Show simple item record

dc.contributor.authorLichtman, Marcen_US
dc.contributor.authorReed, Jeffrey H.en_US
dc.contributor.authorClancy, T. Charlesen_US
dc.contributor.authorNorton, Marken_US
dc.coverage.spatialAustin, TXen_US
dc.date.accessioned2017-02-02T15:48:00Z
dc.date.available2017-02-02T15:48:00Z
dc.date.issued2013-01-01en_US
dc.identifier.issn2376-4066en_US
dc.identifier.urihttp://hdl.handle.net/10919/74900
dc.description.abstractLTE is well on its way to becoming the primary cellular standard, due to its performance and low cost. Over the next decade we will become dependent on LTE, which is why we must ensure it is secure and available when we need it. Unfortunately, like any wireless technology, disruption through radio jamming is possible. This paper investigates the extent to which LTE is vulnerable to intentional jamming, by analyzing the components of the LTE downlink and uplink signals. The LTE physical layer consists of several physical channels and signals, most of which are vital to the operation of the link. By taking into account the density of these physical channels and signals with respect to the entire frame, as well as the modulation and coding schemes involved, we come up with a series of vulnerability metrics in the form of jammer to signal ratios. The “weakest links” of the LTE signals are then identified, and used to establish the overall vulnerability of LTE to hostile interference.en
dc.format.extent285 - 288 (4) page(s)en_US
dc.languageEnglishen_US
dc.publisherIeeeen_US
dc.relation.urihttp://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000350825600076&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=930d57c9ac61a043676db62af60056c1en_US
dc.rightsThis Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
dc.rightsIn Copyright (InC)
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.subjectTechnologyen_US
dc.subjectEngineering, Electrical & Electronicen_US
dc.subjectEngineeringen_US
dc.subjectLTEen_US
dc.subjectLTE securityen_US
dc.subjectjammingen_US
dc.subjectinterferenceen_US
dc.titleVulnerability of LTE to Hostile Interferenceen_US
dc.typeArticle
dc.description.versionPublished (Publication status)en_US
dc.title.serial2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP)en_US
dc.type.otherProceedings Paperen_US
dc.type.otherMeetingen_US
dc.type.otherBook in seriesen_US
pubs.organisational-group/Virginia Tech
pubs.organisational-group/Virginia Tech/All T&R Faculty
pubs.organisational-group/Virginia Tech/Engineering
pubs.organisational-group/Virginia Tech/Engineering/COE T&R Faculty
pubs.organisational-group/Virginia Tech/Engineering/Electrical and Computer Engineering
pubs.organisational-group/Virginia Tech/Faculty of Health Sciences


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record