A note on denial-of-service in operating systems
IEEE Transactions on Software Engineering
Electronic Warfare in the Information Age
Electronic Warfare in the Information Age
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
LTE for UMTS - OFDMA and SC-FDMA Based Radio Access
LTE for UMTS - OFDMA and SC-FDMA Based Radio Access
Hi-index | 0.00 |
The Long Term Evolution (LTE) system is the evolution of Universal Mobile Telecommunications System (UMTS). The LTE system is now increasingly being deployed throughout the world. Therefore, the security of the LTE system is more and more significant. In this paper, we present a method of interference the LTE system, called jammer interference. It exploits the nature of the medium in wireless networks. Using the link budget in the LTE system, we are able to quantitatively analyze the impact of the jammer interference. For example, if the jammer power and height is 40dBm and 2m, respectively, and the location of the jammer is (R, R) (R is the cell radius), that is to say, the jammer is on the edge of the cell, we can get the blocking area is 3435.9m2 in the multi-cell LTE system.