Show simple item record

dc.contributor.advisorMcEachen, John C.
dc.contributor.advisorGarren, David A.
dc.contributor.authorJaffer, Navin
dc.dateJune 2014
dc.date.accessioned2014-08-13T20:17:45Z
dc.date.available2014-08-13T20:17:45Z
dc.date.issued2014-06
dc.identifier.urihttp://hdl.handle.net/10945/42650
dc.descriptionApproved for public release; distribution is unlimiteden_US
dc.description.abstractLong Term Evolution (LTE) is a wireless access communications network that consists of base stations called eNodeBs (eNBs), which allow connectivity between the mobile device or user equipment (UE) and the core network. To save battery power, the UE can turn off its radio transceiver circuitry, based on various parameters exchanged during the attach procedure with its serving eNB, using a protocol called discontinuous reception (DRX). During the DRX period, the UE is still connected to the network and its receiver is turned on periodically to determine if the eNB has sent any packets to it. This thesis develops the concepts of using simulation to demonstrate if a denial of service attack during the long DRX period, as hypothesized by some researchers, can be realized. Requirements for experimentation were identified and current simulation tools were evaluated as potential candidates. The tools applied were the LTE standards, the open source ns-3 network simulator and analysis of actual LTE packet traces. Follow-on studies will be required in order to address issues due to the incompleteness of the ns-3 LTE model and the incompatibility of the file format for LTE traces with that required by the Wireshark network protocol analyzer. Essentially, neither tool contains the DRX algorithm.en_US
dc.publisherMonterey, California: Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, may not be copyrighted.en_US
dc.titleCyber security vulnerabilities during long term evolution power-saving discontinuous reception protocolen_US
dc.typeThesisen_US
dc.contributor.departmentCyber Academic Group
dc.subject.authorlong term evolutionen_US
dc.subject.authorwireless access communications networken_US
dc.subject.authordiscontinuous receptionen_US
dc.subject.authornetwork simulationen_US
dc.subject.authorLTEen_US
dc.subject.authorDRXen_US
dc.description.serviceCivilian, Department of Homeland Securityen_US
etd.thesisdegree.nameMaster of Science in Cyber Systems and Operationsen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineCyber Systems and Operationsen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record