Not necessary to prevent system access, and the RFI from kerchunkers will still interfere.
Encrypted control channel prevents a shot ton of meta data from being revealed, and will keep hacked radios from being able to even passively monitor the system.
LLA does the same thing, except it doesn't prevent the disclosure of Metadata.
Frankly all P25 systems should have 100% voice traffic should be encrypted, because it would just discourage these whacked from attempting to even try to listen, encrypted control channel and LLA ensure they can't.
In the IT world we use the same technologies (I don't proclaim to be an expert in Trunked Radio Systems, but there are a lot of parallels to the IT systems I do know including "pre-shared keys" - PSK's that are commonly used in these applications) - That's the "locked door" analogy I was using. If a person is knocking on a locked door (aka Transmitting) even without an Authentication/Encryption key (which in the technology is the same thing, just different applications) it can still block other legitimate users.
It can, but once the system does not receive the correct response to its challange, it ignores that radio and acts like it isn't there. I'm sure the system can also be set up to issue an inhibit command to the RID with out the correct LLA key
That is still a Denial-of-Service attack, be it on the Control Channel or Voice Channel (and ultimately the talk group)
They system can see that the noise floor has risen to the point point of making the CC or VC unusable, it can temporarily remove them from the usable pool of channels(stop using the VC, amd rotating the control to a new RF channel)
Encrypted Control Channel sounds like a solution in search of a problem. In the case of Denial-of-Service attack, it will do nothing to stop it. Even a low-skill attack transmitting "noise" on the control channel - if it's strong enough to saturate the inputs could render a system/site unusable, and since it's not affiliated with the system, nor sending legitimate messages, there's no way to "inhibit" it - leaving it up to the fine folks at the FCC to track it down and pull the plug.
While true, the site should be alerting the system admin to the interference problems with the site.
To me Encrypted Control Channel sounds like a way for the manufacturers to get more taxpayer dollars by requiring you to upgrade incompatible radios, even if they're still within their expected service life.
No, encrypted control channel keeps Metadata about the system from being used to collect Intel on the system.
Same goes for TDMA control channels (which as you notice only one company thus far supports them, and even now they are few and far between, with only a handful of non-public safety companies using them).
TDMA control channel frees up half the RF channel and adds an available voice path. It's a way to add capacity, with out adding RF resources.
It all comes down to a mantra I use regularly - "Technology will never fix what is a human resources problem" - That's why I'll stick to the passive monitoring of a scanner (for as long as the industry will allow me).
Lmao.