• Aucun résultat trouvé

Modeling of a GSM-R communication chain submitted to transient IEMIs

N/A
N/A
Protected

Academic year: 2021

Partager "Modeling of a GSM-R communication chain submitted to transient IEMIs"

Copied!
2
0
0

Texte intégral

(1)

HAL Id: hal-00958173

https://hal.archives-ouvertes.fr/hal-00958173

Submitted on 11 Mar 2014

HAL is a multi-disciplinary open access

archive for the deposit and dissemination of

sci-entific research documents, whether they are

pub-lished or not. The documents may come from

teaching and research institutions in France or

abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est

destinée au dépôt et à la diffusion de documents

scientifiques de niveau recherche, publiés ou non,

émanant des établissements d’enseignement et de

recherche français ou étrangers, des laboratoires

publics ou privés.

Modeling of a GSM-R communication chain submitted

to transient IEMIs

Souheir Mili, Virginie Deniau, David Sodoyer, Marc Heddebaut

To cite this version:

(2)

Modeling of a GSM-R receiving chain exposed to

transient IEMIs

Souheir Mili, Virginie Deniau, David Sodoyer, Marc.Heddebaut

Univ. Lille Nord de France, F-59000 Lille, France IFSTTAR, LEOST, F-59666

Villeneuve d’Ascq, France

{Souheir.Mili, Virginie.Deniau, David.Sodoyer, Marc.Heddebaut}@ifsttar.fr

Abstract—With the deployment of the European Rail Traffic

Management System (ERTMS), most of the existing ground-based signaling equipment operated along railway tracks will gradually disappear. The signaling information and command/control signals will become exchanged over Global System for Mobile communications-Railways (GSM-R). Consequently, railway signaling resilience should be re-evaluated against Intentional ElectroMagnetic Interference (IEMI) threats.

In this paper we investigate GSM-R vulnerability to IEMI. These IEMIs consist in known interferers and their corresponding interference characteristics [1]. The paper starts by describing the GSM-R communication model. Then, the interference characteristics are analyzed and progressively modified in order to study the corresponding impact on the communication. Results are presented according to these interferer characteristics and associated communication bit error rate (BER).

Keywords- Transient (IEMI); GSM-R; vulnerability; BER.

I. INTRODUCTION

GSM-R is a European railway communication standard. Voice transmission and signaling information are continuously exchanged with train drivers, enabling high safe traffic density. GSM-R uses the 876-915 MHz band for the uplink and the 921-960 MHz band for the downlink. On board moving trains, the received GSM-R power generally varies between -20 dBm and -90 dBm [2]. Considering this dynamics, IEMI can alter more or less seriously the ground to train communication.

Therefore, the impact of different types of interference on the communication effectiveness is studied. The main objective is to detect if such intentional interference can cause a significant degradation of service for the railway network.

II. MODELING OF GSM-R COMMUNICATION CHAIN A. Model and Transient IEMI

In order to simulate a railway transmission, a GSM-R communication is generated. A GSM-R burst (Fig. 2(a)) is modulated and transmitted through a Gaussian channel. A scenario of intentional EM disturbances is applied (Fig. 1).

The tested intentional disturbances are transient EM signals and various wave forms were generated and applied (ultra - wide band signal, damped sine wave, narrowband signals,

subsequent arcing…), to assigns error according to the characteristics (power, duration, time occurrence…) of the attack.

B. Results

For illustration, a Gaussian wide band attack signal (Fig. 2(b)) is used. By varying the bandwidth and intensity of the signal, we analyze the bit errors (Fig. 1(c)) on the railway communication.

Figure 1. Block diagram of the communication chain.

0 1 2 3 4 5 6 x 105 -1 0 1 d a ta I n Burst GSM-R 0 1 2 3 4 5 6 x 105 -20 0 20 IE M I Windowed Gaussien 0 1 2 3 4 5 6 x 105 -2 0 2 d a ta E R R O R Time ns (b) (a) (c)

Figure 2. Perturbation Burst Data by windowed Gaussian.

In the final paper, we will detail the model of the communication chain. Several scenarios of attacks (waveforms, time occurrence, repetition rate, power…) will be presented in order to analyze their impact on the BER of the GSM-R communications.

REFERENCES

[1] D. Månsson, R. Thottappillil, and M. Bäckström, “Vulnerability of European Rail Traffic Management System to Radiated Intentional EMI”, IEEE Transactions on Electromagnetic Compatibility, Vol. 50, No. 1, pp. 101-109, Feb. 2008.

Références

Documents relatifs

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

The classification accuracy between initial trials (Trial #1 vs. Trial #3) are significantly higher than of later trials (Trial #8 vs. Trial #9, Trial #9 vs Trial #10) for most

The Image-Based Smartphone Detector (IBSD) explained in section 3.2 was in- tegrated inside the Unity application to detect the presence of the smartphone in the images captured by

To meet this objective, the thesis discusses the creation of a device, which by combining all of the following systems with beam splitter technology, a single light source is not

Development and implementation of a single chip visual servoing solution for a small-scale quadrotor capable of measuring 3-D position relative to a static ground landmark during

Accordingly, if the students at the Roman Catholic junior high school in Sienhsien Diocese can be helped to bridge the gap between the Chinese educational tradition and the

72. HigginsonJS, Zajac FE, Neptune RR, Kautz SA, Delp SL. Muscle contributions to support during gait in an individual with post-stroke hemiparesis.]. Hurwitz DE, Ryals AR,

When the model is described by a discrete- time Markov chain that evolves up to some random stopping time, the zero-variance change of measure can be written exactly in terms of a