Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

09/25/2020
by   Daegeon Kim, et al.
0

National disasters can threaten national security and require several organizations to integrate the functionalities to correspond to the event. Many countries are constructing a nationwide mobile communication network infrastructure to share information and promptly communicate with corresponding organizations. Public Safety Long-Term Evolution (PS-LTE) is a communication mechanism adopted in many countries to achieve such a purpose. Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy networks to the PS-LTE infrastructure. This environment allows the organizations to continue facilitating the information and system functionalities provided by the legacy network. The vulnerabilities in the environment, which differ from commercial LTE, need to be resolved to connect the network securely. In this study, we propose a security model design framework to derive the system architecture and security requirements targeting the restricted environment applied by some technologies for a specific purpose. After analyzing the characteristics of the PPDR operation environment under the PS-LTE infrastructure, we applied the framework to derive the security model for organizations using PPDR services operated in their legacy network through this infrastructure. Although the proposed security model design framework is applied to the specific circumstance in this research, it can be generally adopted for the application environment.

READ FULL TEXT
POST COMMENT

Comments

There are no comments yet.

Authors

page 10

07/17/2020

Overview of Security of Virtual Mobile Networks

5G is enabling different services over the same physical infrastructure ...
04/12/2018

MPSM: Multi-prospective PaaS Security Model

Cloud computing has brought a revolution in the field of information tec...
03/30/2020

Modeling Network Security: Case Study of Email System

We study operational security in computer network security, including in...
05/14/2018

Alien wavelength technique to enhance garr optical network

GARR optical network used to be composed of two separate optical network...
09/29/2021

Reconfiguring Data Infrastructure Ecosystem in Africa: A Primer Toward Digital Sovereignty

The growth of the Internet and its associated technologies; including di...
07/03/2019

Challenges in IT Operations Management at a German University Chair – Ten Years in Retrospect

Over the last two decades, the majority of German universities adopted v...
10/10/2019

WiFiCue: Public Wireless Access Security Assessment Tool

Public wireless access points are commonly provided by governments, busi...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.