WHITE PAPER. Secure Cellular Push-to-Talk to Land Mobile Radio Communications



Similar documents
Emerging Wireless Technologies

Step Two: Remember Some Basic Guidelines on Protocols

AT&T. Push to Talk over Cellular & Interoperability into LMR networks

VoIP for Radio Networks

700TAG Technical Advisory Note 1

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

presentation Our customers & Partners AE

Mission Critical Voice Communications Requirements for Public Safety National Public Safety Telecommunications Council Broadband Working Group

BridgeWay Fixed Base Radio Telecom VoIP Gateway

MaXphone Multi-Access Extension for Smartphones

Mobile Communications: Lower Costs with Cisco Instant Connect Push to Talk Solution

BRIDGEWAY MOBILE VOIP RADIO-INTERCOM GATEWAY

NXU RoIP Link to Eliminate Voice-Grade Leased Line

Data Transfer Rate Comparison

Packetized Telephony Networks

Cisco IPICS Push-to-Talk Management Center

Modernizing and Streamlining Communications & Collaboration for Command Center Operations

Wireless Broadband Access

Public Safety Communications Research

Challenging Communication Boundaries. Dispatch Solutions for VoIP Networks

AIRAVE Frequently Asked Questions

Cisco IPICS Dispatch Console

BridgeWay Fixed Base Radio Telecom VoIP Gateway

Tactical VoIP Intercom and Conferencing Systems

PushTalk Service System

Utilizing IP & Data Services to provide Secure Global Push To Talk Communications

Push-to-talk Over Wireless

BeOn Mobile Application PUBLIC SAFETY S MOST ADVANCED P25 PUSH-TO-TALK APPLICATION. Windows PC Platform. ios Platform.

Response to NTIA Notice of Inquiry On Requirements On Behalf of the First Responder Network Authority

Integrating Two-Way Radio into Your Unified Communications Environment

AT&T Connect Video conferencing functional and architectural overview

Cisco Analog Telephone Adaptor Overview

Overview of Voice Over Internet Protocol

Foreword... 2 Introduction to VoIP... 3 SIP:... 3 H.323:... 4 SER:... 4 Cellular network... 4 GSM... 5 GPRS G... 6 Wimax... 7 Introduction...

CONNECTING TO LYNC/SKYPE FOR BUSINESS OVER THE INTERNET NETWORK PREP GUIDE

LTE Performance and Analysis using Atoll Simulation

Hytera dispatch system

Hytera dispatch system. Transportation Public Safety. Utilities. Commercial & Industrial.

BridgeWay M400/M800 Radio/Intercom VoIP Gateway System Overview

VOICE OVER IP AND NETWORK CONVERGENCE

NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service

Chapter 6 Telecommunications, Networks, and Wireless. Computing

A Model-based Methodology for Developing Secure VoIP Systems

Hosted Voice. Best Practice Recommendations for VoIP Deployments

Radio Over Wireless Broadband Pilot. Project Report

Radio over Internet Protocol (RoIP)

Push To Talk over Cellular (PoC) and Professional Mobile Radio (PMR)

MIGRATING PUBLIC SAFETY NETWORKS TO IP/MPLS

Next Generation of Push-to-Talk

HD VoIP Sounds Better. Brief Introduction. March 2009

Mobility and cellular networks

Software-Powered VoIP

Welcome to Completely Distributed P25 VoIP Dispatch Console Technology

1xEV-DO + VoIP = CDMA Operator Advantage

Distributed in Canada by Omega Communications Ltd

Indepth Voice over IP and SIP Networking Course

Troubleshooting Voice Over IP with WireShark

Applications that Benefit from IPv6

Combining Voice over IP with Policy-Based Quality of Service

Securing SIP Trunks APPLICATION NOTE.

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

VoIP Glossary. Client (Softphone client): The software installed in the userâ s computer to make calls over the Internet.

Security & Encryption

Integrate VoIP with your existing network

Configuring the Sonus SBC 2000 with Cisco Unified Call Manager 10.5 for Verizon Deployment

The MOST Affordable HD Video Conferencing. Conferencing for Enterprises, Conferencing for SMBs

Raven Electronics Corporation Specialized Communication Solutions Since 1968

Operation Manual Voice Overview (Voice Volume) Table of Contents

Toll-bypass Long Distance Calling What Is VOIP? Immediate Cost Savings Applications Business Quality Voice...

HOSTED VOICE Bring Your Own Bandwidth & Remote Worker. Install and Best Practices Guide

Overview of Network Architecture Alternatives for 3GPP2 Femto Cells Jen M. Chen, et al. QUALCOMM Incorporated

Terms VON. VoIP LAN WAN CODEC

Overview of GSMA VoLTE Profile. minimum required functions [3]. 2. Background

How To Understand The Differences Between A Fax And A Fax On A G3 Network

Over the PSTN... 2 Over Wireless Networks Network Architecture... 3

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

SIP Trunking DEEP DIVE: The Service Provider

VoIP: Architectural Differences of SIP and MGCP/NCS Protocols and What It Means in Real World VoIP Service

Wi-Fi calling for business: ROGERS WHITE PAPER. An Executive Overview

IP Telephony Deployment Models

IPR100 IPR400 IPR110 Plus

Verizon Wireless White Paper. Verizon Wireless Broadband Network Connectivity and Data Transport Solutions

TELECOM HF VHF UHF over IP

(Refer Slide Time: 6:17)

SmartPTT Tutorial Telephone Interconnect

Course 4: IP Telephony and VoIP

(Refer Slide Time: 4:45)

Integrated Command and Control Center Solutions for Public Safety

An Introduction to VoIP Protocols

Network Connection Considerations for Microsoft Response Point 1.0 Service Pack 2

Security and Risk Analysis of VoIP Networks

VoLTE with SRVCC: White Paper October 2012

Crash Phone Solution. Communications. Command. Control

Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402

With 360 Cloud VoIP, your company will benefit from more advanced features:

Session Initiation Protocol (SIP)

Need for Signaling and Call Control

Transcription:

to Land Mobile Radio Communications

Abstract Public Safety agencies are highly invested and dependent on their Land Mobile Radio (LMR) systems. They are also somewhat discontent with the high cost of maintenance and the lack of interoperability. The Public Safety associations would like nothing better than to reduce costs by moving some of their subscribers to mobile broadband commercial devices. However, LMR communication is critical for certain aspects of operation such as crisis management, secure tactical operations, and its reliability and availability. Therefore, there is a critical need for a Public Safety radio system that can support both LMR and (PTT) users. This paper discusses how interoperability can be achieved between Secure Cellular PTT and LMR. 1

Introduction Law enforcement and first responders ability to securely communicate is revolutionized with Secure Cellular PTT and the interoperability with LMR systems. With a standard cell phone, whether within the RF footprint of the LMR system or not, managers, agents and officers can communicate with their LMR system users, providing a great tactical advantage. This ability, using commercial cellular networks, provides enhanced coverage and access for routine daily use. It is recognized that LMR systems will continue to be necessary for tactical use and their security, reliability and availability in a crisis or tactical situation. To address the reliability and availability of broadband services to the Public Safety community, the Federal Communications Commission (FCC) is in the process of creating a Public Safety Nationwide Wireless Broadband Communications Network, which is funded by grants from the U.S. Department of Commerce. This new network will allow first responders nationwide to communicate with each other quickly and efficiently, providing mobile access to information systems. The network is based on Long Term Evolution (LTE) technology, the same technology that cellular operators are now deploying as the next generation (4G) of their commercial networks. The Public Safety network will operate in the 700 MHz band. While this new nationwide mobile broadband network will solve many issues, it introduces another challenge, that of interoperability with existing LMR systems. This paper discusses interoperability between the new generation of Secure Cellular PTT radio systems and existing LMR systems. Such interoperability is independent of the cellular network provider, whether it is a commercial network or private Public Safety network. Secure Cellular PTT Coverage Challenge Allowing users to communicate with each other and with one-to-many when outside their LMR system RF footprint has resulted in the offering of cellular PTT technology. However, security and voice quality have been less than desirable. Covertness Challenge When conducting certain types of law enforcement operations, the use of tactical radios is inappropriate because of the difficulty in maintaining discreteness. This challenge is created by the mere size of a radio, as well as its necessity to emit power during use. Both factors make the tactical radio detectible by the subjects of investigation. 2

Solution The introduction of the high-speed wireless Internet Protocol (IP) packet data service has given rise to a number of new Voice over IP applications; one such application is Secure Cellular PTT. Secure Cellular PTT is delivering a host of capabilities to mobile broadband subscribers that were only recently available on dedicated LMR systems. Such capabilities include: AES Voice Encryption Half-Duplex Person-to-Person Calls Half-Duplex Person-to-Group Calls Dynamic Regrouping Priority Emergency and Broadcast Calling Over the Air Provisioning Over the Air Re-Keying User and Group Priority Dispatch Capabilities Text Messaging Secure Cellular PTT is a data application and as such is not dependent on a specific radio system transport mechanism. It can execute on any radio system that provides the right level of performance (e.g., TD-CDMA, CDMA-EVDO, W-CDMA, HSPA, 802.11). This means that Secure PTT applications can execute on a commercial cellular infrastructure. This is particularly attractive to Public Safety agencies as it makes it less expensive to construct new networks on the back of existing cellular infrastructure. Also, as commercial carriers converge on the LTE mobile broadband standard, it is envisaged that in the future Public Safety personnel will be able to make use of a variety of commercial and private cellular networks. A typical Secure Cellular PTT application usually consists of a PTT client that resides on the end-user device (smart phone), a set of application servers (that are reached over the Internet), a dispatch console and a radio gateway (see Figure 1. Secure Cellular PTT Architecture). Secure PTT Client Dispatch Console Mobile Broadband Network Application Servers Figure 1. Secure Cellular PTT Architecture Radio Gateway 3

LMR Interoperability In the absence of a radio device with a dual air control interface that can operate on both a mobile broadband and an LMR network, interoperability must be achieved through interoperability gateways. These gateways are usually part of a conferencing system and organized in a hub-and-spoke type architecture (see Figure 2. Hub-and-Spoke Conferencing System). Mobile Broadband Network LMR Network Interop Gateway Mobile Broadband Network Interop Gateway Conferencing System Interop Gateway Interop Gateway LMR Network Figure 2. Hub-and-Spoke Conferencing System Interoperability gateways usually come in two forms: Radio Gateways or Network Gateways. Radio Gateway At present, the Radio Gateway (RGW) is by far the most common method of interoperability. It works by connecting two radio systems together via an analog four-wire ear and mouth interface. There are three types of commonly used configurations: tactical, strategic and hybrid. 4

Tactical Configuration In a Tactical Configuration, a donor radio for each radio system is connected to the RGW via the radio s microphone and speaker ports (usually with a special cable). When a subscriber on one radio system presses PTT and talks, the donor radio on that network receives the RF communication and plays it out through its speaker port to the RGW. The RGW then feeds the incoming audio to the other donor radio through the radio s microphone input. The donor radio then transmits the received voice into its home radio network (see Figure 3. RGW Tactical Configuration). Radio System 1 Radio System 2 PTT Donor RGW Donor Figure 3. RGW Tactical Configuration Note: All donor radios must be within the RF footprint of their home radio system. 5

Strategic Configuration In a Strategic Configuration, the donor radio is also connected to the RGW through its microphone and speaker ports. When a subscriber on the donor radio s home network selects PTT and talks, the donor radio receives the RF communication and plays it out through its speaker port into the RGW. The RGW then converts the analog signal to digital Voice over IP and transmits it into the radio or conferencing system. Conversely, when the RGW receives a voice stream from the radio or conferencing system, it converts it to analog and feeds it into the donor radio microphone. The donor radio then transmits it into its home network (see Figure 4. RGW Strategic Configuration). Radio System 1 RGW Conferencing or Radio System Donor Figure 4. RGW Strategic Configuration Hybrid Configuration In a Hybrid Configuration, two radio gateway devices are attached together to connect the radio systems via an analog bridge. There are no donor radios (see Figure 5. RGW Hybrid Configuration). Radio System 1 PTT PTT RGW E & M RGW Conferencing or Radio System Voice Switch Figure 5. RGW Hybrid Configuration 6

Network Gateway A Network Gateway (NGW) connects two radio systems together over an IP connection. The voice streams that pass through the gateway are kept in IP packet format. This provides a much higher level of integration than an RGW. The NGW is the interface between the conferencing system and the foreign radio system. It is usually specialized to interface with a specific type of radio system (e.g., P25, USCG Rescue 21). It can adapt an incoming voice stream to its local format or adapt an outgoing voice stream to the format of the foreign radio system. NGWs can also sit between two radio systems in a point-to-point type architecture (e.g., P25 inter-rf subsystem interface (ISSI)), but they provide the most value when connected to a centralized conferencing system in a hub-and-spoke architecture. An NGW provides the following functions: Voice Trans-Coding Floor Control Encryption/Decryption Caller Information Pass Through Prioritization for Emergencies or Quality of Service (QOS) Scalability Voice Trans-Coding Heterogeneous radio systems often use different codecs for encoding their voice streams. For example, P25 uses improved multi-band excitation (IMBE), whereas mobile broadband uses adaptive multi-rate (AMR). In order to pass voice streams between different systems, the voice stream must be adapted to the target format. Floor Control Heterogeneous radio systems often handle floor control differently. In a P25 system, floor control is embedded in the IMBE voice stream. In a PTT Over Cellular system, floor control is achieved via real-time transport control protocol (RTCP) signaling. In order to synchronize floor control between different systems, the floor control must be adapted to the target system. When multiple PTT radio systems are connected together, floor control may become an issue, as there are multiple PTT arbitrators. Protocols like ISSI solve this problem by mandating that the floor control arbitrator is the owner of the talk group. In this way, a P25 radio system will defer floor control arbitration to another radio system if it is not the owner of the talk group. A conferencing system must honor this relationship. In order to simplify things, some conferencing systems will own the interoperability talk group and provide arbitration. 7

Encryption/Decryption An NGW may be required to encrypt or decrypt a voice stream as it enters or leaves the conferencing system. Voice streams are encrypted by the gateway as they are transferred into the foreign radio system. Voice streams are decrypted by the NGW as they are received from the foreign radio system. If the communicating radio systems are compatible and share encryption keys, the voice stream can be passed encrypted through the network gateways, providing end-to-end encryption. Caller Information Pass Through An NGW can pass caller information transparently through to the target radio system. This may include a subscriber ID or alias name. Prioritization for Emergencies or Quality of Service (QOS) An NGW is capable of preserving the emergency status of a call. It can also pass through QOS information and prioritize resources based on the caller s priority. Scalability An NGW can be scaled to simultaneously handle multiple voice streams. This is quite different from an RGW which can only handle one voice stream at a time and is often bound to a specific talk group or channel. Voice Conferencing System The voice conferencing system ties the radio and network gateways together and manages the media relationships between the different radio access networks. The conferencing system provides the following capabilities: Conference Management Agency Privacy Consolidated Dispatch Console Access to Radio Access Networks Management of Key Information Virtual Radio Asset Normalization and Presence Conference Security 8

Conference Management The conferencing system enables the dynamic creation, deletion and modification of voice conferences. The voice conferencing system manages the signaling and voice communication between its members. Conference members are usually assets from connected radio access networks (i.e., radio talk groups, radio subscribers, radio channels, PSTN users, etc.). Agency Privacy The conferencing system must maintain privacy between the agencies that it hosts. For example, an FBI operator should not have visibility to a CBP asset, unless permitted to do so. Consolidated Dispatch Console Most conferencing systems provide an agency consolidated dispatch console. This dispatch console has visibility to all agency assets available for conferencing. These assets represent channels, talk groups and subscribers on different radio access networks that need to interoperate. The dispatch console can monitor and participate in the voice conferences. Access to Radio Access Networks The conferencing system ties the radio and network gateways together. A conference membership may be made up of voice assets from multiple radio access networks that are accessed through multiple gateways. Management of Key Information A conferencing system network gateway often holds keys for the radio access network with which it interfaces. For example, a Secure PTT Cellular gateway may hold the keys for the groups with which it interfaces. If implemented correctly, the gateway would automatically receive key updates when the radio access network updates its radios. This way the radio gateways always have the current keys. Virtual Radio Most conferencing systems have a virtual radio implementation. This is a data application that runs on an end-user device (i.e., laptop, desktop, smart phone, tablet PC, etc.). The application functions as a radio device and, at a minimum, allows the user to talk and listen to voice over the conference. Asset Presence and Normalization The conference system detects when a radio system asset is available (connected). It provides presence information to other conference system assets. It is also able to take assets from heterogeneous radio access networks and normalize them so they appear as homogeneous assets within the conference system. This way the conference system can manipulate objects that have similar attributes. 9

Conference Security Conference Systems support different levels of security: Unsecure Mode Secure Mode End-to-End Secure Mode Mixed Mode Unsecure Mode Unsecure conferences are not encrypted. The members are assets who do not encrypt their voice. Therefore there are no keys involved. 10

Secure Mode In a Secure mode of operation, the end-user voice stream is decrypted when it enters the conference system and encrypted when it leaves the conference system. Secure mode allows end users with different keys to communicate because the voice streams are decrypted within the conference system. Figure 6. Secure Mode Encryption shows three radio systems, each using a different key: Secure Cellular PTT, P25 LMR and legacy LMR. Internet Protocol Security (IPsec) protocols are used between gateways as the voice stream is in the clear. The ISSI and Push-to-Talk Over Cellular (POC) gateway encrypts and decrypts voice as it enters and leaves the conference system. The Legacy System is accessed through a donor radio connected to a Legacy Gateway. The donor radio encrypts and decrypts the voice as it enters and leaves the legacy network. The interface between the donor radio and the Legacy Gateway is analog (and in the clear) but is digitized at the Legacy Gateway. Secure PTT Cellular Key 1 POC GW Conferencing System Key 2 Donor Radio Legacy GW ISSI GW Key 3 Legacy LMR P.25 LMR Figure 6. Secure Mode Encryption 11

End-to-End Encrypted Mode In End-to-End Encryption mode, the voice is encrypted by the source radio and is only decrypted at the destination radio. The voice stream remains encrypted from end to end, over both the wireless and wire line connections as shown in Figure 7. End-to-End Encryption. This is only possible between endpoints that have the same vocoder and encryption scheme. For this to work between a Secure Cellular PTT endpoint and P25 LMR endpoint, the cellular device would have to have a P25 vocoder and share the same keys. While this is possible, it is very unlikely as the secure mode of operation should be satisfactory for most applications. Key 1 Secure PTT Cellular POC GW Conferencing System ISSI GW P.25 LMR Key 1 Figure 7. End-to-End Encryption 12

Mixed Mode Mixed Mode operation enables an encrypted talk group to participate in a clear conference, as shown in Figure 8. Mixed Mode Encryption. The voice stream is encrypted and decrypted as it enters and leaves the conference system. The voice stream is un-encrypted (clear) within the conference system and with the other members of the conference. This type of conference would only be used under special circumstances, and would be enabled through a system policy and permissions with confirmation by an agency administrator. Secure PTT Cellular Encrypted Key 1 POC GW Conferencing System Legacy GW ISSI GW Donor Radio Legacy LMR Clear No key Figure 8. Mixed Mode Encryption P.25 LMR 13

Conclusion Commercial mobile devices and commercial networks can greatly reduce costs and enhance communications capabilities for law enforcement and first responders. These commercial assets will not replace the need for LMR systems, but their interoperability with those systems will revolutionize the way law enforcement and first responders communicate with each other. For routine daily use, there are many circumstances where Secure Cellular PTT is preferred over the use of LMR. For instance, LMR systems have a specific coverage area and at times people who need to communicate are outside that coverage. With the ever-increasing coverage of commercial cellular networks and interoperability with LMR, coverage limitations are greatly diminished. Secondly, agents and officers require discretion in their work when conducting surveillance, but also need to be able to communicate with their partners on tactical radios on foot, in cars, on boats or in planes. Talking on a cell phone is much more discrete than a police radio. Additionally, the power emitted from a cell phone is within the same range of all other commercial users and, thus, indiscernible as law enforcement. Finally, LMR systems typically are not designed for in-building coverage. Cellular networks provide superior in-building coverage. LMR systems are required for their security, reliability and availability during crisis management or other tactical use. Private Public Safety broadband networks may eventually provide the same level of security, reliability and availability, but their coverage will never equal that of commercial networks. Interoperability between these networks is paramount to achieve the most effective communication for law enforcement and first responders. Several configuration options are available to achieve this interoperability. General Dynamics C4 Systems is uniquely qualified to develop and integrate secure communication and information systems and technology. The company specializes in command and control, communications networking, computing and information assurance for defense, government and select commercial customers in the United States and abroad. 14

Acronyms Acronym Meaning AES Advanced Encryption Standard CBP Customs and Border Protection CDMA Code Division Multiple Access Refers to cellular systems offered by Verizon E&M Ear and Mouth FBI Federal Bureau of Investigation FCC Federal Communications Commission G.711 64 kbps voice encoding scheme G.729 16 kbps voice encoding scheme GD General Dynamics IMBE Improved Multiband Excitation IP Internet Protocol IPSEC Internet Protocol Security ISSI P25 Inter-RF Subsystem Interface (ISSI). See reference [2] LMR Land Mobile Radio LTE Long Term Evolution MHz Megahertz OFDMA Orthogonal Frequency-Division Multiple Access OTAR Over the air rekeying PTT Push-To-Talk Over Cellular. Standard for cellular PTT operation over digital channels. See reference [3] below PSTN Public Switched Telephone Network RF Radio Frequency. Refers to a communication medium physical layer that modulates electromagnetic waves RTP Real Time Protocol SIP Session Initiation Protocol. An open extensible messaging protocol for managing sessions TD-CDMA Time Division-Code Division Multiple Access TG Talkgroup UDP Unit Datagram Protocol. An IP packet with ports and non-guaranteed delivery UHF Ultra High Frequency VHF Very High Frequency VoIP Voice over Internet Protocol 15

Definitions Term 4G CrossComm Full Duplex Half Duplex Floor Control Push-to-Talk Definition Fourth Generation of cellular wireless standards A conferencing system from General Dynamics that provides custom interoperability features specifically applicable to mobile broadband and LMR. This product requires development. CrossComm is a registered trademark of General Dynamics. A form of communications where multiple parties in a conversation can speak simultaneously. A form of communications where only one party in a conversation can speak any given time. Floor control in the context of PTT voice groups is an arbitration mechanism that grants temporary permission to group participants in order to guarantee that when one talks the others listen. A two way communications method that uses the Half Duplex mode of operation. To use PTT, users must press a button on the PTT device while speaking, then release it when done. The listener must then do the same to respond. Reference Documents [1] 99-P56480P, General Dynamics IWN Interoperability Architecture White Paper [2] TIA-102.BACA-A Project 25 Inter-SubSystem Interface [3] OMA-WID_0043-PoC-V1_0_2-20031010-A OMA Push-to-Talk over Cellular Specification 16

www.gdc4s.com/homeland For more information on how General Dynamics can help you with your Public Safety or Homeland Security system please contact Don Wilt of General Dynamics at don.wilt@gdc4s.com. 2011 General Dynamics. All Rights Reserved. W-SecureCellular-1-0111