using lte devices in critical communications•”blow the fuses” to prevent unauthorized...

18
-What are the technological considerations? Jarno Majava, Bittium Using LTE Devices in Critical Communications

Upload: others

Post on 05-Aug-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

-What are the technological considerations?

Jarno Majava, Bittium

Using LTE Devices

in Critical

Communications

Page 2: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

Paradigm change

Hardware

Software

Certifications

Lifecycle

Conclusions

Contents

Page 3: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

3

Paradigm change LTE brings new applications and broadband data for PPDR

Page 4: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

Use of COTS technologies and products increasing Wide range of new applications But: The PS user needs are specialized!

Page 5: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

MCX & real-time applications

3GPP Public Safety features

PS operator certification

Long device lifetime

Water resistance

Security updates & certification

Battery capacity, charging options

PTT and Emergency keys

DMO, ProSe

Glove usage

High-power speaker

MIL grade mechanics

PS accessories

Frequencies (B14, B28, B39, B68 etc…)

Price

LTE PS Device Requirements

Page 6: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

Chipset(s)

• Performance requirements

• Frequency bands

• PS features

• Cost, licensing terms

• Lifetime, availability

Mechanics

• Size

• Materials

• IP-level

• Durability

• Usability

Interfaces

• Connectivity

• SIM(s)

• Memory card

• Battery

• Charging

• Accessories

Security

Costs, benefits, risks….

Hardware considerations

Supply chain: DIY / Buy / Partner?

Page 7: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

7

Secure (physical) design

Hardware root of trust

Verified code execution

Hardware security

Supply chain security

Page 8: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

8

• Choose SoC that is fit for the purpose

• Amend SoC with additional chips that are

needed for required security level e.g.

tamper protection, secure key storage

• ”Blow the fuses” to prevent unauthorized

debugging and firmware access

• Apply proper enclosure/casing

Secure (physical) design

Page 9: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

Operating system

• Ecosystem, interoperability

• Android version?

• Google or non-GMS?

• Vanilla or custom?

HW optimization

• RF / antenna

• Display

• Camera

• Audios

• USB etc

PS enablers

• QCIs, eMBMS, ProSe…

• APIs, SDKs

• APNs

Services

• FOTA, GMS, IMS/VoLTE, MDM….

• MCX etc. applications

Release planning

• New features

• Fixes, updates

• Google releases

Testing

• Conformance

• Plug tests

• Google CTS

• Field tests

• Customer trials

Security

Costs, benefits, risks….

Software considerations

Page 10: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

Architecture

Authentication

Secure boot

Encryption

Tamper detection

Applications, cryptos

Updates, patches

VPN, MDM

Application management

Remote attestation

OTA firmware updates

End-to-end security

Page 11: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

Certifications

System Verification

•Concept verification

•Accessory testing

•Env/Mech testing

•IOP testing

•IOT

•Field testing

•GSM

•WCDMA

•LTE

•BT/WLAN

Pre- Conformance

•Regulatory

•FCC / IC

•E911

•HAC

•Type approval

•PTCRB, GCF

•CTIA

•IEEE 1725 (Battery)

•CTIA OTA

•WiFi RF perf

•Certifications

•USB

•BQP

•Wifi

Conformance

•Regulatory

•FCC/IC/R&TTE

•E911

•HAC

•SAR

•Safety

•Type approval

•PTCRB, GCF

•CTIA

•IEEE 1725 (Battery)

•CTIA OTA

•WiFi RF perf

•Certifications

•USB

•BQP

•Wifi

Operator testing

•Lab entry criteria

•Regulatory grant

•Type approval done

• Operator pre-testing

•Operator lab testing

•Operator field testing

Change Management

Error Management

Time

Page 12: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

Certification for PS

System Verification

•Concept verification

•Acessory testing

•Env/Mech testing

•IOP testing

•IOT

•Field testing

•CpK

•GSM

•WCDMA

•LTE

•BT/WLAN

Pre- Conformance

•Regulatory

•FCC / IC

•E911

•HAC

•Type approval

•PTCRB

•CTIA

•IEEE 1725 (Battery)

•CTIA OTA

•WiFi RF perf

•Certifications

•USB

•BQP

•Wifi

Conformance

•Regulatory

•FCC/IC/R&TTE

•E911

•HAC

•SAR

•Safety

•Type approval

•PTCRB

•CTIA

•IEEE 1725 (Battery)

•CTIA OTA

•WiFi RF perf

•Certifications

•USB

•BQP

•Wifi

Operator testing

•Lab entry criteria

•Regulatory grant

•Type approcal done

•Operator pre-testing

•Operator lab testing

•Operato field testing

Change Management

Error Management

Addition PS approvals and tests

•KPIs

•MCX applications

•Plug-tests

•Security certifications

Time

Page 13: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

Device availability • New COTS devices launched every

6-12 months • Lifetime of chipsets and other

components (EOL) • Leadtime of critical components

Technical support • Software updates • Security patches • Dedicated / generic support

Warranty • Standard or extended

Lifecycle considerations

Page 14: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

Mobile device value chain

PWB

Products

End

-Cu

stom

ers

OS

Manufacturing

Processor

Display, touch

Battery

Sales channel

Sales channel

Sales channel

Other component vendors

Page 15: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

SW evolution

OS patch

App patch

Sec patch

Firmware upgrade

Release

Approval

R&D

Testing

Version Control

Continuous product development

OS patch

New feature

Sec patch

OS upgrade

Release

Approval

R&D

Testing

Page 16: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

PS Device Value Chain

PWB

Product

CU

STOM

ER

OS

Manufacturing

Processor

Display, touch

Battery

Other component vendors

DELIVERY

PS apps

RFQ

Page 17: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

SUMMARY

• BYOD concept encourages use of personal devices for work

• But: as we have seen BYOD doesn’t really work for public safety

• Special requirements call for specialized devices

• Procurement model vs. mobile device ecosystem & processes

• How about using your professional device for personal use?

Page 18: Using LTE Devices in Critical Communications•”Blow the fuses” to prevent unauthorized debugging and firmware access •Apply proper enclosure/casing ... Security Costs, benefits,

Thank You!