Preprint Review Version 1 This version is not peer-reviewed

Addressing the TETRA System Backdoor Challenge through Friendly Jamming

Version 1 : Received: 22 August 2024 / Approved: 23 August 2024 / Online: 23 August 2024 (11:45:42 CEST)

How to cite: Al Idrissi, R. Addressing the TETRA System Backdoor Challenge through Friendly Jamming. Preprints 2024, 2024081728. https://doi.org/10.20944/preprints202408.1728.v1 Al Idrissi, R. Addressing the TETRA System Backdoor Challenge through Friendly Jamming. Preprints 2024, 2024081728. https://doi.org/10.20944/preprints202408.1728.v1

Abstract

TETRA (Terrestrial Trunked Radio, formerly known as Trans-European Trunked Radio) is used worldwide for Radio Frequency (RF) communications by emergency services, militaries, transportation and for commercial use. TETRA systems have been in use since the 1990’s in critical infrastructure worldwide and are still being deployed in the US for use in new projects. One example is the deployment of TETRA in new Offshore Wind Farm installations which are new to the US and still mimic European standards and installations. Even though the TETRA standard has been around since the nineties, it is still relevant and important to secure. Many of these systems remain in service or are still being deployed without a solution to a recently discovered Air Interface Encryption (AIE) vulnerability. Voice and data transmitted by TETRA radio systems is Air Interface Encrypted to protect its confidentiality and integrity and prevent eavesdropping and man-in-the-middle type attacks. This paper presents a recently discovered vulnerability in one of TETRA’s Air Interface Encryption Algorithms, examines existing solutions, and explores the use of Friendly Jamming (FJ) techniques to solve this problem.

Keywords

Man-In-the-Middle Attack; Cybersecurity; Eavesdropping; Terrestrial Trunked Radio (TETRA); Air Interface Encryption (AIE); Friendly Jamming; Signal Cancellation

Subject

Engineering, Telecommunications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.