Submitted:
30 April 2025
Posted:
02 May 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
- Base Station (BS): The function of a base station is to link the Mobile stations and line stations through an Integrated Services Digital Network (ISDN).
- Mobile Station (MS): Mobile station equipment includes a Mobile Termination Unit and Terminal Equipment. Its function is to communicate back to the Base Station or directly to other mobile stations through the Air Interface. Direct communication is also referred to as Direct Mode Operation (DMO).
- Line Station (LS): A line station has a similar function to a mobile station but uses an ISDN to connect to the base station rather than the air interface.
- Network Management Unit: The network management unit provides local and remote communications to the base station. These connections include line stations or other base stations on the same network.
- Gateway: A gateway connects the TETRA network to other external networks such as Private Telephone Networks and ISDN.
-
The Air Interface (AI): The Air Interface is a physical layer interface that provides communication between mobile stations and the base. The Air Interface supports two modes of operation.
- ○
- Direct Mode Operation (DMO): Direct Mode Operation allows for direct communications between mobile stations that are within range over the Air Interface.
- ○
- Trunked Mode Operation (TMO): Trunked Mode Operation is when two mobile stations communicate with each other through the Base Station. The Base Station in this case acts as a central channel controller which assigns channels automatically from a limited pool of available frequencies.
- TETRA Inter-system Interface (ISI): The Inter-system Interface allows for communications between TETRA networks.
- Terminal Equipment Interface (TEI): The Terminal Equipment Interface provides communications between the mobile termination point and Terminal Equipment within a mobile station.
2. Threat Model
3. Related Work
- Switching from TEA1 to another TEA encryption that is available for commercial use. This would require system-wide changes at the device level.
- Additional end-to-end encryption is an optional feature that is used in very special cases. It requires installing additional modules. It is a solution that is expensive to implement on each device and requires downtime [5].
4. Solution
4.1. Principles of Friendly Jamming
4.2. Solution Using Friendly Jamming
4.3. TETRA Shield Design
5. Evaluation
5.1. Jamming Signal Cancellation Techniques
5.2. Shield Device Application in IMD’s
5.3. Use of Sophisticated High-power Transmitters
6. Future Work
7. Conclusion
- Switching from TEA1 to another TEA encryption algorithm that is available for commercial use. This would require system-wide changes at the device level.
- Adding an end-to-end encryption module. This is an optional feature that is used in very special cases. It requires installing additional modules.
References
- INCIBE (National cybersecurity institute), “Cybersecurity in TETRA networks study,” MAR 2023. Retrieved SEP 3rd, 2023, from https://www.incibe.es/sites/default/files/2023-05/INCIBE-CERT_CYBERSECURITY_IN_TETRA_NETWORKS_STUDY_2023_v1.0.pdf.
- Shuwen Duan, “Security Analysis of TETRA,” Master’s Thesis, Norwegian University of Science and Technology, JUN 2013.
- Carlo Meijer, Wouter Bokslag and Jos Wetzels, “All Cops Are Broadcasting: Breaking TETRA After Decades in the Shadows,” Blackhat USA 2023 conference presentation by Midnight blue, AUG 2023. Retrieved AUG 27th, 2023, from https://www.blackhat.com/us-23/briefings/schedule/#all-cops-are-broadcasting-breaking-tetra-after-decades-in-the-shadows-31807.
- Jessica Lyons Hardcastle, “Bug hunters on your marks: TETRA radio encryption algorithms to enter public domain,” The Register article, NOV 2023. Retrieved NOV 20th, 2023, from https://www.theregister.com/2023/11/14/tetra_encryption_algorithms_open_sourced/.
- KIM ZETTER, “Code Kept Secret for Years Reveals Its Flaw—a Backdoor,” WIRED article, JUL 2023. Retrieved AUG 27th, 2023, from https://www.wired.com/story/tetra-radio-encryption-backdoor/.
- Lewin Day, “DID TETRA HAVE A BACKDOOR HIDDEN IN ENCRYPTED POLICE AND MILITARY RADIOS?,” HACKADAY Article, JUL 2023.
- Yong-Seok Park, Choon-Soo Kim and Jae-Cheol Ryou, “The Vulnerability Analysis and Improvement of the TETRA Authentication,” IEEE 2010 The 12th International Conference on Advanced Communication Technology, APR 2010.
- Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan and Srdjan Capkun, “On Limitations of Friendly Jamming for Confidentiality,” IEEE Symposium on Security and Privacy, MAY 2013.
- S. Leung-Yan-Cheong and M. Hellman, “The Gaussian Wire-tap Channel,” IEEE Transactions on Information Technology, JUL 1978.
- Nico Pieter Fouché and Kerry-Lynn Thomson, “Exploring the human dimension of TETRA,” IEEE 2011 Information Security for South Africa conference, SEP 2011.
- ETSI Technical Report ETR 086-3, “Trans European Trunked Radio (TETRA) system; Technical requirements specification; Part 4: Security aspects,” JAN 1994.
- Carlo Meijer, Wouter Bokslag, and Jos Wetzels, “All cops are broadcasting: TETRA under scrutiny,” Proceedings of the 32nd USENIX Security Symposium, Aug 2023.
- Mark. M. Adams, “Improving Security for Future Wireless Networks Through Friendly Jamming,” Master’s Thesis, The University of British Columbia, MAY 2011.
- Capture Effect. In Wikipedia. Retrieved SEP 16th, 2023, from https://en.wikipedia.org/wiki/Capture_effect.
- Jung Il Choi, Mayank Jain, Kannan Srinivasan, Philip Levis and Sachin Katti, “Achieving Single Channel, Full Duplex Wireless Communication,” Proceedings of the sixteenth annual international conference on Mobile computing and networking, SEP 2010.
- Gollakota, Hassanieh, Ransford, Katabi and Fu, “They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices,” ACM SIGCOMM Computer Communication Review, Vol. 41, No. 4, AUG 2011.
- Gayatri Rajaram Deshmukh and Dr. Rajshri Mahajan, “Channel Estimation Techniques in Wireless Communication,” 2022 International Conference on Signal and Information Processing (IConSIP), AUG 2022.
- ETSI Technical Report ETR 102 021-9, “Trans European Trunked Radio (TETRA) system; user requirements specification; Part 9: Peripheral Equipment Interface,” APR 2009.
- R. Jin, K. Zeng and K. Zhang, “A Reassessment on Friendly Jamming Efficiency,” in IEEE Transactions on Mobile Computing, vol. 20, no. 1, 1 Jan. 2019. [CrossRef]













Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).