Högskolan i Skövde

his.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
User adoption of TETRA mobile radio communication networks: an information security perspective
University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment. Department of Systems Science for Defence and Security, Swedish Defence University, Stockholm, Sweden. (Information Systems (IS))ORCID iD: 0000-0001-9246-0263
University of Skövde, School of Informatics. University of Skövde, Informatics Research Environment. (Information Systems (IS))ORCID iD: 0000-0001-5962-9995
2025 (English)In: Information and Computer Security, E-ISSN 2056-4961, Vol. 33, no 5, p. 766-784Article in journal (Refereed) Published
Abstract [en]

Purpose – Digital mobile radio communication networks are used for coordinating operations in manyimportant sectors, including critical infrastructures and large industries. Despite this, there is a dearth ofknowledge about how their information security is managed. The most commonly used standard for suchnetworks is TETRA. Given the critical role of TETRA networks, this study aims to clarify how they are used,how their users manage information security and the implications of vulnerabilities in the standard.

Design/methodology/approach – The study is based on semi-structured interviews with representativesfrom 11 organizations in Sweden that own and operate TETRA networks, representing 32% of registered usersin the country and a wide range of users and applications. Thematic analysis was used to analyze the data.

Findings – Management of TETRA networks is generally outsourced, leaving TETRA network owners withscant knowledge of the state of security in their networks. Although organizations have high demands onavailability and integrity, the use of encryption and authentication is rare. Instead, users generally rely on theprotocol’s complexity and obscurity for security. Because organizations’ core operations are often dependenton functioning TETRA networks, attacks can have severe consequences.

Originality/value – Previous research on security in digital mobile radio communication networks hasfocused on technical vulnerabilities in standards. This study is the first, to the best of the authors’ knowledge,to investigate users’ approaches to information security, the potential consequences of attacks and theimplications of known security issues in this context.

Place, publisher, year, edition, pages
Emerald Group Publishing Limited, 2025. Vol. 33, no 5, p. 766-784
Keywords [en]
Digital mobile radio communication networks, TETRA, Information security
National Category
Information Systems
Research subject
Information Systems
Identifiers
URN: urn:nbn:se:his:diva-25198DOI: 10.1108/ics-12-2024-0318ISI: 001500100900001Scopus ID: 2-s2.0-105007982813OAI: oai:DiVA.org:his-25198DiVA, id: diva2:1968084
Note

CC BY 4.0

Received: December 03 2024 | Revision Received: March 21 2025 | Accepted: April 30 2025

Corresponding author: Marcus Dansarie can be contacted at: marcus.dansarie@fhs.se

Available from: 2025-06-12 Created: 2025-06-12 Last updated: 2026-02-03Bibliographically approved
In thesis
1. Understanding Security in Special-Purpose Digital Radio Communication Systems
Open this publication in new window or tab >>Understanding Security in Special-Purpose Digital Radio Communication Systems
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

Activities that have specialized communication needs which cannot be met by general communication systems such as mobile telephony or wireless networking need specialized communication systems. The thesis investigates the special-purpose digital radio communication systems that have been created to meet specialized needs across a range of fields. Since many of the fields where these communication systems are used are part of critical infrastructures and other important operations, the security of the communication systems may be vital to the security of the operations they support. Despite this, special-purpose digital radio communication systems often have significantly lower levels of security than more commonly used systems, such as mobile telephony or Internet-based protocols. The thesis defines special-purpose digital radio communication systems as a class of systems that, while differing in many ways, have common security properties. The common security themes among the different systems are investigated through focused case studies on two standards: Automatic Link Establishment (ALE) for high-frequency radio and TETRA, a trunked cellular professional mobile radio standard. The case study on ALE uses cryptanalysis to find weaknesses in the cryptography specified by the standard, mirroring similar weaknesses in other standards. In the TETRA case, qualitative interviews reveal how organizations that own TETRA networks make security-related decisions regarding them. The thesis proposes a number of possible explanations for the low level of security in special-purpose digital radio communication systems: lack of security by design, deficient understanding of system dependencies, normal accident dynamics, lack of feedback, and market structure. The thesis is the first to consider the different standards as members of a single class of systems and point out the commonalities.

Abstract [sv]

Verksamheter vars kommunikationsbehov inte tillfredsställs av generella kommunikationssystem som exempelvis mobiltelefoni eller trådlösa nätverk behöver särskilda kommunikationssystem. Avhandlingen undersöker de digitala radiokommunikationssystem för särskilda ändamål som skapats för att möta de särskilda kommunikationsbehov som finns i många områden. Eftersom flera av de områden som använder de ifrågavarande kommunikationssystemen är del av kritiska infrastrukturer eller andra viktiga verksamheter är säkerhet i kommunikationssystemen av vikt för säkerheten i verksamheterna som helhet. Trots detta har digitala radiokommunikationssystem för särskilda behov ofta signifikant lägre säkerhetsnivå än mer spridda system, som exempelvis internetbaserade protokoll. Avhandlingen definierar digitala radiokommunikationssystem för särskilda behov som en grupp system som, trots att de är olika på många sätt, delar gemensamma säkerhetsegenskaper. De gemensamma egenskaperna undersöks genom fallstudier på två standarder: Automatic Link Establishment (ALE), en standard för länketablering för kortvågsradio, och TETRA, en standard för trunkad cellulär kommunikationsradio. I fallstudien av ALE används kryptoanalys för att upptäcka svagheter i kryptografiska funktioner som specificeras i standarden, vilket återspeglar liknande sårbarheter i andra standarder. I fallet med TETRA används kvalitativa intervjuer för att visa hur organisationer som äger TETRA-nätverk tar säkerhetsrelaterade beslut rörande dem. Avhandlingen föreslår ett antal möjliga förklaringar för den låga säkerhetsnivån i digitala radiokommunikationssystem för särskilda behov: ingen inbyggd säkerhet, bristande förståelse för systemberoenden, systemolyckedynamik, brist på återkoppling och marknadsstruktur. Avhandlingen är den första som behandlar de olika standarderna som tillhörande en enda grupp av system och att identifiera likheterna.

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2025. p. xvi, 188
Series
Dissertation Series ; 68
National Category
Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-26139 (URN)978-91-989080-9-1 (ISBN)978-91-989081-0-7 (ISBN)
Public defence
2026-04-14, L52, Drottning Kristinas väg 30, Stockholm, 13:00 (English)
Opponent
Supervisors
Available from: 2026-02-04 Created: 2026-02-03 Last updated: 2026-02-04Bibliographically approved

Open Access in DiVA

fulltext(1609 kB)20 downloads
File information
File name FULLTEXT02.pdfFile size 1609 kBChecksum SHA-512
681a0d4a19319a48f442dd6545c3f839bb885a659010c36273ebc3dde91cc0dbf33c59ab2a7764d2dd7d4a7c6177b3cf2e755c0bd3161622e4c486055d9480db
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Dansarie, MarcusNohlberg, Marcus

Search in DiVA

By author/editor
Dansarie, MarcusNohlberg, Marcus
By organisation
School of InformaticsInformatics Research Environment
In the same journal
Information and Computer Security
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 57 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 217 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf