Abstract

National disasters can threaten national security and require several organizations to integrate the functionalities to correspond to the event. Many countries are constructing a nationwide mobile communication network infrastructure to share information and promptly communicate with corresponding organizations. Public Safety Long-Term Evolution (PS-LTE) is a communication mechanism adopted in many countries to achieve such a purpose. Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy networks to the PS-LTE infrastructure. This environment allows the organizations to continue facilitating the information and system functionalities provided by the legacy network. The vulnerabilities in the environment, which differ from commercial LTE, need to be resolved to connect the network securely. In this study, we propose a security model design framework to derive the system architecture and the security requirements targeting the restricted environment applied by certain technologies for a particular purpose. After analyzing the PPDR operation environment’s characteristics under the PS-LTE infrastructure, we applied the framework to derive the security model for organizations using PPDR services operated in their legacy networks through this infrastructure. Although the proposed security model design framework is applied to the specific circumstance in this research, it can be generally adopted for the application environment.

Highlights

  • Advances in mobile communication technologies enrich civilians’ lives and enhance the operational efficiency for public protection and disaster relief (PPDR). e technologies connect response agents from fields and command posts to increase their field functionality

  • To design a security model in a PPDR operation environment under the Public Safety Long-Term Evolution (PS-LTE) infrastructure, we first introduced a framework for designing the security model for the environment, under which the technologies are adopted for a specific purpose

  • The system architecture and the security requirements for the system are designed as the security model

Read more

Summary

Introduction

Advances in mobile communication technologies enrich civilians’ lives and enhance the operational efficiency for public protection and disaster relief (PPDR). e technologies connect response agents from fields and command posts to increase their field functionality. A security threat analysis for the operational environment is necessarily preceded when designing a secure system linking architecture between the PS-LTE infrastructure and the legacy networks. We designed the system architecture and security requirements for the user organization in PPDR operational environment on PS-LTE infrastructure. In the security model design framework section, we propose the general framework used to design the security model by analyzing the security threats, building the system architecture, and deriving the security requirements for the construction of an environment, in which certain technologies are applied for a particular purpose. We designed a secure system architecture to connect a legacy network to a PS-LTE infrastructure while protecting the identified security threats. The security model design framework and the application example can provide insight on how to enhance the security of PS-LTE based PPDR operational environment. E following section provides the preliminary technical background required to understand this study

Technical Background
Related Studies
Security Model Design Framework
Application to the PPDR Operational Environment under PS-LTE Infrastructure
Enforcing to the application environment
Findings
Conclusion and Future Work

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.