Abstract
I- Introduction
II- LTE physical layer
III- Downlink physical layer decoding protocol
IV- Types of jamming
V- Jamming vulnerability analysis of LTE physical layer
VI- Test setup for jamming margin measurement
VII- Mitigation techniques
VIII- Conclusion
References
Abstract
In Wireless/mobile communication, the requirement of higher throughput and data rates are increasing day-byday. For meeting this requirement, Long Term Evolution (LTE) technology has become the prime choice. Communication using wireless technology has vulnerabilities. LTE wireless technology has vulnerabilities associated with the processing technique as well as well-defined positioning of channels and signals of physical layer. This drawback is of concern, as it can completely or partially block the communication, due to intentional jamming or unintentional interference. To understand the jamming vulnerabilities in LTE, it is essential to understand various physical channels, signals, frame structure, decoding protocols and various types of jamming. This paper provides jamming vulnerability analysis of LTE physical layer, physical channels and signals. Practical lab test setup for measuring jamming margins along with the result is provided in this paper. Various mitigation techniques have been provided in this paper to reduce jamming vulnerabilities.
Introduction
3rd Generation Partnership Project (3GPP) has standardized Long Term Evolution (LTE) technology to meet the demand of growing data rates and higher throughput for cellular communication. As compared to the existing cellular technology, LTE provides higher data rate, lower latency, higher spectral efficiency and higher capacity [1]. Hence, LTE has become the prime choice to meet the growing demand of high data traffic. LTE has already been proposed for public safety network and is in investigation for end use in military application fields. Wireless technologies are vulnerable to radio frequency interference and jamming, due to which the communication link may suffer partial or complete blocking. Unfortunately, wireless communication link undergoes unintentional interference and intentional jamming. Like any wireless technology, LTE is also vulnerable to disruption. Various types of attack possible on LTE are Denial of Service (DoS) and information extraction [2]. Typically, DoS is caused by jamming attacks due to which communication link gets disrupted. DoS at higher layers and attacks for extracting information, falls under cyber attack. In this paper, we have focused to assess the physical layer vulnerabilities and threats which can potentially cause DoS by intentional jamming. The objective of the paper is to provide the insight to the jamming vulnerabilities in LTE physical layer and the techniques to mitigate and withstand jamming.