Cyber security vulnerabilities during long term evolution power-saving discontinuous reception protocol
dc.contributor.advisor | McEachen, John C. | |
dc.contributor.advisor | Garren, David A. | |
dc.contributor.author | Jaffer, Navin | |
dc.date | Jun-14 | |
dc.date.accessioned | 2014-08-13T20:17:45Z | |
dc.date.available | 2014-08-13T20:17:45Z | |
dc.date.issued | 2014-06 | |
dc.identifier.uri | http://hdl.handle.net/10945/42650 | |
dc.description.abstract | Long Term Evolution (LTE) is a wireless access communications network that consists of base stations called eNodeBs (eNBs), which allow connectivity between the mobile device or user equipment (UE) and the core network. To save battery power, the UE can turn off its radio transceiver circuitry, based on various parameters exchanged during the attach procedure with its serving eNB, using a protocol called discontinuous reception (DRX). During the DRX period, the UE is still connected to the network and its receiver is turned on periodically to determine if the eNB has sent any packets to it. This thesis develops the concepts of using simulation to demonstrate if a denial of service attack during the long DRX period, as hypothesized by some researchers, can be realized. Requirements for experimentation were identified and current simulation tools were evaluated as potential candidates. The tools applied were the LTE standards, the open source ns-3 network simulator and analysis of actual LTE packet traces. Follow-on studies will be required in order to address issues due to the incompleteness of the ns-3 LTE model and the incompatibility of the file format for LTE traces with that required by the Wireshark network protocol analyzer. Essentially, neither tool contains the DRX algorithm. | en_US |
dc.description.uri | http://archive.org/details/cybersecurityvul1094542650 | |
dc.publisher | Monterey, California: Naval Postgraduate School | en_US |
dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
dc.title | Cyber security vulnerabilities during long term evolution power-saving discontinuous reception protocol | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Cyber Academic Group | |
dc.subject.author | long term evolution | en_US |
dc.subject.author | wireless access communications network | en_US |
dc.subject.author | discontinuous reception | en_US |
dc.subject.author | network simulation | en_US |
dc.subject.author | LTE | en_US |
dc.subject.author | DRX | en_US |
dc.description.service | Civilian, Department of Homeland Security | en_US |
etd.thesisdegree.name | Master of Science in Cyber Systems and Operations | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Cyber Systems and Operations | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.