Abstract

In fifth generation (5G) new radio (NR), since the synchronization signal blocks are unencrypted during the initial access, an intelligent adversary can detect these signals to obtain the full physical cell identity (PCI) by sniffing, and then use the PCI to attack physical broadcast channel (PBCH) extraction by targeted jamming. Such kind of PBCH intelligent jamming (PBCH-IJ) will cause the failure of the master information block (MIB) decoding, and further result in severe denial of services for those users who want to access this PCI cell. In this letter, we propose to exploit the principal direction of PBCH demodulation reference signal space to detect PBCH-IJ at the user side, which is motivated by the fact that such principal direction under the low mobility scenarios will be significantly impacted if PBCH-IJ happens. Numeric results evaluate and confirm the effectiveness of our detection method.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.