Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:
b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:
1. Comparison of the existing cellular networks generations in terms of:
a. Communication spectrum
b. modulation techniques
c. medium access control mechanism 
d. Network speed and bandwidth utilization
e. Security techniques and risk
2. Explore the architecture of LTE/LTE-A 
3. Evaluate the LTE/LTE-A attacks on the access and core networks. 
4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken 
to address such attack.

Spectrum and Spread Range

The Long term Evolution (LTE)/ Advanced Long Term Evolution (LTE-A) is a wireless communication standard for mobile devices and data networks. LTE provides high speed connectivity due of its higher bandwidths, superior spectrum efficiency with lower latency rates. This report describes about comparison of cellular networks with LTE network and architecture of LTE along with the attacks on LTE network.

Comparison of Cellular Networks

  1. Communication Spectrum

Spectrum is defined as the variation of radio frequencies within a specified range to transmit data wirelessly over the network.

Spread range various access correspondence referred to financially as cdma code division numerous entrance is a driving innovation behind the quickly propelling spread range different access correspondence referred to monetarily as cdma code division numerous entrance is a driving innovation behind the quickly progressing CDMA. [1]

2G stays for second-age remote telephone development, 1G frameworks used are straightforward, 2G frameworks are electronic and 3G (third-age) advancement is used to enhance PDA standards.3G serves to at the same time trade both voice data (a telephone call) and non-voice data, (for instance, downloading information, exchanging email, and messaging. The element of 3G is video correspondence. 4G advancement stands to be the future standard of remote contraptions with an essentially higher range.

  1. Modulation techniques

Modulation technique is defined as the way the data transmission takes place. In 1G network, analog signal is used to transmit data. In this, centrally controlled base station is there each providing service to a small area. In 2G network, advanced transmission was utilized to transmit information and also by the introduction of bleeding edge and fast phone to-sort out hailing. The climb in wireless use in light of 2G was unsafe and this period similarly watched the approach of prepaid mobile phones. In 3G arrange, fast IP information organize was utilized. The use of packet switching made the data transmission faster and reliable. In 4G network, the growth of mobile broadband took place and with this evolution the data transmission rate reached almost 100mbps.

  1. Medium Access Control Techniques

Medium access control is responsible for sharing of data packets across the network. MAC decides how the data can be delivered safely without collision.

Carrier Sense Multiple Access with Collision Detection (CSMA/CD), which is utilized in Ethernet organizing. [2] Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), which is utilized in AppleTalk organizing.

Token passing, which is utilized in Token Ring and Fiber Distributed Data Interface (FDDI) networking.

  1. Network Speed and bandwidth utilization

The remote innovations have gained an enormous ground in the most recent decade, and give a universal registering and correspondence condition for expanded true applications. A perfect testing apparatus was given exact estimation of accessible transmission capacity before sending information bundles. In the PATHON show, there is no necessity to test learning and administration control over the system to give a conclusion to end estimation of accessible data transmission. Keeping in mind the end goal to decrease the estimation time, it considers less activity. The usage of the system association is estimated by utilizing the Tri Packets Method characterized in examining procedure [6]. The Packet Pair Probing Technique is utilized by remote systems for data transmission estimation while considering the limit and the cross activity variety of remote connections.

  1. Security techniques and risk

Modulation Technique and Medium Access Control

Real affirmation of supporters of confirmation the worthwhile individuals are utilizing the system. Unwavering quality with associations, for example, SMS, visit and report exchange it is fundamental that the information gets in contact with no adjustments. [3] Mystery with the broadened utilization of PDAs in temperamental correspondence, there is an essential for a safe possess recalling the genuine goal to transmit data. The Cell gadget may have files that need limited access to them. The gadget may get to a database where some kind of part based access control is crucial Contamination And Malware with expanded handiness gave in cell structures, issues overpowering in more prominent frameworks, for example, maladies and malware create. The main sickness that showed up on cell gadgets was Freedom. An affected contraption can also be utilized to assault the cell coordinate structure by winding up some piece of a colossal scale inconsistency of association snare.

A remote correspondence standard planned and created by third era organization venture (3GPP) called Long term advancement (LTE) is intended with the end goal of rapid web network. It is the overhauled type of CDMA and UMTS. Its design is made out of three primary segment i.e. Client gear (UE), Evolved UMTS Terrestrial Radio Access Network likewise called as E-UTRAN and the developed parcel center (EPC).

  1. User equipment (UE) - The inward working of the client outline for LTE is unclear to the one utilized by UMTS and GSM which is greatly a Versatile Hardware (ME). [4] The conservative gear contained the running with major modules: Convenient End (MT): This handles all as far as possible. Terminal Gear (TE): This terminations the information streams. Exhaustive Incorporated Circuit Card (UICC): This is by and large called the SIM card for LTE sorts of mechanical assembly. It runs an application known as the All inclusive Endorser Personality Module (USIM). A USIM stores client particular information on an exceptionally essential level the same as 3G SIM card. This keeps data about the client's telephone number, home system character and security keys and so on.
  2. E-UTRAN (The Access Network) - The radio access organize i.e. E-UTRAN is in charge of radio correspondences between the center system and versatile. E-UTRAN is made out of developed base stations called e-NodeBS. This developed base station covers at least one cells for portable system and the serving base station is called eNB. eNB has two principle works that are:
  3. Sending and getting radio signs utilizing computerized and simple elements of the LTE organize.
  4. It likewise keeps up low level activities by sending them signally messages, for example, handover messages. [5] Every eBN associates with EPC its uses S1 interface and to interface with each other it utilizes X2 interface which is in charge of flagging and parcel sending amid handover.
  1. The Evolved packet Core (EPC)

This inside framework has the portions like shudder and tsunami forewarning system, approach control and charging Rules work (PCRF) and the rigging Identity enlist. HSS is a central database that contains information about all framework director supporters.

The trans-portability association segment (MME) controls the bizarre state activity of the adaptable by procedures for hailing messages and Home Subscriber Server (HSS). [6]

The Policy Control and Charging Rules Function (PCRF) is an area which isn't appeared in the above structure yet it is responsible for system control fundamental organization, and besides to control the stream based charging functionalities in the Policy Control Enforcement Function (PCEF), which stays in the P-GW. 

The long term evolution (LTE)/LTE-Advanced (LTE-A) furnishes propelled administrations with higher data transfer capacities, better range effectiveness and lower inactivity contrasted with the heritage cell systems. The LTE/LTE-An is an all IP-based design, which makes it powerless against new security dangers. A portion of the assaults are:

  1. Disclosure of The International Mobile Subscriber Identity (IMSI)

IMSI is a persisting personality of a supporter. It ought to be transmitted as every so often as useful for privacy of client character. LTE/LTE-A particulars control the IMSI transmission rehash over the air interface. In the radio transmission, a Globally Unique Temporary Identifier (GUTI) is utilized to perceive endorsers.

  1. Location Tracking

LTE/LTE-A Network Architecture

Without a doubt, the area information of cell phone clients are considered as private individual data. The outline of portable correspondence innovations permits the versatile administrators to know the physical areas of the clients to perform nonstop cell administrations. What's more, the progress of ongoing situating advances and area based administrations likewise represent a danger to client area confidentiality.

  1. Radio Frequency Jamming, Spoofing and sniffing

Wireless systems are powerless against sticking style assaults in light of their common medium. Like different remote frameworks, the LTE/LTE-A system can likewise experience the ill effects of RF sticking, spoofing, and sniffing, which are all regular physical layer. [7]

  1. DOS/DDOS Attacks

DoS and Distributed Denial of Service (DDoS) assaults are both unprecedented strikes on LTE/LTE-A system. A typical strategy for DoS assaults is that aggressors send oods of messages to an objective server and fumes its CPU assets, affecting the objective to unfit to offer associations to true blue clients. Regardless of this sort of DoS assaults, particular DoS strikes continually misuse the stipulation in the LTE/LTE-A structure custom. In the DDoS ambushes, aggressors can make liberal improvement volume utilizing botnet managed by Command and Control Focuses (C&C) or hacked adaptable UE. An attacker can mishandle the security escape states of the working framework and applications downloaded from application stores to trade off versatile contraptions. [8]

Disclosure of IMSI is the most critical attack of all the attacks. By this impersonators can intercept mobile phone traffic and track user’s location. Based on IMSI, available tools can utilize unreservedly accessible instruments and even form their own particular phony GSM BTS to screen and control interchanges, remarkably to steal passwords or Visa information from individuals adjacent who make buys on their phones.

Countermeasure for the attacks is the Android-IMSI-Catcher-Detector (short: AIMSICD) is an Android open-source based undertaking to recognize and dodge counterfeit base stations (IMSI-Catchers) or other base-stations (versatile receiving wires) with poor/no encryption, conceived in 2012 on XDA.

Another is DoS attack which can fatal to the LTE/LTE-A network. Protection against Dos can be achieved by the determination vulnerabilities in charge of DoS assaults in light of TAU technique (D1 and D2) can be settled without changes in the convention itself. The 3GPP SA3 gathering may propose another system in light of a counter or clock an incentive to recoup from DoS assaults. In the event that the UE is withdrawn from the system for a specific length because of a TAU dismiss messages, it should reset the setup settings in the USIM or baseband to re-append itself with the system without pestering the client, i.e., without rebooting or require re-addition of USIM

Conclusion

In this report, correlation of 2G, 3G, 4G cell arrange is discussed with respect to correspondence run, direction methods, medium access control framework, sort out speed and exchange speed use close by security systems and danger. A short blueprint of LTE/LTE-A designing is displayed close by the security risks and countermeasures. 

References

[1] L. He, Z. Yan and M. Atiquzzaman, "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey," in IEEE Access, vol. 6, pp. 4220-4242, 2018.

[2] J. Cao, M. Ma, H. Li, Y. Zhang, and Z. Luo, ``A survey on security aspects for LTE and LTE-A networks,'' IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 283302, 1st Quart., 2014.

[3] 3rd Generation Partnership Project; Technical Specication Group Ser- vices and System Aspects; Architecture Enhancement for Non-3GPP Accesses (Release 14), document 3GPP TS 23.402 V14.3.0, 2017.

[4] S. P. Rao, B. T. Kotte, and S. Holtmanns, ``Privacy in LTE networks,'' in Proc. EAI Int. Conf. Mob. Multimedia Commun. (ICST), 2016, pp. 176183.

[5] S. P. Rao, B. T. Kotte, and S. Holtmanns, ``Privacy in LTE networks,'' in Proc. EAI Int. Conf. Mob. Multimedia Commun. (ICST), 2016, pp. 176183.

[6] M. Lichtman, R. P. Jover, M. Labib, R. Rao, V. Marojevic, and J. H. Reed, ``LTE/LTE-A jamming, spoong, and snifng: Threat assessment and mitigation,'' IEEE Commun. Mag., vol. 54, no. 4, pp. 5461, Apr. 2016.

[7] J. Henrydoss and T. Boult, ``Critical security review and study of DDoS attacks on LTE mobile network,'' in Proc. IEEE AsiaPacic Conf. Wireless Mobile, Aug. 2014, pp. 194200.

[8] [21] M. Khosroshahy, D. Qiu, and M. K. M. Ali, ``Botnets in 4G cellular networks: Platforms to launch DDoS attacks against the air interface,'' in Proc. MoWNeT, 2013, pp. 3035.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Comparison Of Cellular Networks And Security Risks In LTE/LTE-A Networks: An Essay.. Retrieved from https://myassignmenthelp.com/free-samples/mn603-wireless-networks-and-security/lte-a-network-security.html.

"Comparison Of Cellular Networks And Security Risks In LTE/LTE-A Networks: An Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/mn603-wireless-networks-and-security/lte-a-network-security.html.

My Assignment Help (2021) Comparison Of Cellular Networks And Security Risks In LTE/LTE-A Networks: An Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/mn603-wireless-networks-and-security/lte-a-network-security.html
[Accessed 29 March 2024].

My Assignment Help. 'Comparison Of Cellular Networks And Security Risks In LTE/LTE-A Networks: An Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/mn603-wireless-networks-and-security/lte-a-network-security.html> accessed 29 March 2024.

My Assignment Help. Comparison Of Cellular Networks And Security Risks In LTE/LTE-A Networks: An Essay. [Internet]. My Assignment Help. 2021 [cited 29 March 2024]. Available from: https://myassignmenthelp.com/free-samples/mn603-wireless-networks-and-security/lte-a-network-security.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close