Skip to main content

Long Term Evolution (LTE) Under Risk?

You have been hearing a lot about Long Term Evolution (LTE) these days, haven’t you? From AT&T, T-Mobile, Verizon, and other carriers, there are a lot of LTE smartphones today. This is 4G mobile broadband service promising data speeds of nearly 200 mbps, much greater than the current infrastructure allows. And this may be the reason why the US government has based its nation-wide broadband network known as Nationwide Public Safety Broadband Network (NPSBN) on LTE.

NPSBN uses LTE technology in order to keep the people of the country secure. However, there is a recent filing done by Virginia Tech Wireless [[wireless.vt.edu]] to the National Telecommunications and Information Administration (NTIA) that informs how unsafe and prone to attack an LTE system could be. Find the filing here:



As soon as the file has been released, it has gained the attention from blogosphere on technology. This is something we find very serious. The entire 4G LTE network of a particular region such as a city could be disabled by simple jamming equipment that fits in a suitcase.

Virginia Tech has predicted the occurrence of the attack within the next five or ten years, however. Also, we may not know how popular the NPSBN will become in the coming days. This could be a very insecure and dangerous move by the government.

Various jamming methods as described by Virginia Tech include the following:

1. SSJ or Synchronization Signal Jamming



This attack denies access to a smartphone or such device to even access the tower for communication. It does so by jamming the preliminary activities carried out by the smartphone in tower access. With LTE, it is said that the synchronization with the tower is a time-consuming multi-step process that makes LTE vulnerable to this attack.

2. Primary Synchronization Signal Jamming (PSSJ)



In order to establish communication, the smartphone needs to detect the primary synchronization signal from the tower. This type of attack, unlike the previous one, targets only the PSS. There are only three sequences used by LTE to initiate PSS, and a jammer could easily mimic one of these sequences to create a false PSS signal thus denying the smartphone access.

3. Physical Uplink Control Channel Jamming



When transmitting data in LTE, the PUCCH (Physical Uplink Control Channel) is used to transmit such information as channel quality indications, Hybrid Automatic Repeat Request acknowledgements, etc. When the smartphone is doing this, it is not transmitting anything else. This makes it easy for the jammer to take advantage of PUCCH. The smartphone just sends a tiny amount of energy in PUCCH slot in order to get better uplink resources from the carrier. If the jammer simply mimics this part, it can enable better uplink for all of the devices in the area, thus creating unnecessary load.

Based on these findings, the filing to NTIA and other telecommunication organizations assumes great importance. LTE has become far and wide today and it should be secure for better communication.

Popular posts from this blog

What Is the Role of a Firewall, and How Does It Secure a Network From Unsafe Traffic?

To understand firewalls, basic understanding of how networks function is requisite. Deep down, how do the packets of information that you send reach the intended receivers? How do the messages intended for you reach you safely? And how does it all function like clockwork? Let’s understand the basics of firewalls and see how a firewall secures the traffic in and out of a network. Consider this scenario for getting an understanding of how firewalls work. Say, you open up your browser to book a flight ticket for your upcoming vacation, and your computer is conveniently insecure without a firewall. Let’s say you come across an intriguing email that gives an offer you can’t refuse. You open the email and click a link, and bam! An unwanted piece of spyware is installed on your system. The spyware then proceeds to sit on your system tray, hidden from your eyes, tracking the keystrokes you make, reading the top-secret files you have, and looking for potentially rewarding information, such...

Which to Select out of the Hot Range of Windows 8 Phones?

Windows Phone 8 operating system will be released by the end of this month. Microsoft has the event scheduled on 29th of this month. In the coming days, a number of phones will be released all containing Windows Phone 8. With the operating system being highly successful after Microsoft’s hot design strategy and awesome interoperability, device manufacturers are highly ambitious about their devices. HTC, Samsung, and Nokia are all set to reveal their Windows 8 smartphones. Let’s look at some of the hot contenders in this category and see which seems to be the good choice for customers. The Devices Here are the Windows Phone 8 phones expected to be launched in the coming days. Nokia: Lumia 920, Lumia 820 HTC: Windows Phone 8X, 8S Samsung: ATIV S Hardware Specifications Being Microsoft’s preferred choice of device manufacturers, Nokia came up with the first breakthrough device after the failure of Symbian, with the Lumia series. Now, they have two phones coming, ...

How to Send Email in Your Own Language Script Through Gmail?

Have you ever had trouble sending an email to a distant relative who speaks a different language altogether? It has never been easy on email applications to send messages in other languages. Google’s popular email service, Gmail has come up with transliteration tools and other language input tools to make the service much better. You can type using Gmail interface in any language that you want. First of all, you need to select the languages that you want to use in composer. For this, go to Gmail settings and you will see the ‘Language’ option under General. Here, go to advanced language options and put a check mark to ‘Enable input tools’. Here, you can transliterate (type in English the words in other languages to have them appear in correct script), use a virtual keyboard, or edit your input method with the help of a regular keyboard to convert words into other alphabet. Transliteration feature was available although limited in Gmail. Select the input tools from the list by d...