2015 10th International Conference on Availability, Reliability and Security 2015
DOI: 10.1109/ares.2015.65
|View full text |Cite
|
Sign up to set email alerts
|

Risk Assessment of Public Safety and Security Mobile Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(11 citation statements)
references
References 114 publications
(148 reference statements)
0
11
0
Order By: Relevance
“…Network availability depends on network technical capability, on the used applications within the network and on the number of users, which may overload the network. But many other issues can also influence the availability, such as cyberattacks, unreliable ownership, unsecured physical location, poor network coverage, unreliable or incapable personnel (Peltola and Kekolahti, 2015).…”
Section: Targets and Statistics Of Network Availabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Network availability depends on network technical capability, on the used applications within the network and on the number of users, which may overload the network. But many other issues can also influence the availability, such as cyberattacks, unreliable ownership, unsecured physical location, poor network coverage, unreliable or incapable personnel (Peltola and Kekolahti, 2015).…”
Section: Targets and Statistics Of Network Availabilitiesmentioning
confidence: 99%
“…If commercial networks are utilised for the deployment of mobile BB for PPDR users, both the financing and radio spectrum issues will be more easily resolved. The commercial networks fulfil functionality (3GPP, 2013), security (end-to-end encryption), resilience requirements (multiple alternative networks) and communication performance issues (high bitrates and wide coverage), but the question has been raised whether commercial networks can fulfil the availability requirements of the authorities (Swan and Taylor, 2003;TCCA, 2012;Peltola and Kekolahti, 2015). The priority functionality has been developed for LTE technology (3GPP, 2016) to enable prioritised communication for certain user groups -if needed and allowed by regulators and operators.…”
Section: Introductionmentioning
confidence: 99%
“…Peltola and Kekolahti [30] use Bayesian networks and expert knowledge to perform a risk assessment of the Finnish TETRA PSS network, where several risk sources and controls affect the availability of the network. Bayesian networks have been also used in several research papers to model interdependent information security vulnerabilities as attack scenarios [13][14][15]17].…”
Section: Bayesian Networkmentioning
confidence: 99%
“…Studies have already been done to demonstrate, which functionalities are needed to improve the performance of the PSE agencies (Borgonjen, 2012). Studies have also been conducted to understand the best roadmap to implement high speed mobile data communication for PSE (Peltola, 2011).…”
Section: Introductionmentioning
confidence: 99%
“…the networks already exist and the coverage is excellent. Nevertheless, the commercial mobile networks seem to have some fundamental problems if these networks are to be used for PSE mobile communication (Peltola, 2011), one of the most critical problems being that the networks become jammed in disaster situations (Swan & Taylor, 2003). For this reason, it has been concluded that the utilization of the commercial mobile networks as a media for PSE mobile communication is possible for non-critical communication.…”
Section: Introductionmentioning
confidence: 99%