Maximizing Security – CDMA and Its Contribution to Homeland Security

Maximizing Security – CDMA and Its Contribution to Homeland Security

Maximizing Security – CDMA and its Contribution to Homeland Security Michael Iandolo Vice President, CDMA Product Management Lucent Technologies Who thinks Wireless is Critical for Homeland Security? “Commercial services offer public safety flexible, convenient “There is growing demand for wireless communications for both daily and disaster operations” technology…drivers for this trend come from several McKinsey 9/11 report different directions…in DOD, it’s the need to support “GPS and “We operate the fourth largest database in the first responders and develop a more mobile geolocation via military.” GSA world, but it doesn’t do our folks in the field “There are several efforts underway wireless phones much good if they can’t get access to it…As to address secure access to critical may allow more wireless systems are implemented, data to protect the lives of first vehicles as probes Customs wrestles with critical issues like responders. For example, first to supplement bandwidth, signal strength, coverage and responders could receive information critical security.” Woody Hall, CIO Customs about where emergency exits are infrastructure located through a PDA when lost in a data. ITS “Crucial to DHS mission are building.” Steve Dawson, CTO, NJ technology geospatial software, knowledge combined with “Wireless modem terminals equipped with management, infrastructure, wireless and CAD GPS provide a more efficient way to respond wireless, collaboration, modeling can provide EMS to a health threat. A gift by the Marcus and simulation, middleware and the capability to foundation enables the CDC to make broad database technology.” Steve receive timely use of location- based wireless services for Cooper, CIO DHS notice of an mobile field operations.” CDC “long term goal of Operation Safe incident, be “Not only must information be secure, it must City is to integrate the system with efficiently routed be part of the enterprise in such a way that the handheld devices that police and to the scene and wireless infrastructure is connected to it. firemen can use in the field in order hospital” DOT 10 We’re looking to try to expand some of to send data about buildings in their year plan for ITS information services to cell phones, PDAs,…” areas of responsibility to a central FEMA data warehouse.” City of Boston Lucent Technologies 2 CDMA2000 Benefits for Homeland Security • Supports the bandwidth needed for wireless data applications to be viable • CDMA2000 1X offers unparalleled voice capacity: 1xEV- DO delivers unmatched data capacity • Allows selective deployment where/when it is most needed: Backwards compatibility of CDMA2000 provides advantage of seamless co-existence of 2nd and 3rd Generation systems. • Provides high levels of security • Offers broad terminal availability Lucent Technologies 3 Why CDMA for Homeland Security? 3G Wireless is necessary to supplement current Land Mobile Radio (LMR) voice networks First Responders’ use • LMR is Costly • Expensive equipment • Dominance by very few vendors • As 9/11 demonstrated, lack of interoperability is a serious problem • Proprietary protocols • Very fragmented spectrum • With the low data speeds of P25 systems there are limited applications – Narrow band technology good for voice but only enables low-speed data – Encryption requires higher air-interface capability for quality Lucent Technologies 4 Why CDMA for Homeland Security? Limited use of mobile data now and limited speeds • Lack of access to Mobile Data for First Responders – 2.5 Million First Responders and only 150K using wireless data now • Most First Responders that have access to mobile data are limited to very low speed networks with average speeds of 9.2 kbps to 19.2 kbps • Large number of public safety agencies utilizing CDPD, which is being discontinued over the next two years • Only 3G can support the additional security and speed required for Homeland Security Lucent Technologies 5 Why is CDMA a Better Choice than GPRS? • Better Security – In contrast to GSM/GPRS networks, neither CDMA2000 1X nor the earlier cdmaOne have fallen victim to attacks – CDMA2000 1X has very strong authentication mechanisms through the use of multiple keys and 128-bit radio link encryption – Spread-spectrum technology makes use of pseudo-random codes • CDMA Provides Better Coverage • Faster Speed and Better Capacity – CDMA2000 1X (peak rates) • 1x rel.0: 153.6 Kbps DL & RL • 1x rel.A: 307 Kbps DL/ 153.6 Kbps RL • 1x rel.D: 3.1 Mbps DL/ 1.5 Mbps RL (in the near future) – GSM/GPRS/EDGE (peak rates) • GPRS: 9.6 to 22 Kbps per time slot in packet mode • EDGE: up to 59 Kbps per time slot in packet mode Lucent Technologies 6 Spread Spectrum Provides Inherent Privacy of All Information (Voice, Data, Signaling) • Code Division (CDMA) signals are more difficult to tap than Time Division (GSM/TDMA) or Analog signals via: – Signal Spreading – Soft hand-off – Long Code Mask • Enhanced Subscriber Authentication (ESA) and Enhanced Subscriber Privacy (ESP) provide key security enhancements • Security is further enhanced at device level • To date, there are no known or commercially available CDMA2000 interception devices Lucent Technologies 7 Packet Data Security Architecture User Credit Authentication VPN - End-to-End Protection Bank Centralized Authentication, Authorization, Policy enforcement, Accounting (AAA) accounting billing Network-layer authentication and authorization Over the air coding and encryption Wireless Core Network Wireless Radio Network MSC & PDSN HLR/VLR/AAA Internet Wireless servers Routers application servers Lucent Technologies 8 CDMA2000 Meets Federal Security Source: Federal Wireless Requirements Policy Committee Federal Security Requirements 3G CDMA Wireless Goals Confidentiality – the protection of Protect session information and user data, signaling, identification prevent unauthorized access to and location user traffic Integrity – the protection from Protect session from hijacking insertion, deletion, modification which provides integrity protection or replay of data (prevents tampering with user traffic) Authentication – the assured Protect system resources through identification of the user, terminal authentication of users and carrier Availability – Obtain access to Mutual authentication of mobile service and prevent denial of and network to each other service attacks prevents network attacks Lucent Technologies 9 Beyond Security- Why is CDMA Necessary for Homeland Security? • Enables First Responders to utilize critical applications that are not possible on slower speed LMR, Mobitex and CDPD networks – Mapping/Location Based Services – critical infrastructure protection – Video Streaming – incident scenes, security – Digital Image transfer – disaster scene – Large files transfer – records, on-line manuals, emergency protocol – Biometrics – facial recognition – Bioterrorism detection and response – sample analysis, plume tracking • Enables First Responders to communicate and respond in real-time • Enables First Responders to better utilize the technology they already have Lucent Technologies 10 Public Safety / Homeland Security Applications Police and EMS Video Applications PROTECT • Provides Chem/bio alarms, video, and facial recognition • 1.2 Mbps throughput required ! Medical Consult, “virtual” backup, and incident pre-assessment are all critical ! 240 kbps per user (bi-directional) for full motion, medium resolution video CapWIN ! Messaging, incident command, and database access across jurisdictions and functional disciplines ! High quantities of medium speed (80 kbps) users for rapid image distribution Source: DC Office of Technology Lucent Technologies 11 GPS/GIS/Location Based Services Route Navigation First Responder Tracking Traffic Conditions Critical Infrastructure Health Threats Crime Mapping Container Tracking MultipleMultiple UsesUses forfor LocationLocation Lucent Technologies 12 Try Downloading this GIS Image Over 19.2 kbps (Event Management Application) Lucent Technologies 13 Biometrics Fingerprints Facial Recognition Retina Scanners Mobile Fingerprint Scanners Smart Cards IncreaseIncrease effectiveness effectiveness of of Biometrics Biometrics withwith 3G3G MobileMobile HighHigh SpeedSpeed DataData Lucent Technologies 14 Video Real-time Patrol Car Video Disaster Communication Dispatch Centers Image Transmission from Crime Databases 3G3G Mobile Mobile High High Speed Speed Accident Scene Data-Data- a a goodgood fitfit forfor Mobile Mobile to Trauma Center VideoVideo Lucent Technologies 15 Large File Transfer – Incident Management System: Many types of information that need to be shared and stored •Incident type •Traffic Flow/Transportation •Driver history requests •Incident location Network status •Intelligence •Who is on scene by agency and •Equipment deployed Information unit •Universal health precautions •Crime •Whose jurisdiction •Weather patterns/mapping •Notification of Other Agencies •Land Property •Location injured •Available routes to scene •Media Interaction •Hospital capability and •Danger areas at scene (Hazmat, •Lookouts status Weapons) •Officer in distress Notification •Wanted vehicle •Chem/Bio threat •Premise history notification •Number and type of vehicles •Concealed weapon permits •Sensory Capabilities involved •Escapees •CAD data •Road closures and lane •Condition of Release and •Records management blockages Repeat Offender files information •Number and description of •Domestic/Protection orders •Accident scene photos person involved •Recovered stolen auto •Number and type of injuries

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    25 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us