C language;based on the Windows operating system and Visual Studio 2017 development environment,the information capture module and encryption module is developed by C++ language.The functions of TETRA digital trunking pseudo terminal are implemented.5.The test system of TETRA digital trunkingpseudo terminal is built.Attack methods such as identity intrusion,forced logoff,information interception,SMS attack,voice attack,environmental interception and GPS reporting are tested.The test results showed that TETRA digital trunking pseudo pseudo terminal can attack the target TETRA digital trunking effectively.
Keywords/Search Tags:TETRA Digital Trunking System, Authentication, Pseudo Terminal, RFM Model
PDF Full Text Request
Related items