دانلود رایگان مقاله انگلیسی نیاز به امنیت لایه فیزیکی در LTE: تحلیل آسیب پذیری ها در لایه فیزیکی LTE - نشریه IEEE 2017

عنوان فارسی
نیاز به امنیت لایه فیزیکی در LTE: تجزیه و تحلیل آسیب پذیری ها در لایه فیزیکی LTE
عنوان انگلیسی
Need of Physical Layer Security in LTE: Analysis of Vulnerabilities in LTE Physical Layer
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
6
سال انتشار
2017
نشریه
آی تریپل ای - IEEE
فرمت مقاله انگلیسی
PDF
نوع نگارش
مقالات پژوهشی (تحقیقاتی)
رفرنس
دارد
کد محصول
E10603
رشته های مرتبط با این مقاله
فناوری اطلاعات، فناوری اطلاعات و ارتباطات
گرایش های مرتبط با این مقاله
ینترنت و شبکه های گسترده، دیتا و امنیت شبکه، سیستمهای چند رسانه ای و سامانه های شبکه ای
مجله
کنفرانس بین المللی ارتباطات بی سیم، پردازش سیگنال و شبکه - International Conference on Wireless Communications
دانشگاه
Central Research Laboratory - Bharat Electronics Limited - Bangalore - India
کلمات کلیدی
LTE، امنیت لایه فیزیکی، مسدود کردن، حاشیه مسدود کردن، تکنیک های کاهش
doi یا شناسه دیجیتال
https://doi.org/10.1109/WiSPNET.2017.8300057
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

Abstract


In Wireless/mobile communication, the requirement of higher throughput and data rates are increasing day-byday. For meeting this requirement, Long Term Evolution (LTE) technology has become the prime choice. Communication using wireless technology has vulnerabilities. LTE wireless technology has vulnerabilities associated with the processing technique as well as well-defined positioning of channels and signals of physical layer. This drawback is of concern, as it can completely or partially block the communication, due to intentional jamming or unintentional interference. To understand the jamming vulnerabilities in LTE, it is essential to understand various physical channels, signals, frame structure, decoding protocols and various types of jamming. This paper provides jamming vulnerability analysis of LTE physical layer, physical channels and signals. Practical lab test setup for measuring jamming margins along with the result is provided in this paper. Various mitigation techniques have been provided in this paper to reduce jamming vulnerabilities.

نتیجه گیری

CONCLUSION


Jamming vulnerability for downlink physical layer of LTE against jamming has been analyzed. It is found that PSS, SSS and PBCH are highly vulnerable to RF jamming, so appropriate mitigation technique has to be applied as discussed in the previous section. For jamming PCFICH, jammer has to get synchronized with the cell. C-RS jamming is a costly affair for jammer, but once jammed can increase the BER of the system tremendously. Jamming of physical channels and signals which requires the jammer to get synchronized with the cell are less vulnerable, because it would lead the jammer to have a decoding protocol. The jammers with decoding protocol are active jammers which are costly, as well as power consumption is high. PDSCH and PDCCH are least vulnerable in terms of RF Jamming. Eavesdropping PDSCH is a threat, as it carries SIB1 and SIB2. PDSCH system information should be encrypted because this information is vital and may lead to higher layer attack.


بدون دیدگاه