Vis enkel innførsel

dc.contributor.advisorMjølsnes, Stig Frodenb_NO
dc.contributor.advisorTsay, Joe-Kainb_NO
dc.contributor.authorDuan, Shuwennb_NO
dc.date.accessioned2014-12-19T14:15:48Z
dc.date.available2014-12-19T14:15:48Z
dc.date.created2013-10-15nb_NO
dc.date.issued2013nb_NO
dc.identifier656471nb_NO
dc.identifierntnudaim:10097nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/262890
dc.description.abstractTETRA is designed to be used in private mobile radio environment, and PMR users have a requirement for high level of security. Security takes a number of different forms, both in terms of availability, reliability of the system and confidentiality of transmitted information. This thesis identified the key security features of TETRA system which includes authentication, encryption and key management. A formal security analysis of authentication protocol was made exploring possible attacks during authentication. The automatic security verification tool used in this thesis is Scyther. Inspired by the result given by Scyther, possible attacks were discussed with different scenarios. It was concluded that some of the attacks found by Scyther might not be the most efficient ones due to their complexity.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for telematikknb_NO
dc.titleSecurity Analysis of TETRAnb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber100nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Tilhørende fil(er)

Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel