Research Article

Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

Table 5

Numbers and examples of security threats in each category.

CategoryLabelCountThreat example

UE1.135Device level information disclosure of type 1 UE; external data network connection of type 1 UE and the following threats
1.27Sending malicious attachments from type 2 to type 1 UE; other device connections to linked IP network through type 2 UE
1.36Network level information disclosure of type 1 UE and the following spoofing threats
eNodeB2.111External network connection of type 1 UE and the following information disclosure, denial of service, and elevation of privilege threats
EPC3.115Accessing the HSSA and the IP network by protocol not specified in standards; information disclosure of user plane data
IP network4.17VPN client identification spoofing; encrypted user plane data replay
4.29Denial of service and elevation of privilege of the services running on web server
Total number90

All categories and labels are matched with those in Section 6.3. We leave out to list all threats due to the security policy.