2018 IEEE International Conference on Communications Workshops (ICC Workshops) 2018
DOI: 10.1109/iccw.2018.8403769
|View full text |Cite
|
Sign up to set email alerts
|

5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation

Abstract: In December 2017, the Third Generation Partnership Project (3GPP) released the first set of specifications for 5G New Radio (NR), which is currently the most widely accepted 5G cellular standard. 5G NR is expected to replace LTE and previous generations of cellular technology over the next several years, providing higher throughput, lower latency, and a host of new features. Similar to LTE, the 5G NR physical layer consists of several physical channels and signals, most of which are vital to the operation of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 57 publications
(25 citation statements)
references
References 8 publications
(12 reference statements)
0
25
0
Order By: Relevance
“…This information is broadcasted on PRACH, which takes the form of a Zadoff-Chu sequence that embeds a value used to identify the UE temporarily. Despite the large number of possible locations, and the high complexity needed to determine the positions in real-time, jamming PRACH is still feasible [4]. Furthermore, if the jammer does not succeed in determining these locations, it can flood the channel with an invalid preamble as the 5G NR does not specify what it should be done in this scenario.…”
Section: Vulnerableness Of Rach To Jammingmentioning
confidence: 99%
“…This information is broadcasted on PRACH, which takes the form of a Zadoff-Chu sequence that embeds a value used to identify the UE temporarily. Despite the large number of possible locations, and the high complexity needed to determine the positions in real-time, jamming PRACH is still feasible [4]. Furthermore, if the jammer does not succeed in determining these locations, it can flood the channel with an invalid preamble as the 5G NR does not specify what it should be done in this scenario.…”
Section: Vulnerableness Of Rach To Jammingmentioning
confidence: 99%
“…One 5G property that mitigates jamming is its wide range of frequency use. Specifically, using frequencies greater than 24GHz inhibits jamming, because of the difficulty of building a jammer for cells operating above 24GHz (Lichtman et al 2018). In 5G networks Primary and Secondary Synchronization Signals (PSS and SSS) are control signals which allow a device to identify base stations with low SINR.…”
Section: Jammingmentioning
confidence: 99%
“…In 5G networks Primary and Secondary Synchronization Signals (PSS and SSS) are control signals which allow a device to identify base stations with low SINR. This makes them resilient to jamming because it requires an attacker to use "more jamming power to successfully jam the signal" (Lichtman et al 2018).…”
Section: Jammingmentioning
confidence: 99%
“…The second group is the so-called intentional interference (i.e., jamming) mainly used in the military or security to disrupt enemy communication systems or counteract radio systems in a protected area (i.e., electromagnetic curtain [ 11 ]), e.g., in airports, buildings, and infrastructure of strategic importance. Examples of jamming 5G systems are presented in [ 12 , 13 ]. The remainder of the paper focuses on non-intentional interferences.…”
Section: Introductionmentioning
confidence: 99%