Högskolan i Skövde

his.sePublications
Operational message
There are currently operational disruptions. Troubleshooting is in progress.
1112131415161714 of 25
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Understanding Security in Special-Purpose Digital Radio Communication Systems
University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment. Swedish Defence University, Stockholm. (Information Systems (IS))ORCID iD: 0000-0001-9246-0263
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Activities that have specialized communication needs which cannot be met by general communication systems such as mobile telephony or wireless networking need specialized communication systems. The thesis investigates the special-purpose digital radio communication systems that have been created to meet specialized needs across a range of fields. Since many of the fields where these communication systems are used are part of critical infrastructures and other important operations, the security of the communication systems may be vital to the security of the operations they support. Despite this, special-purpose digital radio communication systems often have significantly lower levels of security than more commonly used systems, such as mobile telephony or Internet-based protocols. The thesis defines special-purpose digital radio communication systems as a class of systems that, while differing in many ways, have common security properties. The common security themes among the different systems are investigated through focused case studies on two standards: Automatic Link Establishment (ALE) for high-frequency radio and TETRA, a trunked cellular professional mobile radio standard. The case study on ALE uses cryptanalysis to find weaknesses in the cryptography specified by the standard, mirroring similar weaknesses in other standards. In the TETRA case, qualitative interviews reveal how organizations that own TETRA networks make security-related decisions regarding them. The thesis proposes a number of possible explanations for the low level of security in special-purpose digital radio communication systems: lack of security by design, deficient understanding of system dependencies, normal accident dynamics, lack of feedback, and market structure. The thesis is the first to consider the different standards as members of a single class of systems and point out the commonalities.

Abstract [sv]

Verksamheter vars kommunikationsbehov inte tillfredsställs av generella kommunikationssystem som exempelvis mobiltelefoni eller trådlösa nätverk behöver särskilda kommunikationssystem. Avhandlingen undersöker de digitala radiokommunikationssystem för särskilda ändamål som skapats för att möta de särskilda kommunikationsbehov som finns i många områden. Eftersom flera av de områden som använder de ifrågavarande kommunikationssystemen är del av kritiska infrastrukturer eller andra viktiga verksamheter är säkerhet i kommunikationssystemen av vikt för säkerheten i verksamheterna som helhet. Trots detta har digitala radiokommunikationssystem för särskilda behov ofta signifikant lägre säkerhetsnivå än mer spridda system, som exempelvis internetbaserade protokoll. Avhandlingen definierar digitala radiokommunikationssystem för särskilda behov som en grupp system som, trots att de är olika på många sätt, delar gemensamma säkerhetsegenskaper. De gemensamma egenskaperna undersöks genom fallstudier på två standarder: Automatic Link Establishment (ALE), en standard för länketablering för kortvågsradio, och TETRA, en standard för trunkad cellulär kommunikationsradio. I fallstudien av ALE används kryptoanalys för att upptäcka svagheter i kryptografiska funktioner som specificeras i standarden, vilket återspeglar liknande sårbarheter i andra standarder. I fallet med TETRA används kvalitativa intervjuer för att visa hur organisationer som äger TETRA-nätverk tar säkerhetsrelaterade beslut rörande dem. Avhandlingen föreslår ett antal möjliga förklaringar för den låga säkerhetsnivån i digitala radiokommunikationssystem för särskilda behov: ingen inbyggd säkerhet, bristande förståelse för systemberoenden, systemolyckedynamik, brist på återkoppling och marknadsstruktur. Avhandlingen är den första som behandlar de olika standarderna som tillhörande en enda grupp av system och att identifiera likheterna.

Place, publisher, year, edition, pages
Skövde: University of Skövde , 2025. , p. xvi, 188
Series
Dissertation Series ; 68
National Category
Information Systems
Research subject
Information Systems
Identifiers
URN: urn:nbn:se:his:diva-26139ISBN: 978-91-989080-9-1 (print)ISBN: 978-91-989081-0-7 (electronic)OAI: oai:DiVA.org:his-26139DiVA, id: diva2:2035158
Public defence
2026-04-14, L52, Drottning Kristinas väg 30, Stockholm, 13:00 (English)
Opponent
Supervisors
Available from: 2026-02-04 Created: 2026-02-03 Last updated: 2026-02-04Bibliographically approved
List of papers
1. Security Issues in Special-Purpose Digital Radio Communication Systems: A Systematic Review
Open this publication in new window or tab >>Security Issues in Special-Purpose Digital Radio Communication Systems: A Systematic Review
2024 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 12, p. 91101-91126Article, review/survey (Refereed) Published
Abstract [en]

For applications where general-purpose communication systems, such as mobile telephony, do not satisfy user requirements, special-purpose digital wireless communication standards have been developed. Since these systems often support critical infrastructures, security issues can have far-reaching consequences. To study the extent of research on security issues in specialized communication standards, a systematic literature review was performed, using snowballing to maximize coverage. The found publications cover security issues in radio communication systems for three major areas: civil transportation, public safety and security, and telephony and satellite communication systems. The main results from the included publications are summarized. This is followed by an analysis that presents five common themes among the security issues: lack of encryption, lack of authentication, broken encryption, protocol vulnerabilities, and implementation vulnerabilities. Research tools and methods used across the different technology fields are systematized, showing that software-defined radio and open-source software appear to be enablers of research on the communication standards covered by the review. The systematization also reveals that the application of research methods to different standards is spotty. Finally, numerous open research directions are pointed out, including the need for more holistic research that goes beyond just finding technical flaws in single standards.

Place, publisher, year, edition, pages
IEEE, 2024
Keywords
Critical infrastructure, cybersecurity, radio communication systems, security, standards, systematic review.
National Category
Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-24218 (URN)10.1109/access.2024.3420091 (DOI)001263417100001 ()2-s2.0-85197047158 (Scopus ID)
Note

CC BY-NC-ND 4.0

Available from: 2024-07-05 Created: 2024-07-05 Last updated: 2026-02-03Bibliographically approved
2. Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment
Open this publication in new window or tab >>Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment
2021 (English)In: IACR Transactions on Symmetric Cryptology, ISSN 2519-173X, Vol. 2021, no 3, p. 36-53Article in journal (Refereed) Published
Abstract [en]

The SoDark cipher is used to protect transmitted frames in the second and third generation automatic link establishment (ALE) standards for high frequency (HF) radios. The cipher is primarily meant to prevent unauthorized linking and attacks on the availability of HF radio networks. This paper represents the first known security analysis of the cipher used by the second generation ALE protocol—the de facto world standard—and presents a related-tweak attack on the full eight round version of the algorithm. Under certain conditions, collisions of intermediate states several rounds into the cipher can be detected from the ciphertext with high probability. This enables testing against the intermediate states using only parts of the key. The best attack is a chosen-ciphertext attack which can recover the secret key in about an hour with 100% probability, using 29 chosen ciphertexts.

Place, publisher, year, edition, pages
Ruhr University Bochum, 2021
Keywords
automatic link establishment, ALE, SoDark, cryptanalysis, block cipher
National Category
Other Mathematics
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-20578 (URN)10.46586/tosc.v2021.i3.36-53 (DOI)000700710300002 ()2-s2.0-85119900230 (Scopus ID)
Note

CC BY 4.0

Available from: 2021-09-20 Created: 2021-09-20 Last updated: 2026-02-03
3. sboxgates: A program for finding low gate count implementations of S-boxes
Open this publication in new window or tab >>sboxgates: A program for finding low gate count implementations of S-boxes
2021 (English)In: Journal of Open Source Software, E-ISSN 2475-9066, Vol. 6, no 62, p. 1-3, article id 2946Article in journal (Refereed) Published
Abstract [en]

S-boxes are often the only nonlinear components in modern block ciphers. They are commonly selected to comply with very specific criteria in order to make a cipher secure against, for example, linear and differential attacks. An M x N S-box can be thought of as a lookup table that relates an M-bit input value to an N-bit output value, or as a set of N boolean functions of M variables (Schneier, 1996).

Although cipher specifications generally describe S-boxes using their lookup tables, they can also be described as boolean functions or logic gate circuits. sboxgates, which is presented here, finds equivalent logic gate circuits for S-boxes, given their lookup table specification. Generated circuits are output in a human-readable XML format. The software can convert the output files into C or CUDA (a parallel computing platform for Nvidia GPUs) source code. The generated circuits can also be converted to the DOT graph description language for visualization with Graphviz (Ellson et al., 2002).

Place, publisher, year, edition, pages
Open Journals, 2021
National Category
Computational Mathematics
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-19851 (URN)10.21105/joss.02946 (DOI)
Note

CC BY 4.0

Available from: 2021-06-16 Created: 2021-06-16 Last updated: 2026-02-03Bibliographically approved
4. Breaking HALFLOOP-24
Open this publication in new window or tab >>Breaking HALFLOOP-24
2022 (English)In: IACR Transactions on Symmetric Cryptology, ISSN 2519-173X, no 3, p. 217-238Article in journal (Refereed) Published
Abstract [en]

HALFLOOP-24 is a tweakable block cipher that is used to protect automatic link establishment messages in high frequency radio, a technology commonly used by government agencies and industries that need highly robust long-distance communications. We present the first public cryptanalysis of HALFLOOP-24 and show that HALFLOOP-24, despite its key size of 128 bits, is far from providing 128 bit security. More precisely, we give attacks for ciphertext-only, known-plaintext, chosen-plaintext and chosen-ciphertext scenarios. In terms of their complexities, most of them can be considered practical. However, in the real world, the amount of available data is too low for our attacks to work. Our strongest attack, a boomerang key-recovery, finds the first round key with less than 210 encryption and decryption queries. In conclusion, we strongly advise against using HALFLOOP-24.

Place, publisher, year, edition, pages
Bochum: Ruhr-Universität Bochum, 2022
Keywords
HF Radio, ALE, HALFLOOP, Boomerang
National Category
Other Mathematics
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-21813 (URN)10.46586/tosc.v2022.i3.217-238 (DOI)000869410400008 ()2-s2.0-85137670245 (Scopus ID)
Conference
Fast Software Encryption (FSE) 2023, Beijing, China, March 20-24, 2023
Funder
German Research Foundation (DFG), EXC 2092 CASA - 390781972
Note

CC BY 4.0

This work was funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany’s Excellence Strategy - EXC 2092 CASA - 390781972.

Available from: 2022-09-13 Created: 2022-09-13 Last updated: 2026-02-03Bibliographically approved
5. User adoption of TETRA mobile radio communication networks: an information security perspective
Open this publication in new window or tab >>User adoption of TETRA mobile radio communication networks: an information security perspective
2025 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 33, no 5, p. 766-784Article in journal (Refereed) Published
Abstract [en]

Purpose – Digital mobile radio communication networks are used for coordinating operations in manyimportant sectors, including critical infrastructures and large industries. Despite this, there is a dearth ofknowledge about how their information security is managed. The most commonly used standard for suchnetworks is TETRA. Given the critical role of TETRA networks, this study aims to clarify how they are used,how their users manage information security and the implications of vulnerabilities in the standard.

Design/methodology/approach – The study is based on semi-structured interviews with representativesfrom 11 organizations in Sweden that own and operate TETRA networks, representing 32% of registered usersin the country and a wide range of users and applications. Thematic analysis was used to analyze the data.

Findings – Management of TETRA networks is generally outsourced, leaving TETRA network owners withscant knowledge of the state of security in their networks. Although organizations have high demands onavailability and integrity, the use of encryption and authentication is rare. Instead, users generally rely on theprotocol’s complexity and obscurity for security. Because organizations’ core operations are often dependenton functioning TETRA networks, attacks can have severe consequences.

Originality/value – Previous research on security in digital mobile radio communication networks hasfocused on technical vulnerabilities in standards. This study is the first, to the best of the authors’ knowledge,to investigate users’ approaches to information security, the potential consequences of attacks and theimplications of known security issues in this context.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2025
Keywords
Digital mobile radio communication networks, TETRA, Information security
National Category
Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-25198 (URN)10.1108/ics-12-2024-0318 (DOI)001500100900001 ()2-s2.0-105007982813 (Scopus ID)
Note

CC BY 4.0

Received: December 03 2024 | Revision Received: March 21 2025 | Accepted: April 30 2025

Corresponding author: Marcus Dansarie can be contacted at: marcus.dansarie@fhs.se

Available from: 2025-06-12 Created: 2025-06-12 Last updated: 2026-02-03Bibliographically approved

Open Access in DiVA

fulltext(7634 kB)28 downloads
File information
File name FULLTEXT01.pdfFile size 7634 kBChecksum SHA-512
1f5071cb1d4732671a2f5002856b8ffa73533f0bd5a70912a8ffb1724863bd5641bc52fc6f6eea87b5f9c724c98e54522ff406f3c5743964a249f43b9a56f6d3
Type fulltextMimetype application/pdf
omslag(261 kB)21 downloads
File information
File name COVER01.pdfFile size 261 kBChecksum SHA-512
afc056b1e0ade4ab054219c4ebf14eece5acaf0611ca6f7055d0289d287c98b79c8686d3d0edb7538bdb9308729e81eec7c42465ac24512f53e6809450e80aa1
Type coverMimetype application/pdf
spikblad(114 kB)15 downloads
File information
File name SPIKBLAD01.pdfFile size 114 kBChecksum SHA-512
f8121dfa134858acd3e046eed73d579faa1b1e533a90bd488c0acd9e4321c9716c061f61b730d1a0fc6aa184c3539668e161ca15f216c749f6a523ec437b45bf
Type spikbladMimetype application/pdf

Authority records

Dansarie, Marcus

Search in DiVA

By author/editor
Dansarie, Marcus
By organisation
School of InformaticsInformatics Research Environment
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 983 hits
1112131415161714 of 25
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf