Research Article
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment
Table 5
Numbers and examples of security threats in each category.
| Category | Label | Count | Threat example |
| UE | 1.1 | 35 | Device level information disclosure of type 1 UE; external data network connection of type 1 UE and the following threats | 1.2 | 7 | Sending malicious attachments from type 2 to type 1 UE; other device connections to linked IP network through type 2 UE | 1.3 | 6 | Network level information disclosure of type 1 UE and the following spoofing threats | eNodeB | 2.1 | 11 | External network connection of type 1 UE and the following information disclosure, denial of service, and elevation of privilege threats | EPC | 3.1 | 15 | Accessing the HSSA and the IP network by protocol not specified in standards; information disclosure of user plane data | IP network | 4.1 | 7 | VPN client identification spoofing; encrypted user plane data replay | 4.2 | 9 | Denial of service and elevation of privilege of the services running on web server | Total number | 90 |
|
|
All categories and labels are matched with those in Section 6.3. We leave out to list all threats due to the security policy. |