dc.contributor.advisor | Mjølsnes, Stig Frode | nb_NO |
dc.contributor.advisor | Tsay, Joe-Kai | nb_NO |
dc.contributor.author | Duan, Shuwen | nb_NO |
dc.date.accessioned | 2014-12-19T14:15:48Z | |
dc.date.available | 2014-12-19T14:15:48Z | |
dc.date.created | 2013-10-15 | nb_NO |
dc.date.issued | 2013 | nb_NO |
dc.identifier | 656471 | nb_NO |
dc.identifier | ntnudaim:10097 | nb_NO |
dc.identifier.uri | http://hdl.handle.net/11250/262890 | |
dc.description.abstract | TETRA is designed to be used in private mobile radio environment, and PMR users have a requirement for high level of security. Security takes a number of different forms, both in terms of availability, reliability of the system and confidentiality of transmitted information. This thesis identified the key security features of TETRA system which includes authentication, encryption and key management. A formal security analysis of authentication protocol was made exploring possible attacks during authentication. The automatic security verification tool used in this thesis is Scyther. Inspired by the result given by Scyther, possible attacks were discussed with different scenarios. It was concluded that some of the attacks found by Scyther might not be the most efficient ones due to their complexity. | nb_NO |
dc.language | eng | nb_NO |
dc.publisher | Institutt for telematikk | nb_NO |
dc.title | Security Analysis of TETRA | nb_NO |
dc.type | Master thesis | nb_NO |
dc.source.pagenumber | 100 | nb_NO |
dc.contributor.department | Norges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikk | nb_NO |