5
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

      1 , 1 , 1
      Security and Communication Networks
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          National disasters can threaten national security and require several organizations to integrate the functionalities to correspond to the event. Many countries are constructing a nationwide mobile communication network infrastructure to share information and promptly communicate with corresponding organizations. Public Safety Long-Term Evolution (PS-LTE) is a communication mechanism adopted in many countries to achieve such a purpose. Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy networks to the PS-LTE infrastructure. This environment allows the organizations to continue facilitating the information and system functionalities provided by the legacy network. The vulnerabilities in the environment, which differ from commercial LTE, need to be resolved to connect the network securely. In this study, we propose a security model design framework to derive the system architecture and the security requirements targeting the restricted environment applied by certain technologies for a particular purpose. After analyzing the PPDR operation environment’s characteristics under the PS-LTE infrastructure, we applied the framework to derive the security model for organizations using PPDR services operated in their legacy networks through this infrastructure. Although the proposed security model design framework is applied to the specific circumstance in this research, it can be generally adopted for the application environment.

          Related collections

          Most cited references9

          • Record: found
          • Abstract: not found
          • Report: not found

          Introducing OCTAVE Allegro: Improving the Information Security Risk Assessment Process

            Bookmark
            • Record: found
            • Abstract: not found
            • Book: not found

            Risk Centric Threat Modeling : Process for Attack Simulation and Threat Analysis

              Bookmark
              • Record: found
              • Abstract: not found
              • Book: not found

              Study on Mobile Device Security

                Bookmark

                Author and article information

                Contributors
                Journal
                Security and Communication Networks
                Security and Communication Networks
                Hindawi Limited
                1939-0122
                1939-0114
                December 7 2020
                December 7 2020
                : 2020
                : 1-13
                Affiliations
                [1 ]Graduate School of Cybersecurity, Korea University, Republic of Korea
                Article
                10.1155/2020/8869418
                61d991c8-d0b1-4f66-b3fb-ce11e0e99563
                © 2020

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article