About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers

Research Article

Insecurity in Public-Safety Communications: APCO Project 25

Download(Requires a free EAI acccount)
1048 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-31909-9_7,
        author={Stephen Glass and Vallipuram Muthukkumarasamy and Marius Portmann and Matthew Robert},
        title={Insecurity in Public-Safety Communications: APCO Project 25},
        proceedings={Security and Privacy in Communication Networks. 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2012},
        month={10},
        keywords={communications networks wireless network security security analysis},
        doi={10.1007/978-3-642-31909-9_7}
    }
    
  • Stephen Glass
    Vallipuram Muthukkumarasamy
    Marius Portmann
    Matthew Robert
    Year: 2012
    Insecurity in Public-Safety Communications: APCO Project 25
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-31909-9_7
Stephen Glass1,*, Vallipuram Muthukkumarasamy2,*, Marius Portmann1,*, Matthew Robert2,*
  • 1: NICTA
  • 2: Griffith University
*Contact email: stephen.glass@nicta.com.au, v.muthu@griffith.edu.au, marius.portmann@nicta.com.au, matt.robert@gmail.com

Abstract

             (P25) radio networks are perhaps the most widely-deployed digital radio technology currently in use by emergency first-responders across the world. This paper presents the results of an investigation into the security aspects of the P25 communication protocol. The investigation uses a new software-defined radio approach to expose the vulnerabilities of the lowest layers of the protocol stack. We identify a number of serious security flaws which lead to practical attacks that can compromise the confidentiality, integrity and availability of P25 networks.
Keywords
communications networks wireless network security security analysis
Published
2012-10-08
http://dx.doi.org/10.1007/978-3-642-31909-9_7
Copyright © 2011–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL