Comparison of the existing cellular networks generations
Wireless communication technology is defined as the wireless network in which a user can transfer data or signal from one person to another. The wireless network is used to communicate with other person and many users are using wireless communication to share their data or information. It consists of two main sources such as transmitter and receiver both these sources are used in the wireless communication process. The transmitter is used to transmit input signal and convert radio signal into an electric signal and receiver is used to receive the transmitted signal. The main point of wireless technology is that it can be sued for long distance communication. The main objective of this report is to evaluate various types of cellular networks, the architecture of LTE, and various threats occur in wireless networks [1]. LTE refer as long-term evolution which is modern cellular network through which users can send and receive data or information from another person. This report is explaining the difference between various kind of cellular network generation and architecture of LTE wireless network system. This report is divided into four parts such as Comparison of cellular networks, Architecture of LTE, Evaluation of LTE attacks, and Identification and analysis.
In mobile communication wireless network system play, a significant role and wireless communication changed the way of communication. Wireless network increased the speed of data or signal and they provide a platform where users can share their personal information’s. There are many cellular generations developed in the last few years such as 1G, 2G, 3G, 4G, and 5G. 1G is one of the oldest cellular generations and LTE is a very modern wireless technology [2].
This is a very old generation of a wireless communication system which is based on analogue technology. The first generation was developed in the year 1979 and this generation used radio signals to transfer data or information from one location to another and completely based on the analogue signal system. In this generation voice information modulated at 150 MHz frequency and modulation is done by FDMA process [3].
2G is developed after the first generation and this generation is based on a digital signal processor. This generation produced short message services to users and data rate of 2G is around 384 Kbps. The second generation developed different types of the mobile network system, SMS, and MMS services. In which barrier services and the system is one of the best developments of the second generation and it was launched in the year 1991 [3].
First Generation
The third generation of the cellular network is based on a wideband network system which reduced many drawbacks of the second generation. This generation produced around 200 Kbps data rate and it is operated at 2100 Hz frequency which is very better rather than second generation. This generation developed many services such as vertical integration, a top-down process, and a service provider approach. The third generation is defined as a service provider which used licensed spectrum and bandwidth of this generation is between 15 and 20 megahertz [4].
The fourth generation is a conceptual outline of the wireless network system and main advantage of this generation is that it increased overall data speed of signals. This generation can provide around 100 Mb per second speed and it can be used for long-distance communication. The fourth generation is based on internet protocol which can be used in many mobile systems and this generation developed many network services through which people can communicate with another person [5]. In this generation people developed many mobile services such as internet connectivity, hotspot and they can connect two or more peripheral devices.
This is upcoming technology which is completely based on digital communication and it is estimated that this generation will develop in the year 2020. This technology will be based on software-defined technology and modulation technology. It is observed that 5G can improve the overall performance of the wireless networks system and will increase data speed. There are several assumptions that the fifth generation will produce which are following
- Low power utilization
- Increase performance and productivity
- Increase data speed
- Low infrastructure cost
- Improve scalability and flexibility [5].
LTE is defined as long-term evaluation which is modern technology in the field of wireless communication and increased performance and data speed of signal or information. LTE is also called an evolved packet system which is divided into two parts such as LTE entities and EPC entities. LTE entities consist of UE and eNB and EPC entities various parts such as S-GW, MME, OCS, HSS, P-GW PCRF, SPR, and OFCS [6].
UE: It is used to interconnect two or more eNB with LTE-Uu interface
ENB: This part provides a platform to use radio interfaces and produce radio resources for users [7].
Figure: LTE Architecture
(Source: Fu, Song, Li, Zhang, 2016)
MME: An MME is the main part of this entity and it interacts with HSS for customer authentication and users can communicate with another person.
S-GW: this is used to produce an interface system between MME and E-UTRAN.
Second generation
P-GW: A P-GW delivers a UE to access PDN and develop IP address for every wireless network system. This part also produces packet filtering, policy enforcement, and charging based PCC.
HSS: It is defined as the central DB process which is used to store data or information of users. The main application of this part is that it delivers customer authentication data and personal profile to the MME [8].
PCRF: It refers to a policy or strategy which is used for SDFs and PCC rules.
SPR: this part of an entity is used to provide subscription data or information to the PCRF and also produce PCC rules and regulation.
OCS: There are main two objectives of OCS such as produce real-time control system and charging based function like volume, event and time.
OFCS: An OFCS deliver CDR based data or information to wireless network systems.
There are many LTE attacks on access network which are describing in this chapter and some of them are explaining below
IMSI is defined as an identity subscription process which is used by many telecommunication communities for the identification process. Long-term evolution network reduced the transmission frequency of IMSI over the air interface. Discloser of the IMSI can reduce the security of users, information, the location of information, and also reduce conversion information [9].
The area information of cell phones user’s are considered as private individual data. The plan of portable correspondence advances permits the versatile administrators to know the physical areas of the clients to perform persistent cell administrations. What’s more, the progress of on-going situating innovations and area-based administrations likewise represent a danger to client area privacy. In LTE signal or data transmitted in free space which can be easily hacked by several processes through which user can reduce their privacy and personal information [9].
This is the very common problem in wireless communication because in wireless communication signal transfer from one source to another without using an electric wire and in free space many losses and RF jamming occur [10]. Jamming means receiver does not receive the proper output signal and many factors which are reduced the signal to noise ratio of user transmitted signal.
Denial of service and distributed DOS both are a very common problem or attack on LTE networks system. A simple process of DOS attack is that hackers send spam emails and message to encrypt human-computer system and servers. In this type of attack, a hacker can produce heavy traffic volume by using a botnet system and block all personal files of users [11].
Third generation
Core network plays a significant role in the field of communication and DOS/DDOS both are a very serious problem in data transmission. A mobile botnet is a process which is used in DOS attack and it produces spam messages to the user after that enter into user personal servers and computer systems [12].
Insider attack refers as a threat in which hacker enter into user server and encrypt all personal data or information. There are many cyber-attacks involved in insider attack and hackers communicate with users by sending emails and messages [12]. This type of attack block base station and shut down communication process by which the user cannot communicate with other.
LTE is a wireless network system in which signal transmission into the air through which user does not receive the proper output signal. There are many threats and attacks occur in LTE such as RF jamming, DOS/DDOS, discloser of IMSI, location tracking and cyber-attacks. In all these cyber-attacks DOS/DDOS is one of the highest risk attacks which are increasing rapidly in the last few years [13].
DOS and Distributed Denial of Service (DDOS) assaults are both serious assaults on the LTE/LTE-A system. A typical technique for DOS assaults is that assailants send surges of messages to an objective server and fumes its CPU assets, making the objective unfit to give administrations to honest to goodness clients. Notwithstanding this kind of DOS assaults, different DOS assaults continuously abuse the escape clause in the LTE/LTE-A system convention. In the DDOS assaults, assailants can produce substantial activity volume utilizing botnet overseen by Command and Control Focuses (C&C) or hacked portable UE. An assailant can mishandle the security escape clauses of the working framework and applications downloaded from application stores to trade off versatile gadgets. DOS assaults have one single aggressor, and the activity perniciously produced is of low volume [13]. DDOS assaults have high movement volume, and they can be propelled by an expansive number of numerous gadgets that are all around synchronized.
Denial of service is a very common problem in wireless communication and this type of attack reduced security systems. It is observed that in the year 2017 around one thousand servers and computer systems hacked by hackers. Therefore people can reduce this type of problem by increasing security systems, using an encryption method, use of firewall software, and pattern recognition [13]. In which encryption method and pattern recognition both are the very popular method to reduce the problem of DOS and DDOS.
Conclusion
The wireless network is an advanced version of the wired technology in which transmitter and receiver both are not connected with any electric wires. Long-term evolution is the latest wireless technology which is used for communication purpose and architecture of LTE explained in this report. There are many attacks and threats occur in LTE such as location tracking, RF signal jamming, DOS/DDOS attack and discloser of IMSI. This report described various LTE attack on access network and core network and also explained the architecture of LTE network.
References
- A., Fu, J., Song, S., Li, G. Zhang and Y., Zhang,” A privacy?preserving group authentication protocol for machine?type communication in LTE/LTE?A networks.” Security and Communication Networks, vol. 9, no. 13, pp.2002-2014, 2016.
- A., Fu, N., Qin, Y., Wang, Q. Li and G., Zhang, “N frame: A privacy-preserving with non-frame ability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks.” Wireless Networks, vol. 23, no. 7, pp.2165-2176, 2017.
- A.G., Valkó, “Cellular IP: A new approach to Internet host mobility.” ACM SIGCOMM computer communication review, vol. 29, no. 1, pp.50-65, 2012.
- F. Ghavimi and, H.H., Chen, “M2M communications in 3GPP LTE/LTE-A networks: Architectures, service requirements, challenges, and applications.” IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp.525-549, 2015.
- F.M., Chiussi, D.A. Khotimsky and S., Krishnan, “Mobility management in third-generation all-IP networks.” IEEE Communications Magazine, vol. 40, no. 9, pp.124-135, 2009.
- G., Araniti, C., Campolo, M., Condoluci, A. Iera and A., Molinaro, “LTE for vehicular networking: a survey.” IEEE communications magazine, vol. 51, no. 5, pp.148-157, 2013.
- I.F., Akyildiz, J. Xie and S., Mohanty, “A survey of mobility management in next-generation all-IP-based wireless systems.” IEEE Wireless Communications, vol. 11, no. 4, pp.16-28, 2008.
- L., He, Z. Yan and M., Atiquzzaman, “LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey.” IEEE Access, 6, pp.4220-4242, 2018.
- M., Agiwal, A. Roy and N., Saxena, “Next generation 5G wireless networks: A comprehensive survey.” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp.1617-1655, 2016.
- M., Labib, V., Marojevic, J.H. Reed and, A.I., Zaghloul, “Enhancing the robustness of LTE systems: analysis and evolution of the cell selection process.” IEEE Communications Magazine, vol. 55, no. 2, pp.208-215, 2017.
- M.N., Tehrani, M. Uysal and H., Yanikomeroglu, “Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions.” IEEE Communications Magazine, vol. 52, no. 5, pp.86-92, 2014.
- S., Dixit, S. Periyalwar and H., Yanikomeroglu, “Secondary user access in LTE architecture based on a base-station-centric framework with dynamic pricing.” IEEE Transactions on Vehicular Technology, vol. 62, no. 1, pp.284-296, 2013.
- X., Li, A., Gani, R. Salleh and O., Zakaria, “The future of mobile wireless communication networks.” In 2009 International Conference on Communication Software and Networks, vol. 16, pp. 554-557, 2009.