• Login
    View Item 
    •   SMARTech Home
    • Georgia Tech Theses and Dissertations
    • Georgia Tech Theses and Dissertations
    • View Item
    •   SMARTech Home
    • Georgia Tech Theses and Dissertations
    • Georgia Tech Theses and Dissertations
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Resilience of LTE networks against smart jamming attacks: A game-theoretic approach

    Thumbnail
    View/Open
    AZIZ-DISSERTATION-2017.pdf (1.623Mb)
    Date
    2017-05-03
    Author
    Aziz, Farhan Muhammad
    Metadata
    Show full item record
    Abstract
    The objectives of this research are to identify security vulnerabilities in LTE/LTE-A air interface; model the network and the smart jammer dynamics under realistic constraints; and devise adept algorithms that can help the network combat smart jamming attacks autonomously. LTE/LTE-A networks provide advanced data, Voice-over-IP (VoIP), multimedia, and location-based services to more than a billion subscribers around the world. Lately, it has been suggested to utilize commercially and privately-owned LTE/LTE-A networks for mission-critical applications like public safety, smart grid and military communications. Although LTE/LTE-A air interface provides ease of accessibility, flexibility, mobility support, low latency, high data rates, and economy of scale, it also raises serious security concerns. It is shown that the LTE air interface is vulnerable to denial-of-service (DoS) and loss of service attacks from power and bandwidth-limited smart jammers, without being hacked by them. The interaction between the network and the smart jammer is modeled as a two-player infinite-horizon Bayesian game with asymmetric information, with the network being the uninformed player. This research investigates the smart jamming problem in LTE/LTE-A networks, by using heuristic analysis, threat mechanism, game-theoretic and reinforcement learning and regret minimization in repeated games to construct autonomous policies for the network to help it combat these attacks. Moreover, this work is focused on devising policies (algorithms) that can be practically deployed in current networks under realistic constraints, without modifying 3GPP specifications.
    URI
    http://hdl.handle.net/1853/58635
    Collections
    • Georgia Tech Theses and Dissertations [23877]
    • School of Electrical and Computer Engineering Theses and Dissertations [3381]

    Browse

    All of SMARTechCommunities & CollectionsDatesAuthorsTitlesSubjectsTypesThis CollectionDatesAuthorsTitlesSubjectsTypes

    My SMARTech

    Login

    Statistics

    View Usage StatisticsView Google Analytics Statistics
    facebook instagram twitter youtube
    • My Account
    • Contact us
    • Directory
    • Campus Map
    • Support/Give
    • Library Accessibility
      • About SMARTech
      • SMARTech Terms of Use
    Georgia Tech Library266 4th Street NW, Atlanta, GA 30332
    404.894.4500
    • Emergency Information
    • Legal and Privacy Information
    • Human Trafficking Notice
    • Accessibility
    • Accountability
    • Accreditation
    • Employment
    © 2020 Georgia Institute of Technology