Project MESA
   HOME

TheInfoList



OR:

Project 25 (P25 or APCO-25) is a suite of
standards Standard may refer to: Symbols * Colours, standards and guidons, kinds of military signs * Standard (emblem), a type of a large symbol or emblem used for identification Norms, conventions or requirements * Standard (metrology), an object th ...
for
interoperable Interoperability is a characteristic of a product or system to work with other products or systems. While the term was initially defined for information technology or systems engineering services to allow for information exchange, a broader defi ...
digital Digital usually refers to something using discrete digits, often binary digits. Technology and computing Hardware *Digital electronics, electronic circuits which operate using digital signals **Digital camera, which captures and stores digital i ...
two-way radio A two-way radio is a radio that can both transmit and receive radio waves (a transceiver), unlike a broadcast receiver which only receives content. It is an audio (sound) transceiver, a transmitter and receiver in one unit, used for bidirecti ...
products. P25 was developed by
public safety Public security or public safety is the prevention of and protection from events that could endanger the safety and security of the public from significant danger, injury, or property damage. It is often conducted by a state government to ensure ...
professionals in
North America North America is a continent in the Northern Hemisphere and almost entirely within the Western Hemisphere. It is bordered to the north by the Arctic Ocean, to the east by the Atlantic Ocean, to the southeast by South America and the Car ...
and has gained acceptance for public safety, security, public service, and commercial applications worldwide. P25 radios are a direct replacement for analog
UHF Ultra high frequency (UHF) is the ITU designation for radio frequencies in the range between 300 megahertz (MHz) and 3 gigahertz (GHz), also known as the decimetre band as the wavelengths range from one meter to one tenth of a meter (on ...
(typically FM) radios, but add the ability to transfer data as well as voice, allowing for more natural implementations of
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
and
text messaging Text messaging, or texting, is the act of composing and sending electronic messages, typically consisting of alphabetic and numeric characters, between two or more users of mobile devices, desktops/laptops, or another type of compatible compute ...
. P25 radios are commonly implemented by dispatch organizations, such as
police The police are a constituted body of persons empowered by a state, with the aim to enforce the law, to ensure the safety, health and possessions of citizens, and to prevent crime and civil disorder. Their lawful powers include arrest and t ...
,
fire Fire is the rapid oxidation of a material (the fuel) in the exothermic chemical process of combustion, releasing heat, light, and various reaction Product (chemistry), products. At a certain point in the combustion reaction, called the ignition ...
,
ambulance An ambulance is a medically equipped vehicle which transports patients to treatment facilities, such as hospitals. Typically, out-of-hospital medical care is provided to the patient during the transport. Ambulances are used to respond to medi ...
and emergency rescue service, using vehicle-mounted radios combined with
repeaters ''Repeaters'' is a 2010 Canadian thriller film directed by Carl Bessai, written by Arne Olsen, and starring Dustin Milligan, Amanda Crew, and Richard de Klerk as young drug addicts who find themselves stuck in a time loop. Plot Kyle, Sonia, and ...
and handheld
walkie-talkie A walkie-talkie, more formally known as a handheld transceiver (HT), is a hand-held, portable, two-way radio transceiver. Its development during the Second World War has been variously credited to Donald Hings, radio engineer Alfred J. Gross, ...
use. Starting around 2012, products became available with the newer phase 2
modulation In electronics and telecommunications, modulation is the process of varying one or more properties of a periodic waveform, called the ''carrier signal'', with a separate signal called the ''modulation signal'' that typically contains informatio ...
protocol, the older protocol known as P25 became P25 phase 1. P25 phase 2 products use the more advanced AMBE2+ vocoder, which allows audio to pass through a more compressed
bitstream A bitstream (or bit stream), also known as binary sequence, is a sequence of bits. A bytestream is a sequence of bytes. Typically, each byte is an 8-bit quantity, and so the term octet stream is sometimes used interchangeably. An octet may ...
and provides two TDMA voice channels in the same RF bandwidth (12.5 kHz), while phase 1 can provide only one voice channel. The two protocols are not compatible. However, P25 Phase 2 infrastructure can provide a "dynamic transcoder" feature that translates between Phase 1 and Phase 2 as needed. In addition to this, phase 2 radios are backwards compatible with phase 1 modulation and analog FM modulation, per the standard. The
European Union The European Union (EU) is a supranational political and economic union of member states that are located primarily in Europe. The union has a total area of and an estimated total population of about 447million. The EU has often been des ...
has created the
Terrestrial Trunked Radio Terrestrial Trunked Radio (TETRA; formerly known as Trans-European Trunked Radio), a European standard for a trunked radio system, is a professional mobile radio and two-way transceiver specification. TETRA was specifically designed for use by go ...
(TETRA) and
Digital mobile radio Digital mobile radio (DMR) is a specification for commercial products so they can interoperate. It is defined by a standard created by the European Telecommunications Standards Institute (ETSI), and is designed to be low-cost and easy to use. DMR, ...
(DMR) protocol standards, which fill a similar role to Project 25.


Suite of standards overview


History

Public safety radios have been upgraded from
analog Analog or analogue may refer to: Computing and electronics * Analog signal, in which information is encoded in a continuous variable ** Analog device, an apparatus that operates on analog signals *** Analog electronics, circuits which use analog ...
FM to
digital Digital usually refers to something using discrete digits, often binary digits. Technology and computing Hardware *Digital electronics, electronic circuits which operate using digital signals **Digital camera, which captures and stores digital i ...
since the 1990s because of an increased use of data on radio systems for such features as GPS location,
trunking In telecommunications, trunking is a technology for providing network access to multiple clients simultaneously by sharing a set of circuits, carriers, channels, or frequencies, instead of providing individual circuits or channels for each clie ...
, text messaging, metering, and encryption. Various user protocols and different
public safety Public security or public safety is the prevention of and protection from events that could endanger the safety and security of the public from significant danger, injury, or property damage. It is often conducted by a state government to ensure ...
radio spectrum The radio spectrum is the part of the electromagnetic spectrum with frequencies from 0  Hz to 3,000 GHz (3  THz). Electromagnetic waves in this frequency range, called radio waves, are widely used in modern technology, particula ...
made it difficult for Public Safety agencies to achieve interoperability and widespread acceptance. However, lessons learned during disasters the United States faced in the past decades have forced agencies to assess their requirements during a disaster when basic infrastructure has failed. To meet the growing demands of public safety digital radio communication, the United States
Federal Communications Commission The Federal Communications Commission (FCC) is an independent agency of the United States federal government that regulates communications by radio, television, wire, satellite, and cable across the United States. The FCC maintains jurisdiction ...
(FCC) at the direction of the
United States Congress The United States Congress is the legislature of the federal government of the United States. It is bicameral, composed of a lower body, the House of Representatives, and an upper body, the Senate. It meets in the U.S. Capitol in Washing ...
initiated a 1988 inquiry for recommendations from users and manufacturers to improve existing communication systems. Based on the recommendations, to find solutions that best serve the needs of public safety management, in October 1989 APCO Project 25 came into existence in a coalition with: *
Association of Public-Safety Communications Officials-International Association of Public-Safety Communications Officials (APCO) International was founded in 1935. It is the world’s oldest and largest organization of public safety communications professionals and supports the largest U.S. membership base of an ...
(APCO) * National Association of State Telecommunications Directors (NASTD) *
National Telecommunications and Information Administration The National Telecommunications and Information Administration (NTIA) is an agency of the United States Department of Commerce that serves as the President's principal adviser on telecommunications policies pertaining to the United States' ec ...
(NTIA) *
National Communications System The National Communications System (NCS) was an office within the United States Department of Homeland Security charged with enabling national security and emergency preparedness communications ( NS/EP telecommunications) using the national teleco ...
(NCS) *
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
(NSA) *
Department of Defense Department of Defence or Department of Defense may refer to: Current departments of defence * Department of Defence (Australia) * Department of National Defence (Canada) * Department of Defence (Ireland) * Department of National Defense (Philippin ...
(DoD) A steering committee consisting of representatives from the above-mentioned agencies along with FPIC (
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terr ...
Federal Partnership for Interoperable Communication),
Coast Guard A coast guard or coastguard is a maritime security organization of a particular country. The term embraces wide range of responsibilities in different countries, from being a heavily armed military force with customs and security duties to ...
and the
Department of Commerce The United States Department of Commerce is an executive department of the U.S. federal government concerned with creating the conditions for economic growth and opportunity. Among its tasks are gathering economic and demographic data for bu ...
's
National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical sci ...
(NIST), Office of Law Enforcement Standards was established to decide the priorities and scope of technical development of P25.


Introduction

Interoperable emergency communication is integral to initial response, public health, community safety, national security and economic stability. Of all the problems experienced during disaster events, one of the most serious is poor communication due to lack of appropriate and efficient means to collect, process, and transmit important information in a timely fashion. In some cases, radio communication systems are incompatible and inoperable not just within a jurisdiction but within departments or agencies in the same community. Non-operability occurs due to use of outdated equipment, limited availability of radio frequencies, isolated or independent planning, lack of coordination, and cooperation, between agencies, community priorities competing for resources, funding and ownership, and control of communications systems. Recognizing and understanding this need, Project 25 (P25) was initiated collaboratively by public safety agencies and manufacturers to address the issue with
emergency communication system An emergency communication system (ECS) is any system (typically computer-based) that is organized for the primary purpose of supporting one-way and two-way communication of emergency information between both individuals and groups of individuals. ...
s. P25 is a collaborative project to ensure that
two-way radio A two-way radio is a radio that can both transmit and receive radio waves (a transceiver), unlike a broadcast receiver which only receives content. It is an audio (sound) transceiver, a transmitter and receiver in one unit, used for bidirecti ...
s are interoperable. The goal of P25 is to enable public safety responders to communicate with each other and, thus, achieve enhanced coordination, timely response, and efficient and effective use of communications equipment. P25 was established to address the need for common digital public safety radio communications standards for first-responders and homeland security/emergency response professionals. The
Telecommunications Industry Association The Telecommunications Industry Association (TIA) is accredited by the American National Standards Institute (ANSI) to develop voluntary, consensus-based industry standards for a wide variety of Information and Communication Technologies (Inform ...
'
TR-8
engineering committee facilitates such work through its role as an ANSI-accredited
standards development organization A standards organization, standards body, standards developing organization (SDO), or standards setting organization (SSO) is an organization whose primary function is developing, coordinating, promulgating, revising, amending, reissuing, interpr ...
(SDO) and has published the P25 suite of standards as the TIA-102 series of documents, which now include 49 separate parts on Land Mobile Radio and TDMA implementations of the technology for public safety. P25-compliant systems are being increasingly adopted and deployed. Radios can communicate in
analog Analog or analogue may refer to: Computing and electronics * Analog signal, in which information is encoded in a continuous variable ** Analog device, an apparatus that operates on analog signals *** Analog electronics, circuits which use analog ...
mode with legacy radios, and in either
digital Digital usually refers to something using discrete digits, often binary digits. Technology and computing Hardware *Digital electronics, electronic circuits which operate using digital signals **Digital camera, which captures and stores digital i ...
or analog mode with other P25 radios. Additionally, the deployment of P25-compliant systems will allow for a high degree of equipment interoperability and compatibility. P25 standards use the proprietary Improved Multi-Band Excitation (IMBE) and Advanced Multi-Band Excitation (AMBE+2) voice codecs which were designed by Digital Voice Systems, Inc. to encode/decode the analog audio signals. It is rumored that the licensing cost for the voice-codecs that are used in P25 standard devices is the main reason that the cost of P25 compatible devices is so high. P25 may be used in "talk around" mode without any intervening equipment between two radios, in conventional mode where two radios communicate through a repeater or base station without trunking or in a trunked mode where traffic is automatically assigned to one or more voice channels by a
Repeater In telecommunications, a repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to extend transmissions so that the signal can cover longer distances or be received on the other side of an obstruction. Some ...
or Base Station. The protocol supports the use of
Data Encryption Standard The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cry ...
(DES) encryption (56 bit), 2-key
Triple-DES In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a Symmetric-key algorithm, symmetric-key block cipher, which applies the Data Encryption Standard, DES cipher algorithm three ti ...
encryption, three-key
Triple-DES In cryptography, Triple DES (3DES or TDES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a Symmetric-key algorithm, symmetric-key block cipher, which applies the Data Encryption Standard, DES cipher algorithm three ti ...
encryption,
Advanced Encryption Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant ...
(AES) encryption at up to 256 bits keylength,
RC4 In cryptography, RC4 (Rivest Cipher 4, also known as ARC4 or ARCFOUR, meaning Alleged RC4, see below) is a stream cipher. While it is remarkable for its simplicity and speed in software, multiple vulnerabilities have been discovered in RC4, ren ...
( 40 bits, sold by Motorola as ''Advanced Digital Privacy''), or no encryption. The protocol also supports the ACCORDION 1.3,
BATON Baton may refer to: Stick-like objects *Baton, a type of club *Baton (law enforcement) *Baston (weapon), a type of baton used in Arnis and Filipino Martial Arts *Baton charge, a coordinated tactic for dispersing crowds of people *Baton (conductin ...
,
Firefly The Lampyridae are a family of elateroid beetles with more than 2,000 described species, many of which are light-emitting. They are soft-bodied beetles commonly called fireflies, lightning bugs, or glowworms for their conspicuous production ...
, MAYFLY and
SAVILLE SAVILLE is a classified NSA Type 1 encryption algorithm, developed in the late 1960s, jointly by the Government Communications Headquarters (GCHQ) in the UK and the National Security Agency (NSA) in the US. It is used broadly, often for voice e ...
Type 1 ciphers.


P25 open interfaces

P25's Suite of Standards specify eight open interfaces between the various components of a land mobile radio system. These interfaces are: * Common Air Interface (CAI) – standard specifies the type and content of signals transmitted by compliant radios. One radio using CAI should be able to communicate with any other CAI radio, regardless of manufacturer * Subscriber Data Peripheral Interface – standard specifies the port through which mobiles and portables can connect to laptops or data networks * Fixed Station Interface – standard specifies a set of mandatory messages supporting digital voice, data, encryption and telephone interconnect necessary for communication between a Fixed Station and P25 RF Subsystem * Console Subsystem Interface – standard specifies the basic messaging to interface a console subsystem to a P25 RF Subsystem * Network Management Interface – standard specifies a single network management scheme which will allow all network elements of the RF subsystem to be managed * Data Network Interface – standard specifies the RF Subsystem's connections to computers, data networks, or external data sources * Telephone Interconnect Interface – standard specifies the interface to Public Switched Telephone Network (PSTN) supporting both analog and ISDN telephone interfaces. * Inter RF Subsystem Interface (
ISSI ''Issi'' (meaning "cold" in Greenlandic) is a plateosaurid dinosaur described in 2021 from the Late Triassic Fleming Fjord Formation of Greenland. It contains one species, ''Issi saaneq''; the full binomial name means "cold bones". Fossils of ...
) – standard specifies the interface between RF subsystems which will allow them to be connected into wide area networks


P25 phases

P25-compliant technology has been deployed over two main phases with future phases yet to be finalized.


Phase 1

Phase 1 radio systems operate in 12.5 kHz digital mode using a single user per channel access method. Phase 1 radios use Continuous 4 level FM (C4FM) modulation—a special type of 4
FSK FSK may refer to: * FSK (band), a German band * Federal Counterintelligence Service, (Russian ') of Russia * Fiskerton railway station, in England * Forskolin, a diterpene * Forsvarets Spesialkommando, a Norwegian special forces unit * Fort Scott M ...
modulation—for digital transmissions at 4,800
baud In telecommunication and electronics, baud (; symbol: Bd) is a common unit of measurement of symbol rate, which is one of the components that determine the speed of communication over a data channel. It is the unit for symbol rate or modulatio ...
and 2
bit The bit is the most basic unit of information in computing and digital communications. The name is a portmanteau of binary digit. The bit represents a logical state with one of two possible values. These values are most commonly represente ...
s per symbol, yielding 9,600 bits per second total channel throughput. Of this 9,600, 4,400 is voice data generated by the
IMBE Imbe may refer to: * Imbe (tree), a fruit tree native to Africa * Imbe, Okayama, a township in Japan ** Imbe Station is a railway station in Imbe, Bizen, Okayama Prefecture, Japan. Lines *West Japan Railway Company ** Akō Line Layout *Ka ...
codec, 2,800 is forward error correction, and 2,400 is signalling and other control functions. Receivers designed for the C4FM standard can also demodulate the "Compatible quadrature
phase shift keying Phase-shift keying (PSK) is a digital modulation process which conveys data by changing (modulating) the phase of a constant frequency reference signal (the carrier wave). The modulation is accomplished by varying the sine and cosine inputs at ...
" (CQPSK) standard, as the parameters of the CQPSK signal were chosen to yield the same signal deviation at symbol time as C4FM. Phase 1 uses the
IMBE Imbe may refer to: * Imbe (tree), a fruit tree native to Africa * Imbe, Okayama, a township in Japan ** Imbe Station is a railway station in Imbe, Bizen, Okayama Prefecture, Japan. Lines *West Japan Railway Company ** Akō Line Layout *Ka ...
voice codec. These systems involve standardized service and facility specifications, ensuring that any manufacturers' compliant subscriber radio has access to the services described in such specifications. Abilities include
backward compatibility Backward compatibility (sometimes known as backwards compatibility) is a property of an operating system, product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system, especially i ...
and interoperability with other systems, across system boundaries, and regardless of system infrastructure. In addition, the P25 suite of standards provides an open interface to the radio frequency (RF) subsystem to facilitate interlinking of different vendors' systems.


Phase 2

To improve spectrum use, P25 Phase 2 was developed for trunking systems using a 2-slot TDMA scheme and is now required for all new trunking systems in the 700 MHz band. Phase 2 uses the
AMBE+2 An ambe, in anatomy, is a superficial jutting out of a bone. Ambe is also the name of an old surgical instrument, made famous by Hippocrates, for reducing dislocations of the shoulder, so called because its extremity projects like the prominence o ...
voice codec to reduce the needed bitrate so that one voice channel will only require 6,000 bits per second (including error correction and signalling). Phase 2 is not backwards compatible with Phase 1 (due to the TDMA operation), although multi-mode TDMA radios and systems are capable of operating in Phase 1 mode when required, if enabled. A subscriber radio cannot use TDMA transmission without a synchronization source; therefore direct radio to radio communication resorts to conventional FDMA digital operation. Multi-band subscriber radios can also operate on narrow-band FM as a lowest common denominator between almost any two way radios. This makes analog narrow-band FM the de facto "interoperability" mode for some time. Originally the implementation of Phase 2 was planned to split the 12.5 kHz channel into two 6.25 kHz slots, or Frequency-Division Multiple Access (FDMA). However it proved more advantageous to use existing 12.5 kHz frequency allocations in Time Division Multiple Access (TDMA) mode for a number of reasons. It allowed subscriber radios to save battery life by only transmitting half the time which also yields the ability for the subscriber radio to listen and respond to system requests between transmissions. Phase 2 is what is known as 6.25 kHz "bandwidth equivalent" which satisfies an FCC requirement for voice transmissions to occupy less bandwidth. Voice traffic on a Phase 2 system transmits with the full 12.5 kHz per frequency allocation, as a Phase 1 system does, however it does so at a faster data rate of 12 kbit/s allowing two simultaneous voice transmissions. As such subscriber radios also transmit with the full 12.5 kHz, but in an on/off repeating fashion resulting in half the transmission and thus an equivalent of 6.25 kHz per each radio. This is accomplished using the AMBE voice coder that uses half the rate of the Phase 1 IMBE voice coders.


Beyond Phase 2

From 2000 to 2009, the
European Telecommunications Standards Institute The European Telecommunications Standards Institute (ETSI) is an independent, not-for-profit, standardization organization in the field of Information and communications technology, information and communications. ETSI supports the developmen ...
(ETSI) and TIA were working collaboratively on the Public Safety Partnership Project or Project MESA (Mobility for Emergency and Safety Applications), which sought to define a unified set of requirements for a next-generation aeronautical and terrestrial digital wideband/broadband radio standard that could be used to transmit and receive voice, video, and high-speed data in wide-area, multiple-agency networks deployed by public safety agencies.Advanced Mobile Broadband For Public Protection & Disaster Relief Professionals
David Thompson. Telecommunications Industry Association
Project MESA: Broadband Telecommunications for PPDR
David Thompson. Telecommunications Industry Association
The final functional and technical requirements have been released by ETSI and were expected to shape the next phases of American Project 25 and European DMR, dPMR, and TETRA, but no interest from the industry followed, since the requirements could not be met by available commercial off-the-shelf technology, and the project was closed in 2010. During the
United States 2008 wireless spectrum auction The United States 700 MHz FCC wireless spectrum auction, officially known as Auction 73, was started by the Federal Communications Commission (FCC) on January 24, 2008 for the rights to operate the 700 MHz radio frequency band in the Unit ...
, the FCC allocated 20 MHz of the 700 MHz
UHF Ultra high frequency (UHF) is the ITU designation for radio frequencies in the range between 300 megahertz (MHz) and 3 gigahertz (GHz), also known as the decimetre band as the wavelengths range from one meter to one tenth of a meter (on ...
radio band spectrum freed in the digital TV transition to public safety networks. The FCC expects providers to employ LTE for high-speed data and video applications.


Conventional implementation

P25 systems do not have to resort to using in band signaling such as
Continuous Tone-Coded Squelch System In telecommunications, Continuous Tone-Coded Squelch System or CTCSS is one type of in-band signaling that is used to reduce the annoyance of listening to other users on a shared two-way radio communication channel. (See squelch.) It is sometimes ...
(CTCSS) tone or
Digital-Coded Squelch In telecommunications, squelch is a circuit function that acts to suppress the audio (or video) output of a receiver in the absence of a strong input signal. Essentially, squelch is a specialized type of noise gate designed to suppress weak s ...
(DCS) codes for access control. Instead they use what is called a Network Access Code (NAC) which is included outside of the digital voice frame. This is a 12-bit code that prefixes every packet of data sent, including those carrying voice transmissions. The NAC is a feature similar to CTCSS or DCS for analog radios. That is, radios can be programmed to only pass audio when receiving the correct NAC. NACs are programmed as a three-hexadecimal-digit code that is transmitted along with the digital signal being transmitted. Since the NAC is a three-hexadecimal-digit number (12 bits), there are 4,096 possible NACs for programming, far more than all analog methods combined. Three of the possible NACs have special functions: * 0x293 ($293) – the default NAC * 0xf7e ($F7E) – a receiver set for this NAC will pass audio on any decoded signal received * 0xf7f ($F7F) – a repeater receiver set for this NAC will allow all incoming decoded signals and the repeater transmitter will retransmit the received NAC.


Adoption

Adoption of these standards has been slowed by budget problems in the US; however, funding for communications upgrades from the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terr ...
usually requires migrating to Project 25. It is also being used in other countries worldwide including Australia, New Zealand, Brazil, Canada, India and Russia.Is this finally P25's year?
Interview with Don Pfohl of Project 25 and Bill Belt of Telecommunications Industry Association's wireless division, 1. May 2005
As of mid-2004 there were 660 networks with P25 deployed in 54 countries. At the same time, in 2005, the European
Terrestrial Trunked Radio Terrestrial Trunked Radio (TETRA; formerly known as Trans-European Trunked Radio), a European standard for a trunked radio system, is a professional mobile radio and two-way transceiver specification. TETRA was specifically designed for use by go ...
(TETRA) was deployed in sixty countries, and it is the preferred choice in Europe, China, and other countries. This was largely based on TETRA systems being many times cheaper than P25 systems ($900 vs $6,000 for a radio) at the time. However P25 radio prices are rapidly approaching parity with TETRA radio prices through increased competition in the P25 market. The majority of P25 networks are based in Northern America where it has the advantage that a P25 system has the same coverage and frequency bandwidth as the earlier analog systems that were in use so that channels can be easily upgraded one by one. Some P25 networks also allow intelligent migration from the analog radios to digital radios operating within the same network. Both P25 and TETRA can offer varying degrees of functionality, depending on available radio spectrum, terrain and project budget. While interoperability is a major goal of P25, many P25 features present interoperability challenges. In theory, all P25 compliant equipment is interoperable. In practice, interoperable communications isn't achievable without effective governance, standardized operating procedures, effective training and exercises, and inter-jurisdictional coordination. The difficulties inherent in developing P25 networks using features such as digital voice, encryption, or trunking sometimes result in feature-backlash and organizational retreat to minimal "feature-free" P25 implementations which fulfill the letter of any Project 25 migration requirement without realizing the benefits thereof. Additionally, while not a technical issue per se, frictions often result from the unwieldy bureaucratic inter-agency processes that tend to develop in order to coordinate interoperability decisions.


Naming of P25 technology in regions

* In Australia, P25 Technology was deployed to the public safety officers by the name of GRN (Government radio networks) (in NSW, South Australia, Tasmania), GWN (Government wireless networks) (in QLD). Melbourne Metropolitan Radio (MMR) and Rural Mobile Radio (RMR) (in Victorian Government Radio Networks)


Project 25 Compliance Assessment Program (P25 CAP)

The United States
DHS The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terr ...
's Project 25 Compliance Assessment Program (P25 CAP) aims for interoperability among different vendors by testing to P25 Standards. P25 CAP, a voluntary program, allows suppliers to publicly attest to their products' compliance. Independent, accredited labs test vendor's P25 radios for compliance to P25 Standards, derived from
TIA-102 The TIA-102 series of documents delineate an American National Standard. The papers describe and define tests and test methodologies that can be used by land mobile radio systems (LMR) equipment developers and others to assess implementations of t ...
Standards and following TIA-TR8 testing procedures. Only approved products may be purchased using US federal grant dollars. Generally, non-approved products should not be trusted to be meet P25 standards for performance, conformance, and interoperability. P25 product labeling varies. "P25" and "P25 compliant" mean nothing while high standards apply for a vendor to claim a product is "P25 CAP compliant" or "P25 compliant with the Statement of Requirements (P25 SOR)"


Security flaws


OP25 Project—Encryption flaws in DES-OFB and ADP ciphers

At the Securecomm 2011 conference in London, security researcher Steve Glass presented a paper, written by himself and co-author Matt Ames, that explained how DES-OFB and Motorola's proprietary ADP (RC4 based) ciphers were vulnerable to brute force key recovery. This research was the result of the OP25 project which uses
GNU Radio GNU Radio is a free software development toolkit that provides signal processing blocks to implement software-defined radios and signal processing, signal-processing systems. It can be used with external Radio frequency, RF hardware to create soft ...
and the Ettus
Universal Software Radio Peripheral Universal Software Radio Peripheral (USRP) is a range of software-defined radios designed and sold by Ettus Research and its parent company, National Instruments. Developed by a team led by Matt Ettus, the USRP product family is commonly used ...
(USRP) to implement an open source P25
packet sniffer A packet analyzer, also known as packet sniffer, protocol analyzer, or network analyzer, is a computer program or computer hardware such as a packet capture appliance, that can intercept and log traffic that passes over a computer network or p ...
and analyzer. The OP25 project was founded by Steve Glass in early 2008 while he was performing research into wireless networks as part of his PhD thesis. The paper is available for download from the
NICTA NICTA (formerly named National ICT Australia Ltd) was Australia's Information and Communications Technology (ICT) Research Centre of Excellence and is now known as CSIRO's Data61. The term "Centre of Excellence" is common marketing terminology u ...
website.


University of Pennsylvania research

In 2011, the ''
Wall Street Journal ''The Wall Street Journal'' is an American business-focused, international daily newspaper based in New York City, with international editions also available in Chinese and Japanese. The ''Journal'', along with its Asian editions, is published ...
'' published an article describing research into security flaws of the system, including a user interface that makes it difficult for users to recognize when transceivers are operating in secure mode. According to the article, "(R)esearchers from the
University of Pennsylvania The University of Pennsylvania (also known as Penn or UPenn) is a private research university in Philadelphia. It is the fourth-oldest institution of higher education in the United States and is ranked among the highest-regarded universitie ...
overheard conversations that included descriptions of undercover agents and confidential informants, plans for forthcoming arrests and information on the technology used in surveillance operations." The researchers found that the messages sent over the radios are sent in segments, and blocking just a portion of these segments can result in the entire message being jammed. "Their research also shows that the radios can be effectively jammed (single radio, short range) using a highly modified pink electronic child’s toy and that the standard used by the radios 'provides a convenient means for an attacker' to continuously track the location of a radio’s user. With other systems, jammers have to expend a lot of power to block communications, but the P25 radios allow jamming at relatively low power, enabling the researchers to prevent reception using a $30 toy pager designed for pre-teens." The report was presented at the 20th USENIX Security Symposium in
San Francisco San Francisco (; Spanish language, Spanish for "Francis of Assisi, Saint Francis"), officially the City and County of San Francisco, is the commercial, financial, and cultural center of Northern California. The city proper is the List of Ca ...
in August 2011."Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio system,"
S. Clark, T. Goodspeed, P. Metzger, Z. Wasserman, K. Xu, M. Blaze, Proceedings of the 20th Usenix Security Symposium, 2011
The report noted a number of security flaws in the Project 25 system, some specific to the way it has been implemented and some inherent in the security design.


Encryption lapses

The report did not find any breaks in the P25 encryption; however, they observed large amounts of sensitive traffic being sent in the clear due to implementations problems. They found switch markings for secure and clear modes difficult to distinguish (∅ vs. o). This is exacerbated by the fact that P25 radios when set to secure mode continue to operate without issuing a warning if another party switches to clear mode. In addition, the report authors said many P25 systems change keys too often, increasing the risk that an individual radio on a net may not be properly keyed, forcing all users on the net to transmit in the clear to maintain communications with that radio.


Jamming vulnerability

One design choice was to use lower levels of error correction for portions of the encoded voice data that are deemed less critical for intelligibility. As a result, bit errors may be expected in typical transmissions, and while harmless for voice communication, the presence of such errors force the use of
stream cipher stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream ...
s, which can tolerate bit errors, and prevents the use of a standard technique,
message authentication code In cryptography, a message authentication code (MAC), sometimes known as a ''tag'', is a short piece of information used for authenticating a message. In other words, to confirm that the message came from the stated sender (its authenticity) and ...
s (MACs), to protect message integrity from
stream cipher attack Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation ( xor), can be very secure if used properly. However, they are vulnerable to attacks if certain precautions are not followed: *keys must neve ...
s. The varying levels of error correction are implemented by breaking P25 message frames into subframes. This allows an attacker to jam entire messages by transmitting only during certain short subframes that are critical to reception of the entire frame. As a result, an attacker can effectively jam Project 25 signals with average power levels much lower that the power levels used for communication. Such attacks can be targeted at encrypted transmissions only, forcing users to transmit in the clear. Because Project 25 radios are designed to work in existing two-way radio frequency channels, they cannot use
spread spectrum In telecommunication and radio communication, spread-spectrum techniques are methods by which a signal (e.g., an electrical, electromagnetic, or acoustic signal) generated with a particular bandwidth is deliberately spread in the frequency dom ...
modulation, which is inherently jam-resistant. An optimal spread spectrum system can require an effective jammer to use 1,000 times as much power (30 dB more) as the individual communicators. According to the report, a P25 jammer could effectively operate at 1/25th the power (14 dB less) than the communicating radios. The authors developed a proof-of-concept jammer using a Texas Instruments CC1110 single chip radio, found in an inexpensive toy.


Traffic analysis and active tracking

Certain metadata fields in the Project 25 protocol are not encrypted, allowing an attacker to perform
traffic analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, it can be performed even when the messages are encrypted. In general, the greater the number of messages observed ...
to identify users. Because Project 25 radios respond to bad data packets addressed to them with a retransmission request, an attacker can deliberately send bad packets forcing a specific radio to transmit even if the user is attempting to maintain
radio silence In telecommunications, radio silence or Emissions Control (EMCON) is a status in which all fixed or mobile radio stations in an area are asked to stop transmitting for safety or security reasons. The term "radio station" may include anything cap ...
. Such tracking by authorized users is considered a feature of P25, referred to as "presence". The report's authors concluded by saying "It is reasonable to wonder why this protocol, which was developed over many years and is used for sensitive and critical applications, is so difficult to use and so vulnerable to attack." The authors separately issued a set of recommendations for P25 users to mitigate some of the problems found. These include disabling the secure/clear switch, using Network Access Codes to segregate clear and encrypted traffic, and compensating for the unreliability of P25 over-the-air rekeying by extending key life.


Comparison between P25 and TETRA

P25 and TETRA are used in more than fifty-three countries worldwide for both public safety and private sector radio networks. There are some differences in features and capacities:https://tandcca.com/fm_file/dubai06swancomparison-pdf/ * TETRA is optimized for high population density areas, and has spectral efficiency of 4 time slots in 25 kHz. (Four communications channels per 25 kHz channel, an efficient use of spectrum). It supports full-duplex voice communication, data, and messaging. It does not provide simulcast. * P25 is optimized for wider area coverage with low population density, and also supports simulcast. It is, however, limited with respect to data support. There is a major subdivision within P25 radio systems: Phase I P25 operates analogue, digital, or mixed mode in a single 12.5 kHz channel. Phase II uses a 2-timeslot TDMA structure in each 12.5 kHz channel.


See also

* APCO-16, an earlier standard that specified trunking formats and radio operation *
Digital Audio Broadcasting Digital radio is the use of digital technology to transmit or receive across the radio spectrum. Digital transmission by radio waves includes digital broadcasting, and especially digital audio radio services. Types In digital broadcasting syst ...
*
Digital terrestrial television Digital terrestrial television (DTTV or DTT, or DTTB with "broadcasting") is a technology for terrestrial television in which land-based (terrestrial) television stations broadcast television content by radio waves to televisions in consumers' ...
*
Government radio networks in Australia The Government Radio Network (GRN) is a network of various systems in place across Australia that enable statewide trunked radio communication. The network operates through inter-linked sites for government and public services such as police, am ...
, examples deployment of P25 technology *
NXDN NXDN stands for Next Generation Digital Narrowband, and is an open standard for public land mobile radio systems; that is, systems of two-way radios (transceivers) for bidirectional person-to-person voice communication. It was developed jointly b ...
, a two-way digital radio standard with similar characteristics (Optional TDMA) *
Terrestrial Trunked Radio Terrestrial Trunked Radio (TETRA; formerly known as Trans-European Trunked Radio), a European standard for a trunked radio system, is a professional mobile radio and two-way transceiver specification. TETRA was specifically designed for use by go ...
, TETRA, the European(EU) standard equivalent to P25


Notes


External links

*
P25 Overview
TIA Standards Development Activities for Public Safety * https://web.archive.org/web/20110223005820/http://www.apco911.org/frequency/project25.php APCO International Project 25 page * http://www.apco.ca/ APCO Canada * http://www.dvsinc.com/papers/p25_training_guide.pdf Daniels' P25 Radio System Training Guide * https://valid8.com/solutions/p25-issi-cssi-conformance P25 Compliance Test Tools for ISSI & CSSI * https://web.archive.org/web/20170611161725/http://www.dvsinc.com/prj25.htm DVSI P25 Vocoder Software and Hardware * http://www.p25phase2.com Radio users and experts discuss P25 Phase 2 {{Trunked radio systems Trunked radio systems Telecommunications standards Computer security exploits