Skip to main content
The Institution of Engineering and Technology iet.tv
Site name
  • Videos
  • Channels
  • Events
  • Series

Access and Account

Access your personal account

Log in to see your favourites, lists and progress.

IET Login

Access via institution

Not currently connected to any institutions

Connect via

This video isn’t available to you right now

Login to check your access and watch the full session

Login
  1. Videos
  2. Video

Threats and potential countermeasures for PMR systems

  • WhatsApp
  • Facebook
  • Email
  • LinkedIn
  • Bluesky
CPD This content can contribute towards your Continuing Professional Development (CPD) as part of the IET's CPD Monitoring scheme.
Conference
  • Session
  • Thursday, 23 September 2004
  • 00:23 - 00:23
  • Duration: 30 mins
  • Publication date: 23 Sep 2004
  • Location: IETTV_Room, IETTV_Venue, London, United Kingdom
  • Part of event 2nd IEE Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN

About the session

The objective of the presentation is to identify the threats to PMR systems and consider how different approaches to the implementation of cryptography and key management counter these threats when seen from the point of view of different interest groups. The presentation therefore provides an overview of the threats to PMR (Professional Mobile Radio) systems, taking into account the different potential attacker groups and the difference in the perception of the threats from the point of view of users and system operators. The presentation then goes on to look at the different options for the use of cryptography for authentication (user to network, network to user), confidentiality (air interface, or end to end) and the methods used for protection against traffic analysis. The various options are then assessed against the threats identified earlier, using examples from systems such as GSM, Tetrapol and newer interoperability standards such as FNBDT (Future Narrow Band Digital Terminal). The key management options for supporting point to point and group communications are addressed, identifying some of the problems with the different approaches that may be taken to counter the perceived threats. This includes the use of PKC (Public Key Cryptography) techniques for key management and distribution, symmetric schemes and examples of some of the problems of combined authentication and confidentiality interdependencies.

Channels

Communications

Communications

Speaker

  • PF

    Paddy J. Francis

    Cogent Defence and Security Networks Ltd.

The Institution of Engineering and Technology iet.tv

Address: Futures Place, Kings Way, Stevenage, SG1 2UA

Telephone: +44 (0)33 049 9123

Email:  iet.tv@theiet.org

© 2026 The Institution of Engineering and Technology.

The Institution of Engineering and Technology is registered as a Charity in England & Wales (no 211014) and Scotland (no SC038698). Futures Place, Kings Way, Stevenage, Hertfordshire, SG1 2UA, United Kingdom

  • LinkedIn
  • Instagram
  • YouTube
Privacy statement Cookie Preferences Accessibility About us theiet.org Help

Powered by Cadmore Media

Embed Code

<script type="text/javascript" src="https://play.cadmore.media/js/EMBED.js"></script> <div class="cmpl_iframe_div"> <iframe src="https://play.cadmore.media/Player/6d8dc78d-045a-4326-bb50-2a7edd079ca2" scrolling="no" allowtransparency="true" allowautoplay="true" frameborder="0" allow="encrypted-media;autoplay;fullscreen" class="cmpl_iframe" allowfullscreen="" style="overflow: hidden;border: 0px; margin: 0px; height: 100%; width:100%;"></iframe> </div>

Are you sure you want to reset your password?

If so, you will be redirected to the Authentication Service

Title

Prompt