2007 IEEE International Symposium on Information Theory 2007
DOI: 10.1109/isit.2007.4557594
|View full text |Cite
|
Sign up to set email alerts
|

Broadcast Control Channel Jamming: Resilience and Identification of Traitors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
75
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(76 citation statements)
references
References 5 publications
0
75
0
Order By: Relevance
“…Advanced jamming techniques fall into multiple categories ranging from using more complex signals to using the knowledge of higher level attack protocols [6,7]. For example, attackers can target control channels to reduce energy expenditure by serveral orders of magnitude over jamming data channels [8,9]. To increase attack efficiency, a jammer can also alternate between jamming and sleeping, either with a constant period and duty cycle in a periodic jamming attack, or using randomized jamming and sleeping durations in a random jamming attack [10].…”
Section: Introductionmentioning
confidence: 99%
“…Advanced jamming techniques fall into multiple categories ranging from using more complex signals to using the knowledge of higher level attack protocols [6,7]. For example, attackers can target control channels to reduce energy expenditure by serveral orders of magnitude over jamming data channels [8,9]. To increase attack efficiency, a jammer can also alternate between jamming and sleeping, either with a constant period and duty cycle in a periodic jamming attack, or using randomized jamming and sleeping durations in a random jamming attack [10].…”
Section: Introductionmentioning
confidence: 99%
“…Weak message authentication [21] Rogue messages transmitted Encryption [22,23] Control channel jamming [24,25] Loss of availability Antijamming mechanisms [24,26] Amateur Radio Fake GSM and other stations [27] Calls spoofed/intercepted No known solutions Professional Mobile Radio TETRA authentication key cloning [28] TETRA authentication process compromised No known solutions Radio location privacy attack [29] P25 Location privacy breached No known solutions Physical layer jamming [29] P25 Denial of service No known solutions Brute Force Key recovery [30] P25 authentication process compromised No known solutions…”
Section: Sms Messagingmentioning
confidence: 99%
“…If the data and control message channels can be identified, then a control jamming attack can be launched, using significantly lower energy than what would be required to jam all communications channels [24]. If the attackers are already in the network, as insiders or following a successful masquerading attack, a technique detailed in [25] can be used to prevent mobile stations from communicating. It involves jamming only one in 51 frames on a control channel.…”
Section: Cell Broadcast (Cb)mentioning
confidence: 99%
See 1 more Smart Citation
“…Jamming attacks are launched by malicious users to deliberately disrupt the communications of CR users, resulting in denial of service (DoS) in CR networks. Although jamming attacks can occur in any type of channels, data or control, it is reported in [5] that jamming the broadcast channel (BCCH) of the GSM system is several order of magnitude more effective than targeting at all channels. For this reason, any intelligent attacker may prefer control jamming attack than other jamming methods due to its effectiveness of resulting in DoS.…”
Section: Introductionmentioning
confidence: 99%