2019 IEEE International Conference on Communications Workshops (ICC Workshops) 2019
DOI: 10.1109/iccw.2019.8756977
|View full text |Cite
|
Sign up to set email alerts
|

Towards Resilient 5G: Lessons Learned from Experimental Evaluations of LTE Uplink Jamming

Abstract: Energy, water, health, transportation and emergency services act as backbones for our society. Aiming at high degrees of efficiency, these systems are increasingly automated, depending on communication systems. However, this makes these Critical Infrastructures prone to cyber attacks, resulting in data leaks, reduced performance or even total system failure. Beyond a survey of existing vulnerabilities, we provide an experimental evaluation of targeted uplink jamming against Long Term Evolution (LTE)'s air inte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 14 publications
0
16
0
Order By: Relevance
“…Further, attacks can exploit protocol vulnerabilities of the phone [43], [24] or exhaust resources [46] for a denial of service. A special kind of denial of service are jamming attacks that disturb the physical communication [27], [31], [16]. Hussain et al [24] present an authentication relay attack that allows eavesdropping on un-encrypted traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Further, attacks can exploit protocol vulnerabilities of the phone [43], [24] or exhaust resources [46] for a denial of service. A special kind of denial of service are jamming attacks that disturb the physical communication [27], [31], [16]. Hussain et al [24] present an authentication relay attack that allows eavesdropping on un-encrypted traffic.…”
Section: Related Workmentioning
confidence: 99%
“…However, the transmit power of IJs are limited due to their wide-band nature and distance to the target [9]. Hence, for the IJs to be effective, they are required to be deployed near the target in sufficient number and in close proximity [11]. Moreover, this work consider that the IJs possesses necessary details about network parameters including location of target, transmit power and frequency band, thus, forcing the target out of coverage [9,12,13].…”
Section: Distributed Denial-of-service Attacksmentioning
confidence: 99%
“…) is achieved as (11). Similarly, for uniformly distributed IJs without RFA, UL coverage probability expression,…”
Section: Coverage Probability For Ul In the Presence Of Ijs Without Rfamentioning
confidence: 99%
“…The authors demonstrate that by employing their proposed setup, peak signal-to-noise ratio (PSNR) increases by 11.3 dB. In [25], the authors investigate smart jammer attacks on the LTE Physical Uplink Shared Channel (PUSCH), Physical Uplink Control Channel (PUCCH), and the radio access procedure. Moreover, they derive possible mitigation and recommendations to improve the robustness of mission-critical communications.…”
Section: Related Workmentioning
confidence: 99%
“…1. In [14,[21][22][23][24][25], different jamming techniques with their detection and mitigation methods are investigated in different networks. However, these studies lack the analysis of both ICI and JI in HetNets along with RFA.…”
Section: Approach and Contributionsmentioning
confidence: 99%