security analysis of tetra

102
Security Analysis of TETRA Shuwen Duan Master of Telematics - Communication Networks and Networked Services (2 Supervisor: Stig Frode Mjølsnes, ITEM Co-supe rvisor: Joe-Kai Ts ay , ITEM Department of Telematics Submission date: June 2013 Norwegian University of Science and Technology

Upload: kondoros

Post on 02-Jun-2018

230 views

Category:

Documents


0 download

TRANSCRIPT

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 1/102

Security Analysis of TETRA

Shuwen Duan

Master of Telematics - Communication Networks and Networked Services (2

Supervisor: Stig Frode Mjølsnes, ITEM

Co-supervisor: Joe-Kai Tsay, ITEM

Department of Telematics

Submission date: June 2013

Norwegian University of Science and Technology

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 2/102

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 3/102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 4/102

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 5/102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 6/102

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 7/102

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 8/102

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 9/102

   

 

 

 

 

 

 

 

 

 

     

   

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 10/102

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 11/102

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 12/102

   

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 13/102

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 14/102

   

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 15/102

   

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 16/102

   

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 17/102

     

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 18/102

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 19/102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 20/102

   

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 21/102

   

     

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 22/102

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 23/102

     

     

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 24/102

   

 

 

 

 

 

 

 

 

 

 

•  

•  

 

 

•  

 

 

 

•  

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 25/102

 

 

•  

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 26/102

   

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 27/102

   

     

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 28/102

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 29/102

     

       

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 30/102

   

 

 

 

 

 

 

•  

 

•  

 

•  

 

 

 

 

•  

 

•  

 

 

•    

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 31/102

 

 

•    

 

•    

 

•    

 

 

•    

 

•    

 

   

 

•    

 

 

•    

 

 

•    

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 32/102

   

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 33/102

     

     

     

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 34/102

   

   

 

•  

•  

•  

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 35/102

   

•  

 

•  

•  

   

 

•    

       

   

 

 

•    

 

 

 

•    

 

 

 

 

•    

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 36/102

   

•    

 

 

 

 

 

 

 

   

   

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 37/102

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 38/102

   

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 39/102

   

     

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 40/102

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 41/102

     

   

 

 

 

 

 

 

   

 

   

 

   

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 42/102

   

   

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 43/102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 44/102

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 45/102

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 46/102

   

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 47/102

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 48/102

   

 

•  

 

 

 

•  

 

 

•  

 

 

 

•  

 

 

•  

 

 

•  

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 49/102

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 50/102

   

 

 

 

 

 

 

 

 

 

 

 

 

   2

   2

   

   

   

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 51/102

 

 

 

 

   2

   2

   

 

   

 

   

 

 

 

 

 

 

 

   2

   2

   

 

   

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 52/102

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 53/102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 54/102

   

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 55/102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 56/102

   

 

 

 

•  

•  

•  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 57/102

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 58/102

   

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 59/102

 

 

 

 

 

 

 

 

 

 

 

 1  

 

 

 

−1

1  

 2  

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 60/102

   

 3  

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 61/102

         

     

   

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 62/102

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 63/102

     

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 64/102

   

 

 

 

 

 

 

 

 

 

 

 

   

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 65/102

 

 

 

 1    2

 

 

 

 

 

 

   

 

 Label  

 Label  

 

  Label    Label  

 

 

   

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 66/102

   

   

 

 

 

 

 

    L  

 

 

 

 

 

   

 

 

 

 

 

 

   

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 67/102

 

 

 

 

 

   

 

 

 

 

 

 

   

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 68/102

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 69/102

     

       

   

 

 

 

 

 

 

 

 →

 

 →

 

  →  

  →  

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 70/102

   

  →  

 →

 

 

 

 

 →

 

 →

 

  →  

 →  

 →

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 71/102

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 72/102

   

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 73/102

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 74/102

   

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 75/102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 76/102

   

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 77/102

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 78/102

   

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 79/102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 80/102

   

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 81/102

     

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 82/102

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

   

 

 

   

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 83/102

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 84/102

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 85/102

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 86/102

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 87/102

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 88/102

   

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 89/102

         

     

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 90/102

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 91/102

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 92/102

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 93/102

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 94/102

   

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 95/102

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 96/102

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 97/102

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 98/102

   

 

 

 

 

 

 

 

   

 

 

 

 

 

 

 

 

 

 

 

   

 

 

   

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 99/102

 

 

 

   

 

 

   

 

 

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 100/102

   

 

   

 

 

 

   

 

 

 

   

 

 

   

 

 

   

 

   

 

 

 

   

 

 

 

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 101/102

 

 

   

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

   

 

 

 

   

   

8/11/2019 Security Analysis of TETRA

http://slidepdf.com/reader/full/security-analysis-of-tetra 102/102