[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2556871.2556882acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccConference Proceedingsconference-collections
research-article

Analysis and Evaluation of Jammer Interference in LTE

Published: 01 December 2013 Publication History

Abstract

The Long Term Evolution (LTE) system is the evolution of Universal Mobile Telecommunications System (UMTS). The LTE system is now increasingly being deployed throughout the world. Therefore, the security of the LTE system is more and more significant. In this paper, we present a method of interference the LTE system, called jammer interference. It exploits the nature of the medium in wireless networks. Using the link budget in the LTE system, we are able to quantitatively analyze the impact of the jammer interference. For example, if the jammer power and height is 40dBm and 2m, respectively, and the location of the jammer is (R, R) (R is the cell radius), that is to say, the jammer is on the edge of the cell, we can get the blocking area is 3435.9m2 in the multi-cell LTE system.

References

[1]
V.D. Gligor. "A Note on Denial-of-Service in Operating Systems." IEEE Transactions on Software Engineering. 1984, pp.320-324.
[2]
D. Curtis Schleher. "Electronic Warfare in the Information Age." Artech House, Norwood MA. 1999, pp.605
[3]
S.M.K. Chaitanya, P. Naga Raju, Y.N.V.L. Ayyappa, Vundavalli Ravindra. "Analysis and Study of Denial of Service Attacks in Wireless Mobile Jammers." International Journal of Computer Science and Telecommunications, 2011.
[4]
W. Xu, W. Trappe, Y. Zhang, T. Wood. "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks." In ACM MobiHoc, 2005.
[5]
S.M.K. Chaitanya, P. Naga Raju, Y.N.V.L Ayyappa, Vundavalli Ravindra. "Analysis and Study of Denial of Service Attacks in Wireless Mobile Jammers." International Journal of Computer Science and Telecommunications. September 2011, pp.46-52.
[6]
Mika Stahlberg. "Radio Jamming Attacks Against Two Popular Mobile Networks." In H. Lipmaa and H. Pehu-Lehtonen, editors, Proceedings of the Helsinki University of Technology. Seminar on Network Security. Mobile Security. Helsinki University of Technology, Finnland, 2000.
[7]
3GPP TS 36.211 v8.4.0, Evolved Universal Terrestrial Radio Access(E-UTRA). Physical Channels and Modulation.
[8]
3GPP TS 36.212 v8.4.0, Evolved Universal Terrestrial Radio Access(E-UTRA). Multiplexing and channel coding.
[9]
Harri Holma, Antti Toskala. "LTE for UMTS-OFDMA and SC-FDMA Based Radio Access." John Wiley & Sons, Ltd 2009.
[10]
Kun Li, Zhe Wang. "Research of Wireless Communications Radio Wave Propagation Model." Wireless Communication Technology, 2008.
[11]
Huawei, RITT, CATT, CMCC. TP on LTE TDD Link Budget for ITU-R Submission Template. R1-093713 3GPP TSG RAN WG1 Metting #58, Shenzhen, China, August 2009, pp.24-28
[12]
Andreas Fernekeb, Anja Klein, Bernhard Wegmann, et al. "Load Dependent Interference Margin for Link Budget Calculations of OFDMA Networks." IEEE communications letters, May 2008,12(5)
[13]
3GPP TS 36.101 v10.1.1, User Equipment(UE) radio transmission and reception(Release 10). January 2011.
[14]
3GPP TS 36.104 v10.1.0, Base Station(BS) radio transmission and reception(Release 10). December 2010.

Cited By

View all
  • (2021)Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis2021 IEEE Symposium on Security and Privacy (SP)10.1109/SP40001.2021.00104(1197-1214)Online publication date: May-2021
  • (2020)High Rate-Reliability Beamformer Design for 2×2 Mimo-OFDM System Under Hostile Jamming2020 29th International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN49398.2020.9209635(1-9)Online publication date: Aug-2020
  • (2019)A Systematic Analysis Method for 5G Non-Access Stratum Signalling SecurityIEEE Access10.1109/ACCESS.2019.29379977(125424-125441)Online publication date: 2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCC '13: Proceedings of the Second International Conference on Innovative Computing and Cloud Computing
December 2013
285 pages
ISBN:9781450321198
DOI:10.1145/2556871
  • General Chairs:
  • Min Wu,
  • Wei Lee,
  • Program Chairs:
  • Yiyi Zhouzhou,
  • Riza Esa,
  • Xiang Lee
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • ACM Wuhan Chapter: ACM Wuhan Chapter

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Jammer
  2. LTE
  3. Link budget

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCC '13

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis2021 IEEE Symposium on Security and Privacy (SP)10.1109/SP40001.2021.00104(1197-1214)Online publication date: May-2021
  • (2020)High Rate-Reliability Beamformer Design for 2×2 Mimo-OFDM System Under Hostile Jamming2020 29th International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN49398.2020.9209635(1-9)Online publication date: Aug-2020
  • (2019)A Systematic Analysis Method for 5G Non-Access Stratum Signalling SecurityIEEE Access10.1109/ACCESS.2019.29379977(125424-125441)Online publication date: 2019
  • (2018)Survey of DoS Attacks on LTE infrastructure used in AMI System and Countermeasures2018 Smart Grid Conference (SGC)10.1109/SGC.2018.8777832(1-6)Online publication date: Nov-2018
  • (2018)On Security Research Towards Future Mobile Network GenerationsIEEE Communications Surveys & Tutorials10.1109/COMST.2018.282072820:3(2518-2542)Online publication date: Nov-2019
  • (2015)On simulation studies of jamming threats against LTE networks2015 International Conference on Computing, Networking and Communications (ICNC)10.1109/ICCNC.2015.7069323(99-103)Online publication date: Feb-2015

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media