Vulnerabilities of LTE and LTE-Advanced Communication White Paper

Long Term Evolution (LTE) technology has become the technology of choice for keeping up with the requirement of higher throughput in mobile communication in bands below 6 GHz. It is expected that within the next decade LTE will become the primary commercial standard. LTE is often used to broadcast emergency information in times of natural disasters and national crises and is under investigation for further end use application in government as well as military application fields. Communication via LTE has some vulnerabilities. This drawback is a matter of concern since it is possible to completely take down the LTE network or at least partially block communication, intentionally with the help of jamming signals, or unintentionally through various forms of interference. An example of unintentional interference issues is the frequently discussed coexistence issues with Air Traffic Control (ATC) S-band radar and Digital TV bands. The in-device coexistence challenge is also a potentially important issue with the rapid evolution of multi-standard radios. This White Paper will focus on the vulnerabilities of LTE communication by explaining LTE jamming and unintentional interference problems, address the coexistence issues with other services, and discuss the mitigation options to build a broad perspective on the possible deployment of the LTE technology for future military and civil governmental applications. Understanding the susceptance of new technologies to known and expected environments is critical to the adoption for defense applications

[1]  Wang Ping,et al.  Performance of OFDM in the presence of multitene jamming , 2012, 2012 IEEE Symposium on Robotics and Applications (ISRA).

[2]  Sudhir Kumar Baghel,et al.  Interference avoidance for in-device coexistence in 3GPP LTE-advanced: challenges and solutions , 2012, IEEE Communications Magazine.

[3]  Matthew J. P. Baker,et al.  Downlink Physical Data and Control Channels , 2011, LTE - The UMTS Long Term Evolution.

[4]  T. Charles Clancy,et al.  Efficient OFDM Denial: Pilot Jamming and Pilot Nulling , 2011, 2011 IEEE International Conference on Communications (ICC).

[5]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[6]  Harry Leib,et al.  Evaluating the performance of convolutional codes over block fading channels , 1999, IEEE Trans. Inf. Theory.

[7]  Jeffrey H. Reed,et al.  Vulnerability of LTE to hostile interference , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[8]  Shabnam Sodagari,et al.  Performance impact of asynchronous off-tone jamming attacks against OFDM , 2013, 2013 IEEE International Conference on Communications (ICC).

[9]  Jun Luo,et al.  Bit Error Rate Analysis of jamming for OFDM systems , 2007, 2007 Wireless Telecommunications Symposium.