The vulnerability analysis and improvement of the TETRA authentication protocol | IEEE Conference Publication | IEEE Xplore