<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Undercover Disruption: Stealth Jamming Attacks on 5G Synchronization Stages</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Rosolino Alaimo</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Roberto Corallo</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Silvia Schilleci</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alessandra Dino</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Stefano Mangione</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ilenia Tinnirello</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Domenico Garlisi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CNIT</institution>
          ,
          <addr-line>Parma</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Palermo, Engineering Department</institution>
          ,
          <addr-line>Palermo</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Palermo, Mathematic and Computer Science Department</institution>
          ,
          <addr-line>Palermo</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper presents a comprehensive study on selective jamming, focusing on its impact on the synchronization phases of the 5G New Radio (NR). We introduce STORM, a novel framework tool designed to assess jamming attacks on the cell search phases of 5G User Equipment (UE). The research incorporates both simulation and experimental evaluations, providing a detailed account of the methodology employed. A unique aspect of the proposed approach is the implementation of a jamming technique that remains undetectable to external entities due to its synchronization with the gNB's Synchronization Signal Block (SSB). Furthermore, the implemented jamming operates at a duty cycle of 3.55% of continuous jamming, leading to significant optimization in terms of energy consumption and computational resources. STORM underscores that the success rate of jamming attacks and the necessary Signal to Interference Ratio (SIR) for efective disruption are significantly influenced by the specific configurations of the jamming signal. The paper discovers that the Primary Synchronization Signal (PSS) exhibits a higher degree of resilience compared to the Secondary Synchronization Signal (SSS), requiring a greater jammer transmission power to interfere with the cell search procedure.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Selective Jamming</kwd>
        <kwd>5G</kwd>
        <kwd>Jamming Attacks</kwd>
        <kwd>User Equipment</kwd>
        <kwd>5G security</kwd>
        <kwd>PSS</kwd>
        <kwd>SSS</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        5th Generation (5G) cellular systems are essential technologies supporting society with numerous
services and applications, providing ultra-low latency, high-speed connections across a rapidly growing
number of devices [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ][
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Due to their widespread use, commercial mobile communication networks
are also susceptible to malicious attacks to access or to interfere with network operations. One of
the most significant threats in this context is jamming, which consists in the transmission of a Radio
Frequency (RF) signal to alter, or disrupt, a target signal, by reducing its Signal-to-noise Ratio (SNR) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        Recently, more sofisticate jamming techniques are represented from smart jamming attacks, they
operate with low power, target selected devices and frequency bands [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. In this work, we focus on
smart jamming techniques that attack 5G physical network channels, specifically the Physical Broadcast
Channel (PBCH) or the Physical Random Access Channel (PRACH), causing severe disruptions by
blocking the access of User Equipment (UE) to the network, or preventing the periodical UE
synchronization. In this context, the PBCH represents a target of the jamming attacks, as well as the 5G networks
synchronization process. There are several kinds of jamming, such as delusive, random, responsive,
go-next, or control channel jammers, according to the duty cycle of the injected signal, or if the jammer
is synchronized with the 5G network, and whether it targets shared or dedicated channels [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>In this article, we present STORM (Stealthy Timing Obstruction and Radio Assessment) framework.
This framework is designed to explore the impact of covert jamming on the synchronization phases
of 5G networks, with a particular focus on studying the efects of selective jamming in specific time
and frequency domains. Our approach specifically targets Synchronization Signal Block ( SSB), to jam
the Primary Synchronization Signal (PSS) and Secondary Synchronization Signal (SSS) components,
thus preventing UEs from completing the synchronization process. This precise and selective strategy
maximizes the impact of the attack, minimizing power consumption and avoiding unnecessary
interference. Furthermore, the attack remains hidden, as it does not introduce detectable changes in spectrum
utilization, making it dificult to identify. The standard provides for an SSB boost; therefore, even if
jamming is performed at higher power levels in a selective manner, it remains dificult to determine
whether such selective jamming is actually present.</p>
      <p>(a)
(b)</p>
      <p>The system architecture, presented in Fig. 1a, shows the target scenario, it exploits open-source
platforms to replicate a complete 5G scenario. Open5GS is used for the 5G core, srsRAN for the gNB
and UE, finally, we extend the capabilities of free5GRAN 1 to implement the STORM framework. The
gNB, UE, and jamming stations are individually associated with distinct Software Defined Radio (SDR)
units. For the purpose of this experimental study, we have employed National Instruments’ USRP
(Universal Software Radio Peripheral) devices, opting specifically for the USRP-B210 model. Notably,
free5GRAN is not inherently designed for jamming purposes, but just for the cell search phase. As part
of this work, we developed and integrated STORM within free5GRAN, enabling it to perform and study
hidden attacks selectively in time and frequency. This framework automatically extracts target cell
parameters from broadcast channels and performs jamming attacks based on these parameters. We
study the efect of the attack by analyzing the association phase of the UE under varying interference
power and area. Moreover, our experimental evaluation is supported by simulated evaluation enforced
with the MATLAB 5G toolbox2.</p>
      <p>
        More specifically, we consider a scenario where an adversary targets a 5G base station with a
timeselective jamming attack aimed specifically at disrupting the SSB, while avoiding interference with
other parts of the transmission. The attacker begins by listening to the broadcasted system information
from the target 5G cell, extracting critical parameters like the periodicity and timing of SSB. Using
this information, the attacker synchronizes with the base station frame structure to precisely time
the jamming signal targeting only the SSB bursts. This selective targeting efectively blocks users
from detecting and associating with the cell, disrupting network access. The technique presents key
challenges such as ensuring precise timing synchronization, which is achieved by the implementation
of a strictly time synchronization between the host and the radio. Detection is minimized because the
1https://github.com/free5G/free5GRAN
2https://it.mathworks.com/products/5g.html
attack afects only the SSB, while other parts of the transmission remain untouched, making it harder for
network security to detect interference. Consequently, new device associations are prevented, denying
service to users within the coverage area without afecting ongoing communications. The reduced
transmission power also contributes to the dificulty for operators to detect and address the attack.
Background The 5G NR cell search procedure for a user, which involves signal detection and
synchronization, laying the groundwork for understanding the subsequent communication procedures
and jamming techniques. A device must perform a cell search to connect to a 5G cell. The first step of
this process is to select the nearest cell that, typically, transmits stronger signals for that device. UE
discards weaker signals and selects the strongest ones to ensure better Quality of Service (QoS). The cell
search begins by detecting the SSB block, which is composed of three elements: PSS, SSS, and PBCH.
As visible in Fig. 1b, they are mapped to 4 OFDM symbols in the time domain and 240 contiguous
subcarriers (20 Resources Blocks) in the frequency domain [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        During the cell search, PSS and SSS are used, respectively, for time and frequency synchronization.
There are 3 diferent combinations for PSS and 336 for the SSS. With the first one we can obtain
and (1) with the second one. The UE extrapolates the Physical Cell ID (PCI) as:
  = 3(2) + (1).
(2),
(1)
The PBCH, the third element of the SSB, contains the Master Information Block (MIB), which contains
the common search space parameters needed to detect the System Information Block 1 (SIB 1), which
itself carries the information needed to initiate a Random Access procedure. This process also supports
mobility functions, such as handovers and cell reselection. Ultimately, the gNB assigns a Radio Network
Identifier (RNTI) to the UE and supplies it with the essential parameters needed to decode Downlink
Control Information (DCI). With this process complete, the UE is now registered and ready to exchange
data with the network. For the initial synchronization process, the UE scans the possible frequencies
where the SSB could be transmitted by the gNB, within the cell, called Global Synchronization Channel
Numbers (GSCN). This process involves both PSS and SSS signals and is known as Synchronization Signal
(SS) detection. Coarse time and frequency synchronization is performed by time-domain correlation
between the received signal [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]-[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and the 3 possible PSS sequences. The value of (2) parameter
is selected from the sequence that obtained the maximum correlation peak value. Subsequently, fine
synchronization (and subsequent tracking of time and frequency errors) is performed by frequency
domain correlation with the SSS sequences; again, (1) is selected from the SSS sequence yielding the
maximum correlation. Now, the UE can decode the PBCH, that contains the MIB. It provides information
about the cell, such as the System Frame Number (SFN), Subcarrier Spacing (SCS), and the Common
Search Space parameters required to search for the CORESET 0 (the first control channel message) and
its associated shared channel message, the SIB 1, carrying the whole cell configuration parameters.
Main contribution In this work, we propose a methodology and an experimental evaluation to
study how jamming attacks on cell search procedures can disrupt UE association process. The primary
contribution of this paper is to ofer a comprehensive investigation of these issues, evaluating the
risks associated with jamming attacks on 5G NR cell search and synchronization phases, especially
formulated from hidden jamming techniques. We demonstrate an integration of cell search and jamming
functionality within the same framework. Our main contributions can be summarized as follows:
1. We demonstrate the integration of cell search and jamming functionalities within a unified
framework. This allows the jammer to leverage extracted cell parameters, including the configurations
of the PSS and SSS, to enable highly efective jamming strategies;
2. We demonstrate how high-performance covert jamming techniques, selective in time and
frequency, can disrupt 5G synchronization phases. Furthermore, we investigate their impact across
diferent areas of the SSB.
      </p>
      <p>To validate our analysis, we conduct both simulations and real-world experiments. The structure is
organized as follows: Section 2 revisits briefly the state-of-the-art time and frequency synchronization
techniques of jamming attacks and their applications on Orthogonal Frequency Division Multiplexing
(OFDM) systems and 5G networks; Section 3 defines our system framework; Section 4 summarizes the
results of this work; Section 5 draws the conclusions.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        There are several types of jamming attacks targeting a 5G NR cell, depending on the specific
physical channel being targeted: PBCH, Physical Downlink Control Channel (PDCCH), Physical Uplink
Control Channel (PUCCH), or Physical Downlink Shared Channel/Physical Uplink Shared Channel
(PDSCH/PUSCH). These attacks are designed to interfere with the broadcast, control, or data channels
(both downlink and uplink) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. One of the most critical characteristics of an efective jammer is its
high energy eficiency, which enables the creation of a low-cost device while maintaining a suficient
coverage range. To achieve this, a jammer can be specifically designed to target particular subcarriers
of physical channels by fine-tuning key parameters such as central frequency, time synchronization,
and bandwidth. In the remainder of this paper, we use the term ’time selective jammer’ to refer to a
jamming technique where the jamming duration is time-limited and overlaps with specific portions
of the reference signal. Conversely, we use ’frequency selective jamming’ to refer to the obstruction
of only a subset of the subcarriers utilized by the modulation. Moreover, we will discuss about SSB
jamming attack; our jammer is designed to attack PSS, SSS, and PBCH, before communication between
gNB and UE can even begin. Due to the low Signal to Interference Ratio (SIR) of the received signal,
UEs will be unable to decode PBCH and synchronize to the cell [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Also, jamming the SSs will cause
already synchronized UEs to lose synchronization and disconnect.
      </p>
      <p>
        Many studies have delved into strategies for executing synchronized attacks on wireless networks,
each concentrating on various facets of time and frequency synchronization. Most of these studies are
related to jamming in OFDM systems. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] analyses attacks designed to compromise time
synchronization during the signal acquisition phase. The authors focus on techniques such as the false preamble
timing attack, which exploits knowledge of the preamble to introduce false peaks in the correlation
phase.
      </p>
      <p>
        A more comprehensive analysis of time and frequency synchronization is presented by the authors
in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], they focus on pilot tone attacks in MIMO-OFDM systems. This study shows that jamming
synchronization in both domains (time and frequency) maximizes the efectiveness of the attack,
while time or frequency mismatches significantly reduce the impact. For example, a temporal ofset
of 25% results in a loss of efectiveness of about 0.5 dB, while a normalized frequency ofset of 0.5
can reduce jamming performance by up to 3 dB. This work emphasizes the importance of combined
synchronization to ensure efective attacks. Instead, in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] authors expand the focus on practical
approaches to selective jamming in modern environments such as private 5G and NB-IoT networks.
Here, the focus shifts to frequency synchronization to jam specific OFDM domain resources, such as
pilot tones, while minimizing power consumption. The authors show how the use of targeted jamming
signals can drastically reduce the accuracy of channel estimates, with a significant impact on the
quality of service. Although time synchronization is less emphasized, the proposed selective approach
represents an efective and discrete solution, suitable for advanced operational scenarios. These studies
highlight complementary approaches to synchronization for jamming. The presence of only temporal
synchronization is useful for attacks that aim to confuse temporal metrics, such as attacks on preambles.
However, the integration of frequency synchronization allows for more sophisticated attacks, such as
those on pilot tones or in selective jamming contexts, better suited to modern technologies. In contrast
to the aforementioned works, our approach proposes the design of a jammer that synchronizes in both
the time and frequency domains, allowing it to directly target the SSB.
      </p>
      <p>Our method uniquely focuses on the PSS, SSS and PBCH within the SSB and produce selective jamming
in time and frequency. This precise and selective strategy not only amplifies the efectiveness of the attack
while minimizing unnecessary interference but also makes the jamming virtually undetectable. The
disruption remains concealed until the decoding process fails, ensuring the jamming blends seamlessly
with standard signal activity, maintaining a covert and indistinguishable profile.</p>
    </sec>
    <sec id="sec-3">
      <title>3. System architecture and characterization</title>
      <p>Initially, we developed a continuous jammer tuned to the central frequency of the SSB with adjustable
bandwidth, allowing us to assess the extent of synchronization disruption between the UE and gNB by
targeting diferent portions of the SSB. Transitioning to free5GRAN, we successfully integrated both
the cell search and jamming processes into a unified system, called STORM. This enabled us to extract
critical parameters to ensure precise overlap between the extracted SSB signal and the transmitted
jamming signal, both in time and frequency. During the cell search phase, the raw signals received
over the air are stored in a Rx bufer composed of 100 elements. Each of the elements in the RX bufer
contains 10 of data received from the USRP-B210 (sampling rate set to 23.04 ), as shown in Fig.
2.</p>
      <p>Bufer elements are processed in pairs, each corresponding to a 20 trace, to ascertain the presence
or absence of the SSB. This process is repeated iteratively until a gNB is successfully detected. Upon
successful PBCH decoding and MIB extraction, critical parameters essential for ensuring an acceptable
time synchronization between the jammer and the SSB can be obtained. By identifying the element in
the RX bufer that contains the SSB, along with the first sample of the PSS, we can pinpoint the start of
the entire SSB block. Each first sample of the received elements is associated with a timestamp derived
from the USRP-B210 clock. This mechanism ensures an accurate estimation of the acquisition time for
the first sample of each element in the RX bufer.</p>
      <p>Based on this measurement, the time    can be derived, representing the time interval
between the reference time of the USRP-B210 and the start of the first element in the SSB block.
∆  =</p>
      <p>=  + ∆ 
(2)</p>
      <p>By knowing the SSB period  (10 in our experimental setup), the first sample of the next SSB
block can be determined by incrementing    by multiples of . The next step involves
continuously monitoring the USRP-B210 timer and identifying the first available time instant to transmit
the jamming signal,   _   calculated as    plus  or its multiples (Fig.
3a).</p>
      <p>A circular temporal bufer, shown in Fig. 2, is created for the TX phase. This bufer will be used to
transmit the jamming signal once the USRP timer reaches the value    _  . The TX
bufer contains white noise samples to be transmitted at the appropriate moment during the subsequent
jamming phase. The parameters required to construct the jammer signal were determined following
the 3GPP standard3.</p>
      <p>The transmission bufer consists of  = 23.04 · 106 samples. Therefore, with a sampling frequency
of  = 23.04 MHz, the TX bufer is transmitted throughout one second and subsequently retransmitted
cyclically. The samples in the bufer consist of white noise and are arranged to transmit four symbols
during each  period as illustrated in Fig. 2.</p>
      <p>According to the 3GPP standards, the number of samples per symbol is calculated as follows:
1 9
 =  · (1 + 128 ) ·  = 1644
(3)
Finally, the number of samples required to transmit the four symbols of the SSB is 4 ·  = 6576
or time duration of 274. During a  period, 10 = 100 samples are transmitted. To achieve
this, 4 samples of white noise are transmitted first, followed by 10 − 4 samples set
to zero. This process is repeated until the bufer is fully populated, as illustrated in Fig. 2.</p>
      <p>Characterization of the synchronization proposed scheme To ensure the precise alignment
between the jamming signal transmitted by STORM and the SSB broadcast by the gNB, we considered
it essential to examine the system latency during the monitoring of the USRP timer. Consequently,
we conducted an experimental evaluation to characterize the delay introduced by monitoring the
USRP-B210 timer, and thus the delay in the process interaction between the host and the USRP device.
We executed 100, 000 requests and derived the probability distribution of the response times. The
histogram of this probability distribution is presented in Fig. 3b. The host system used is noted in the
footnote4. The average response time is 81, for this reason we extend the duration of the noise signal
to 355(274 + 81) which represents the statistical uncertainty of the implemented system.</p>
      <p>Finally, Fig. 4 shows the waterfall that demonstrates the efect of STORM in jamming the SSB signal.
Improvement due to the time-selective jamming We present now a discussion about the
diferences between a non-selective and a time-selective jamming attack. In particular, Fig.3c compares the
impact of the two strategies on the correlation peak value for the SSS sequence during the
synchronization process. The two methods are simulated through MATLAB 5G Toolbox. The SSB is produced, and
a noise signal is subsequently introduced at the receiver side. Specifically, the first attack is simulated
by adding to SSB a normalized white noise signal which covers all symbols and consequently includes
also the PBCH subcarriers present at symbols 1 and 3 (see Fig.1b); in the second case, instead, the noise
signal covers only symbol 0 and 2 and consequently the attack is performed only on PSS and SSS. As
Fig.3c shows, the SSS correlation peaks go under 0.6 value when the SIR is lower than 1 in the first
case, and when the SIR is 0 in the second case. So, we obtain the same efect on synchronization
signals impairment but significantly reduced energy and computational eforts because we move from
a 100% to 3.55% (355/10) of duty cycle.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Experimental Evaluation</title>
      <p>
        In this section, we showcase the outcomes of the time-selective jamming attack on a 5G network, we
design an experimental setup involving three hosts, each equipped with an SDR device. These hosts
represent the key components of the network: i) the gNB, this host implements the 5G base station,
responsible for transmitting synchronization and control signals required for user association; ii) the
UE, this host serves as the victim device attempting to connect to the gNB; iii) the attacker, this host acts
as the adversary, generating a jamming signal to disrupt the synchronization process of the UE. The
goal is to thoroughly investigate the influence imposed by an attack across distinct power levels and to
examine the impact on various targeted SSB areas. The complete experimental setup is illustrated in
Fig. 1a. The assessment employs a methodical approach through iterative experiments, systematically
adjusting the jammer power and the SSB targeted region. We implement the following cycle:
4Operating System Linux Mint 21.3 Cinnamon v.6.0.4 - Kernel Linux 6.8.0-48-generic - Processor 13th Gen Intel© Core™
i9-13900x24 - RAM 32 GB
• Iterate Over Jamming Power Levels: The jammer transmission power is adjusted in one step,
increasing the SDR gain from 60 dB to 80 dB. This allows us to measure the degradation in
synchronization performance as the jamming power increases.
• Iterate Over Targeted SSB Areas: The attack is repeated for three diferent areas of the SSB,
denoted as Area 1, Area 2, and Area 3, all visible in Fig. 1b. This helps determine if certain
portions of the SSB are more resilient to jamming than others. Areas 1 and Area 3 correspond to
the transmission bands of the PBCH, while Area 2 represents the transmission band of the PSS,
SSS, and a portion of the PBCH. The 5G NR setup is configured to operate on the n2 band [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ],
with a frequency of 1970.45 MHz (we use zero numerology and so an SCS of 15 kHz, as specified
by the 3GPP standards).
      </p>
      <p>The experiment steps are as follows:
1. Activate the gNB to begin normal network operation.
2. Activate the jammer with the defined power level and area of attack.
3. Activate the UE, allowing it to attempt network discovery and association.
4. Monitor the UE state, evaluating whether the cell search and association process is successful.</p>
      <p>For each experiment, we monitor the success rate of the cell search and the network association
process by monitoring the following parameters:
• PSS correlation: Measures how well the UE detects the PSS.
• SSS correlation: Evaluates the detection accuracy of the SSS.
• PSS decoding: Determines whether the UE successfully decodes the PSS.
• SSS decoding: Evaluate whether the SSS is correctly decoded.
• PBCH Decoding: Measures the success of PBCH decoding.
• PBCH CRC: Indicates whether the CRC for the PBCH is successfully extracted.
• RRC Association: Determines whether the RRC association is established, indicating a successful
connection to the network.</p>
      <p>The data collected for each iteration is reported in terms of the SIR, which is calculated as the ratio
between the UE signal power and the jammer signal power. To derive the SIR, we considered STORM
configurations with transmission gain values spanning between a transmission gain of 60 db and 80 db.
After the cell search phase, STORM can be configured to the same central frequency for transmitting
white noise samples, maintaining a bandwidth of 1.92 MHz. To target specific areas, an ofset is applied
to the jamming signal relative to the central frequency. Consequently, an ofset of 1.92 MHz is set for
Area 1, 0 MHz for Area 2, and -1.92 MHz for Area 3.</p>
      <p>Each experiment targeting the three diferent areas was repeated 100 times. We report the average
correlation values for the SSS, along with the probability of success based on the combined PSS and SSS
correlations, and the probability of correctly decoding the PBCH. Furthermore, we outline three distinct
results for accurate decoding of the PBCH. The first result is the full decoding, labeled as PBCH Decoded
probability; The second involves the verification of the CRC, labeled as the PBCH CRC probability; and
the final result is the comprehensive process where the Radio Resource Control (RRC) is successfully
extracted. The experiments were conducted in a semi-anechoic chamber under controlled conditions to
eliminate interference from other active UEs on the network. In this setup, the UE is positioned 150 cm
from the gNB, while STORM is placed between the gNB and the UE, with a distance of 50 cm from the
UE and 100 cm from the gNB. Data collected from the experiments, obtained during the attempet of the
synchronization phases, allowed us to analyze how STORM’s configuration impacts the correlation
parameters of the PSS, SSS, and PBCH. Specifically, we present the probability of success as a function
of the SIR values of the UE.</p>
      <p>Fig. 5 illustrates the attack executed by STORM on Area 2. This attack targets solely the 128 subcarriers
that constitute Area 2. As a result, in this configuration, the PSS and SSS are completely disrupted,
while the PBCH is partially corrupted. Fig. 5a represents the outcomes of the correlation process. It
(a)
(b)
(c)
can be observed that the correlation results for both PBCH and SSS decrease as the STORM’s power is
increased and the SIR decreases. To obtain all the normalized correlation values, we had to modify the
srsRAN application, as it did not normalize the obtained values. In particular, Fig. 5b shows the success
probability with which the PSS and SSS are obtained. Considering that the PSS can have only three
distinct values, which allow the extraction of 2, while the SSS provides 336 values of 1, it is more
likely to obtain the PSS than the SSS. Furthermore, it can be observed that the PSS has greater robustness
compared to the SSS, requiring higher transmission power to disrupt the UE’s cell search procedure. As
a result, it is necessary to increase STORM’s transmission gain to interfere more efectively with the
PSS. Fig. 5c illustrates that as the transmission gain of STORM increases, the probability of successfully
decoding the PBCH decreases, thereby reducing the likelihood of establishing the RRC connection,
crucial for determining whether the UE has successfully synchronized with the gNB.
(a)
(b)
(c)</p>
      <p>Fig. 6 illustrates the attack executed by STORM on Area 1. This attack targets only the PBCH region.
Fig. 6a illustrates four distinct regions, each corresponding to specific correlation values calculated for
the SSS. Each correlation value is associated with a probability that represents its relative frequency of
occurrence within the respective regions. Furthermore, the graph features five bars of diferent colors,
each representing the probability that the SSS correlation assumes a given value in 100 experiments
conducted with five diferent transmission gains: blue for a transmission gain of 60, orange for 65,
green for 70, red for 75, and purple for 80. Fig. 6b shows that as the SIR decreases, the probability
of correctly detecting the PSS and SSS declines. This can be attributed to the focus of the analysis
on Area 1, where only the PBCH is present. However, as illustrated in Fig. 6c, the probability of a
successful RRC drops significantly, despite the inherent robustness of the PSS and SSS. This occurs
because, under the application of our STORM framework in Area 1, the PBCH is degraded to the point
where it becomes undecodable by the UE, resulting in a loss of critical parameters required for the
configuration and synchronization of the UE with the gNB.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>In conclusion, this study explored selective jamming (in terms of time and frequency) and ofered an
in-depth analysis of how various jamming configurations afect diferent components of the 5G NR
synchronization phases. We developed STORM, a framework tool designed to evaluate jamming attacks
on 5G UE cell search phases. A key aspect of our implementation is that the jamming is concealed
from detection by external entities due to its synchronization with the gNB’s SSB. We conducted both
simulations and experimental evaluations, each accompanied by a comprehensive explanation of the
methodology used. The findings emphasized that the success rate of jamming attacks and the necessary
SIR for efective disruption are contingent on the specific configurations of the jamming signal. The
study showed that the PSS demonstrated more resilience than the SSS, which required higher jammer
transmission power to disrupt the cell search process. Furthermore, the research highlighted that
interference in an area where only PBCH was present resulted in complete disruption of the PBCH
decoding and RRC extraction, with a SIR of -9 dB and -7 dB for the AREA 1 and AREA 3 respectively.
Finally, the paper shows that selective jamming improves energy eficiency and computational eficiency
because it reduces the jamming duty cycle to 3.55%.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This work was partially supported by the European Union - Next Generation EU under the
Italian National Recovery and Resilience Plan (NRRP), Mission 4, Component 2, Investment 1.3, CUP</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the author(s) used ChatGPT, Grammarly in order to: Grammar
and spelling check, Paraphrase and reword. After using this tool/service, the author(s) reviewed and
edited the content as needed and take(s) full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K. G.</given-names>
            <surname>Eze</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Sadiku</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Musa</surname>
          </string-name>
          ,
          <article-title>5g wireless technology: A primer</article-title>
          ,
          <source>International Journal of Scientific Engineering and Technology</source>
          <volume>7</volume>
          (
          <year>2018</year>
          )
          <fpage>62</fpage>
          -
          <lpage>64</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>I.</given-names>
            <surname>Parvez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rahmati</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Guvenc</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. I.</given-names>
            <surname>Sarwat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Dai</surname>
          </string-name>
          ,
          <article-title>A survey on low latency towards 5g: Ran, core network and caching solutions</article-title>
          ,
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          <volume>20</volume>
          (
          <year>2018</year>
          )
          <fpage>3098</fpage>
          -
          <lpage>3130</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>H.</given-names>
            <surname>Pirayesh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zeng</surname>
          </string-name>
          ,
          <article-title>Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey</article-title>
          ,
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          <volume>24</volume>
          (
          <year>2022</year>
          )
          <fpage>767</fpage>
          -
          <lpage>809</lpage>
          . doi:
          <volume>10</volume>
          . 1109/COMST.
          <year>2022</year>
          .
          <volume>3159185</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Girke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Kurtz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Dorsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wietfeld</surname>
          </string-name>
          ,
          <article-title>Towards resilient 5g: Lessons learned from experimental evaluations of lte uplink jamming</article-title>
          ,
          <source>in: 2019 IEEE International Conference on Communications Workshops (ICC Workshops)</source>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Arjoune</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Faruque</surname>
          </string-name>
          ,
          <article-title>Smart jamming attacks in 5g new radio: A review</article-title>
          ,
          <source>in: Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC)</source>
          ,
          <source>Las Vegas</source>
          ,
          <string-name>
            <surname>NV</surname>
          </string-name>
          , USA,
          <year>2020</year>
          , pp.
          <fpage>1010</fpage>
          -
          <lpage>1015</lpage>
          . doi:
          <volume>10</volume>
          .1109/CCWC47524.
          <year>2020</year>
          .
          <volume>9031175</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>X.</given-names>
            <surname>Lin</surname>
          </string-name>
          , et al.,
          <article-title>5g new radio: Unveiling the essentials of the next generation wireless access technology</article-title>
          ,
          <source>IEEE Communications Standards Magazine</source>
          <volume>3</volume>
          (
          <year>2019</year>
          )
          <fpage>30</fpage>
          -
          <lpage>37</lpage>
          . doi:
          <volume>10</volume>
          .1109/
          <string-name>
            <surname>MCOMSTD</surname>
          </string-name>
          .
          <volume>001</volume>
          .1800036.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>D.</given-names>
            <surname>Inoue</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Ota</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sawahashi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nagata</surname>
          </string-name>
          ,
          <article-title>Physical cell id detection using joint estimation of frequency ofset and sss sequence for nr initial access</article-title>
          ,
          <source>in: Proceedings of the 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)</source>
          , Helsinki, Finland,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          . 1109/VTC2021-
          <fpage>Spring51267</fpage>
          .
          <year>2021</year>
          .
          <volume>9448662</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ali</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Elsaadany</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Gagnon, Performance of time and frequency approaches for synchronization tracking in 5g nr systems</article-title>
          ,
          <source>in: Proceedings of the 2021 International Symposium on Networks, Computers and Communications (ISNCC)</source>
          , Dubai, United Arab Emirates,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ISNCC52172.
          <year>2021</year>
          .
          <volume>9615890</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Flores</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. D.</given-names>
            <surname>Poisson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. J.</given-names>
            <surname>Stevens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Nieves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Wyglinski</surname>
          </string-name>
          ,
          <article-title>Implementation and evaluation of a smart uplink jamming attack in a public 5g network</article-title>
          , IEEE Access (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.-D.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.-M. Wang</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          <string-name>
            <surname>Wang</surname>
          </string-name>
          , V.
          <string-name>
            <surname>C. M. Leung</surname>
          </string-name>
          ,
          <article-title>Detecting intelligent jamming on physical broadcast channel in 5g nr</article-title>
          ,
          <source>IEEE Communications Letters</source>
          <volume>27</volume>
          (
          <year>2023</year>
          )
          <fpage>1292</fpage>
          -
          <lpage>1296</lpage>
          . doi:
          <volume>10</volume>
          .1109/ LCOMM.
          <year>2023</year>
          .
          <volume>3260194</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>M. J. L. Pan</surname>
            ,
            <given-names>T. C.</given-names>
          </string-name>
          <string-name>
            <surname>Clancy</surname>
            ,
            <given-names>R. W.</given-names>
          </string-name>
          <string-name>
            <surname>McGwier</surname>
          </string-name>
          ,
          <article-title>Jamming attacks against ofdm timing synchronization and signal acquisition</article-title>
          ,
          <source>in: MILCOM 2012 - 2012 IEEE Military Communications Conference</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . doi:
          <volume>10</volume>
          .1109/MILCOM.
          <year>2012</year>
          .
          <volume>6415749</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>C.</given-names>
            <surname>Shahriar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Sodagari</surname>
          </string-name>
          , T. C.
          <article-title>Clancy, Performance of pilot jamming on mimo channels with imperfect synchronization</article-title>
          ,
          <source>in: 2012 IEEE International Conference on Communications (ICC)</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>898</fpage>
          -
          <lpage>902</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICC.
          <year>2012</year>
          .
          <volume>6364202</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>P.</given-names>
            <surname>Skokowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Malon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kryk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Maślanka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Kelner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Rajchowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Magiera</surname>
          </string-name>
          ,
          <article-title>Practical trial for low-energy efective jamming on private networks with 5g-nr and nb-iot radio interfaces</article-title>
          ,
          <source>IEEE Access 12</source>
          (
          <year>2024</year>
          )
          <fpage>51523</fpage>
          -
          <lpage>51535</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2024</year>
          .
          <volume>3385630</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <article-title>ShareTechnote, 5g frequency range and bandwidth</article-title>
          , https://www.sharetechnote.com/html/5G/5G_ FR_Bandwidth.html,
          <year>2024</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>