ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
Abstract
In Wireless/mobile communication, the requirement of higher throughput and data rates are increasing day-byday. For meeting this requirement, Long Term Evolution (LTE) technology has become the prime choice. Communication using wireless technology has vulnerabilities. LTE wireless technology has vulnerabilities associated with the processing technique as well as well-defined positioning of channels and signals of physical layer. This drawback is of concern, as it can completely or partially block the communication, due to intentional jamming or unintentional interference. To understand the jamming vulnerabilities in LTE, it is essential to understand various physical channels, signals, frame structure, decoding protocols and various types of jamming. This paper provides jamming vulnerability analysis of LTE physical layer, physical channels and signals. Practical lab test setup for measuring jamming margins along with the result is provided in this paper. Various mitigation techniques have been provided in this paper to reduce jamming vulnerabilities.
CONCLUSION
Jamming vulnerability for downlink physical layer of LTE against jamming has been analyzed. It is found that PSS, SSS and PBCH are highly vulnerable to RF jamming, so appropriate mitigation technique has to be applied as discussed in the previous section. For jamming PCFICH, jammer has to get synchronized with the cell. C-RS jamming is a costly affair for jammer, but once jammed can increase the BER of the system tremendously. Jamming of physical channels and signals which requires the jammer to get synchronized with the cell are less vulnerable, because it would lead the jammer to have a decoding protocol. The jammers with decoding protocol are active jammers which are costly, as well as power consumption is high. PDSCH and PDCCH are least vulnerable in terms of RF Jamming. Eavesdropping PDSCH is a threat, as it carries SIB1 and SIB2. PDSCH system information should be encrypted because this information is vital and may lead to higher layer attack.