Vulnerability analysis and verification for LTE initial synchronization mechanism

Vulnerability analysis is significant for the security of LTE public networks and private networks. The current research on LTE vulnerability considers little about the balance between effectiveness and complexity of jamming. This paper analyzes the vulnerability of LTE initial synchronization mechanism, and puts forward a LTE jamming method based on spoofing synchronization signals to verify this vulnerability. By changing the correlation peaks' positions of initial synchronization with the spoofing signals, the method can make synchronization fail. Simulation results verify the effectiveness of this method, prove the vulnerability of the initial synchronization mechanism and also reveal the optimal time shifting between the spoofing signals and the actual signals.

[1]  Kai Hong,et al.  Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[2]  Gordon L. Stüber,et al.  Resilience of LTE networks against smart jamming attacks , 2014, GLOBECOM.

[3]  John C. McEachen,et al.  Vulnerability Analysis of LTE Location Services , 2014, 2014 47th Hawaii International Conference on System Sciences.

[4]  Jeffrey H. Reed,et al.  Vulnerability of LTE to hostile interference , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[5]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.