IWCE is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

P25 Link Layer Authentication (LLA)...Do You Know?

Moderator:

Hermina (Nina) Koshinski  (Chief, Radio Ops Engineering & Support (PA-STARNet), Pennsylvania State Police)

Panelist:

Scott Wright  (Sr. Telecomm Engineer II, Dept of Emergency Service and Public Protection, State of Connecticut)

Location: W240C

Date: Monday, March 25

Time: 10:10 am - 11:10 am

Track: First Responder Communications, State & Local Government

Topic: Cybersecurity, Interoperability, LMR, P25

Format: Panel Session

Vault Recording: TBD

P25 Link Layer Authentication (LLA) is being heard more and more frequently within the public safety communications community, but there is confusion around what it is, what is does and how it can be implemented in land mobile radio (LMR) systems. With increasing examples of criminals accessing LMR networks to monitor communications and disrupt law enforcement activities, LMR system security is critically important for both system owners and the public safety users they support. P25 LLA is an additional option to restrict system access, join this session to learn what P25 LLA is – and is not – and how it can limit access to P25 trunked radio systems and provide an extra layer of system security and protection for critical communications networks. Panelists will share their expertise on how to protect P25 LMR networks, describe how P25 LLA can offer additional system security by verifying subscriber units before granting system access, provide real world incident use case of it working and examples of why P25 LLA is needed, and offer best practices as well as lessons learned for successful P25 LLA implementation.

Key Takeaways:
1. Understand how P25 Link Layer Authentication (LLA) can provide additional system security.
2. Types of P25 LLA.
3. Potential benefits and impacts of adopting P25 LLA
4. Lessons learned and best practices for implementing P25 LLA, particularly across multiple networks and disparate manufacturer systems.