Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

09/25/2020
by   Daegeon Kim, et al.
0

National disasters can threaten national security and require several organizations to integrate the functionalities to correspond to the event. Many countries are constructing a nationwide mobile communication network infrastructure to share information and promptly communicate with corresponding organizations. Public Safety Long-Term Evolution (PS-LTE) is a communication mechanism adopted in many countries to achieve such a purpose. Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy networks to the PS-LTE infrastructure. This environment allows the organizations to continue facilitating the information and system functionalities provided by the legacy network. The vulnerabilities in the environment, which differ from commercial LTE, need to be resolved to connect the network securely. In this study, we propose a security model design framework to derive the system architecture and security requirements targeting the restricted environment applied by some technologies for a specific purpose. After analyzing the characteristics of the PPDR operation environment under the PS-LTE infrastructure, we applied the framework to derive the security model for organizations using PPDR services operated in their legacy network through this infrastructure. Although the proposed security model design framework is applied to the specific circumstance in this research, it can be generally adopted for the application environment.

READ FULL TEXT
research
07/17/2020

Overview of Security of Virtual Mobile Networks

5G is enabling different services over the same physical infrastructure ...
research
04/12/2018

MPSM: Multi-prospective PaaS Security Model

Cloud computing has brought a revolution in the field of information tec...
research
03/30/2020

Modeling Network Security: Case Study of Email System

We study operational security in computer network security, including in...
research
05/14/2018

Alien wavelength technique to enhance garr optical network

GARR optical network used to be composed of two separate optical network...
research
09/06/2019

Security Requirements of Commercial Drones for Public Authorities by Vulnerability Analysis of Applications

Due to the ability to overcome the geospatial limitations and to the pos...
research
07/03/2019

Challenges in IT Operations Management at a German University Chair – Ten Years in Retrospect

Over the last two decades, the majority of German universities adopted v...

Please sign up or login with your details

Forgot password? Click here to reset