TETRA - TErrestrial Trunked Radio Emma Södersrtröm April 18, 2016 1 Introduction TETRA, TErrestial Trunked Radio, is a digital land mobile radio standard developed by ETSI (The European Telecommunications Standards Institute) with the primary function to fulfil the needs that Professional Mobile Radio (PMR) and Public Access Mobile Radio (PAMR) users have [1]. Such users are usually government agencies, police, fire department, ambulance service and the military, for example NATO, and the airforce. For these users it is important that the communication between parties is safe and fast without eavesdropping and information loss and capable of large group calls [2]. The TETRA standard offers most of the features that the users value, the call set-up time is short which especially emergency services require, it is possible to have group conversations with unlimited group size as well as unlimited number of dispatchers, direct operation between the individual radios and data transmission. 2 System A typical TETRA system consists of Base Stations (BS) and Mobile Stations (MS) [3]. The BS resends information from an MS to requested reciever. The base stations to a base station controller (BSC) which in turn is connected to a mobile switching centre. MS are also able to connect directly to each other even though outside the range of a base station. 2.1 Operation modes TETRA has three different main operation modes with different objectives allowing both voice communication and data transmission [4, p.141-144] [5]. • Voice plus Data (V+D) • Direct Mode Operation (DMO) • Packet Data Optimized (PDO) 1 In the Voice plus Data mode it is possible to switch the communication type between data and speech or use both at the same time. In the Direct mode communication through voice or data is between two mobile units even if they are outside the base stations range.The last mode is Packet Data mode which is for data transmission only. 3 Radio Communication Transmission and Reception steps in the TETRA standard depends on what mode is used, but the basics are more less the same for V+D and DMO. The protocol architecture of the TETRA air interface consists of three layers [6, p.25] : • Physical layer: controls the radio characteristics, such as (de)modulation and synchronization. • Data Link Layer (DLL): is divided into two sub layers with different functionalities: – Logical Link Control (LLC): Handles data transmission and retransmission etc. – Medium Access Control (MAC):Handles channel access, channel (de)coding and (de)interleaving. • Network Layer: handles network procedures. The MAC layer is further divided into upper and lower layer, where the upper MAC layer handles access control and multiplexing and the lower MAC layer handles channel coding, slot stealing and routing. The Network layer is only for Network services meaning that all speech and data only uses the Physical layer and the DLL. 3.1 Channels The interface between the protocols and the radio subsystem is represented by logical channels divided into two categories; traffic channels that carries information about speech and data and control channels sending signalling messages and packet data [7, p.151]. Information between i.e the upper and lower MAC layer is passed through logical channels where the different channels either pass specific information in one or both directions. Information transmitted from the base station is passed in the uplink whilst information recieved to the basestation is passed through the downlink. In other words, information from the MAC to the physical layer is uplink information whilst information from the physical layer to the MAC downlink information. 2 3.2 Channel Access The TETRA standard uses Time Division Multiple Access (TDMA) to access the channel [6, p.66]. TDMA makes it possible for multiple users to share the same radio frequency (RF) but in different timeslots. Simple Frequency Division Multiple Access (FDMA) assigns a carrier frequency for each user while TDMA uses the basic principle of FDMA but dividing the frequencies into timeslots introducing even more possible users. In this case each RF carrier is divided into four timeslots allowing 4 users per carrier and each carrier has a 25kHz spacing. The multi-slot solution results in a greater transmission rate making it more efficient. 3.2.1 Frame structure The TDMA structure is built on TDMA frames lasting roughly 56,6 ms, these consist of four timelsots each lasting around 14,2 ms. The TDMA frames are in turn grouped in multiframes consisting of 18 TDMA frames. The 18th frame is always a control frame which means that the first 17 frames actually consist of 18 frames of information which is neatly solved by simple data compression. For example encryption synchronisation and other methods that require large repeat frame structures take use of the final frame structure called hyper-frame consisting of 60 multiframes, they last a little over 60 seconds [6, ch.4.5] [4, p.192]. 3.3 Source and Channel coding The TETRA standard uses a version of Code-Excited Linear Predictive (CELP)code for speech source coding [6, p.124] [8, p.26]. The error control structure or channel coding, consists of three main processing parts. The input information bits are packed into, so called, MAC blocks and encoded by a block code. The block coded bits are then encoded by a convolutional code, more precisely a Rate-Compatible Punctured Convolutional Code (RCPC Code). The next step is to interleave and reorder the bits. Interleaving spreads out the symbols over many codewords making it possible to correct errors even if there are bursts of errors. 3.4 Modulation π differential quaternary phase 4 shift keying-DQPSK with a rate of 36kbit/s [4, p.192] which shifts the phase of the RF carrier, depending on data transmitted, in steps of either ± π4 or ± 3π 4 . The signal is then filtered through a root raised cosine filter removing the sidebands outside the assigned bandwidth, this reduces intersymbol interference (ISI), aid synchronization receiver and helps to correctly choose channels [5]. Modulation onto the carrier is done using 3 4 Security When talking about security there are three main areas to take into consideration in order to keep information safe: • Confidentiality: Making sure that only authorized persons or items can access the information. • Integrity: Only authorized persons or items can write or change the protected information. • Availability: Making sure that authorized persons have access to the information when ever needed. These areas are often referred to as CIA. The TETRA standard a few different security measures in order to keep the information safe. There are a four main categories of functionality [9, p.2] • Security mechanisms: independent functions with a specific purpose • Management features which are functions that manage the security mechanisms. • Cryptographic algorithms: specific mathematical functions that together with cryptographic keys as parameters give reassuring security for the security mechanisms. • Lawful interception mechanisms: Functions used together with communications systems to supply the lawfully required access to information and communication 4.1 Authentication One way of assuring that a network or Mobile Station (MS) can be trusted is authentication. If they share a valid key then communication is established [4, p.] [9, 3]. The authentication is, among other things, used to control the MS access to the network services, provide confidentiality and create a secure channel for sharing sensitive information. The authentication mechanism is only used in V+D mode, for DMO Static Cipher Keys (SCKs) are used for mutual authentication. Each MS has an authentication key K, which is stored both in the MS itself and in the Authentication Centre (AUC) where all authentication keys in the network are stored. 4.2 Encryption methods When communicating through a wireless system eavesdropping is a very common security risk. In order to prevent eavesdropping, among other 4 threats, in the air interface between the MS and the network, Air Interface Encryption (AIE) and End-to-end encryption (e2ee) is used [4, 62]. These methods encrypts the information and makes it impossible for anyone not having the required decryption algorithm to make sense of the encrypted information. The encryption is done before the channel coding when transmitting and after the channel decoding when recieving. When placing the encryption in that order the MAC-headeres are left unencrypted which in turn allows the reciever to determine the relevancy of the received message [10, 112]. 4.2.1 Air Interface Encryption AIE uses a shared key to encrypt both traffic and signalling information between transmitter and receiver when MS and BS are communicating with each other. It encrypts all the data on the radio path and messages on the control channel [4, 62]. There are four AIE TETRA Encryption Algorithms (TEAs) for the TETRA standard called TEA1, TEA2, TEA3 and TEA4 [11, ch.3]. They have slightly different areas of application, they are all designed for Public Safety and Military Organisations. TEA2 is only permitted within the European Union and associated countries whereas the others are suited for Civil use, where security is required, as well [12]. 4.2.2 End-to-end encryption E2ee protects information within the network and the information is encrypted and decrypted in the end terminals [13, p.38]. The e2ee algorithms and key management is not standardized [10], because the requirements differ from organizations, but the synchronization is standardized. There are some requirements set by ETSI, these include that the same mechanisms should work in both directions, there has to be independent synchronization processes in both directions and the encryption has to be locatied in the U-plane. Since the e2ee encrypts information in the traffic channel and not the control channel [4] it has to be used together with AIE. 5 Improvements There are many improvements done to the original TETRA standard in different releases. The most significant changes were done in TETRA Release 2 where TETRA Enhanced Data Service (TEDS) was introduced. It aquires higher data rate (50-300kbit/s) [4, 139] through using different RF channel bandwidths and adaptable modulation schemes [5]. 5 References [1] ETSI, “Tetra,” 2008. URL: http://www.etsi.org/index.php/ technologies-clusters/technologies/tetra[Accessed April 2016]. [2] Digital Radio Today, “Tetra,” 2014. URL: //digitalradiotoday.com/digitalradio/technologies/ tetra/[Accessed April 2016]. http: [3] L. Harte, Introduction to private land mobile radio. : dispatch, LTR, APCO, MPT1327, iDEN, and TETRA. ALTHOS Publishing Inc., 2004. [4] P. Stavroulakis, ed., Terrestial Trunked Radio, TETRA A Global Security Tool. Springer, 2007. [5] I. Poole, “Tetra: Terrestrial trunked radio system.” URL: http://www. radio-electronics.com/info/pmr-business-land-mobile-radio/ tetra/what-is-tetra-radios-communications.php[Accessed April 2016]. [6] ETSI, “Terrestrial trunked radio (tetra); voice plus data (v+d); designers’ guide; part 1: Overview, technical description and radio aspects,” tech. rep., European Telecommunications Standards Institute, 1997. URL: http://www.etsi.org/deliver/etsi_etr/300_ 399/30001/01_60/etr_30001e01p.pdf[Accessed April 2016]. [7] ETSI, “Voice plus Data (V+D); Part 2: Air Interface (AI),” Technical Standard TS 100 392-2, European Telecommunications Standards Institute, 2016. URL: http://www.etsi.org/deliver/etsi_ts/ 100300_100399/10039202/03.07.01_60/ts_10039202v030701p. pdf[Accessed April 2016]. [8] ETSI, “Terrestrial trunked radio (tetra), speech codec for fullrate traffic channel; part 2: Tetra codec,” Tech. Rep. EN 300 395-2, European Telecommunications Standards Institute, 2005. URL: http://www.etsi.org/deliver/etsi_en/300300_300399/ 30039502/01.03.01_60/en_30039502v010301p.pdf[Accessed April 2016]. [9] TETRA MoU Association, “Tetra security,” 2006. URL: http://www.tandcca.com/Library/Documents/About_TETRA/ TETRA%20Security%20pdf.pdf[Accessed April 2016]. [10] ETSI, “Terrestrial trunked radio (tetra); security; synchronization mechanism for end-to-end encryption,” European Standard 6 EN 302 109 V1.1.1, European Telecommunications Standards Institute, 2003. URL: http://www.etsi.org/deliver/etsi_en/ 302100_302199/302109/01.01.01_60/en_302109v010101p.pdf [Accessed April 2016]. [11] TETRA, “Tetra security.” URL: http://www.tandcca.com/about/ page/12027. [12] M. Bolle, “Overview of standard tetra, cryptographic algorithms and their rules for management and distribution,” 2014. URL: http://www.tandcca.com/Library/Documents/About_TETRA/ stndrd_crptgrphy_algrthms_ed4.pdf[Accessed April 2016]. [13] S. Duan, “Security analysis of tetra,” Master’s thesis, Norwegian University of Science and Technology, 2013. [14] D. Bennett, H. Jahankhani, and H. Jahankhani, “The uk government’s critical national infrastructure policy for emergency services communications platforms: vulnerabilities in the tetra architecture.,” in Global Security, Safety, and Sustainability: 5th International Conference, ICGS3 2009, London, UK, September 1-2, 2009. Proceedings. 7
© Copyright 2026 Paperzz