logo

Evaluation of LTE/LTE-A Network Security

   

Added on  2023-06-07

9 Pages2427 Words132 Views
 | 
 | 
 | 
LTE networks 0
Evaluation of LTE/LTE-A Network Security
Evaluation of LTE/LTE-A Network Security_1

LTE NETWORKS
1
Introduction
LTE refer as long-term evaluation which
provides modern communication
services to many people and it increased
the performance and efficiency of
cellular networks [1]. There are many
advantages of this network, for example,
higher bandwidth, more effective,
reduced distortion losses [2]. It also
suffers from many attacks and threats
which are explaining in this report and
to achieve LTE security measurements
many security plans developed in the
last few years [2]. The main aim of this
report is to evaluate various cellular
generation and architecture of LTE
network. This report categorises into
four parts, for example, the comparison
between cellular network generations,
LTE architecture, LTE attacks on access
network and core networks, and
identification of biggest LTE attack [3].
Comparison of the existing cellular
networks generations
The wireless network is a system which
is used to produce a communication
step between two or more person [4].
The main concept of this network is that
it can be used to transmit the signal over
long distance and improved
performance of cellular networks [4].
There are various kinds of cellular
networks generation, for example, 1G,
2G, 3G, 4G, and 5G and all this
generation is explaining in this part.
First generation
This technology is completely based on
analogy technology in which an input
signal transmits in the form of analog
signals [5]. This is one of the first
processes which use frequency
modulation and FDD methods for
communication purpose. The frequency
modulation method work on 150 MHz
frequency and a channel bandwidth of
1G is around 30 KHz.
Second generation
This is an advanced generation of
mobile network which uses digital
communication system because analog
technology reduces data speed and
strength of signals [5]. In which digital
modulation technology is used rather
than frequency modulation that
increases the efficiency of mobile
networks. The uplink frequency of 2G is
890 MHz and downlink frequency is 935
MHz and bandwidth of this network is
around 25 MHz [6].
Evaluation of LTE/LTE-A Network Security_2

LTE NETWORKS
2
Figure: Comparison between cellular
network generations [8].
(Source: Pavloski, Görbil, and Gelenbe,
2013)
Third generation
This generation was developed after 2.5
G and the main objective of 3G is to
increase internet speed in mobile
networks [6]. It developed video
conferencing and multiple
communication systems and also helpful
for business industries. 3G networks
also produce video calling, internet
access, multimedia services, and gaming
services. It uses W-CDMA and FDD
technologies for communication and a
channel bandwidth of this is 5 GHz. The
channel bit rate of the third generation
is around 2.2 megabits per seconds [7].
Fourth Generation
This is a conceptual outline of a mobile
network that provides high data speed
for internet and it can support around
100 megabits per second internet speed
[8]. LTE was developed in the year 2010
that increased overall performance and
efficiency of many cellular networks.
This generation uses OFDM and CDMA
technology to transmit signals and also
uses the FFT process which increases
the productivity of mobile networks [8].
Fifth generation
This is future mobile generation which
will develop in the year 2020 and it is
estimated that this generation will avoid
the problem of security and produce
high-speed connectivity. It can change
the way of communication and people
can increase the communication system
by using this generation [9]. This will
support 1000 fold gains and can provide
10 GB per second internet speed. This
generation will use RAT technology and
include current wireless networks like
LTE, GSM, and Wi-Fi.
LTE of Architecture
The design of LTE is isolated into two
sections, for example, a radio access
system and centre system. The LTE get
to arrange is otherwise called E-UTRAN
Evaluation of LTE/LTE-A Network Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents