Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for rapidly detecting and positioning illegal base station intrusion

An illegal base station and positioning method technology, applied in the field of wireless networks, can solve the problems of lack of accurate location of attacking mobile phones, high cost of drive testing, and inability to locate illegal base stations

Inactive Publication Date: 2014-03-19
BEIJING UNION UNIVERSITY
View PDF3 Cites 63 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (2) It can be distinguished by some parameters, such as T3212, RXLEVACCESS_MIN, LAC, CI (cell identity) and other parameters are quite different from those set on the network; although the BCCH of the fake cell is the same as that of the legal cell, but the LAC and CI are quite different
[0014] Disadvantages of Method 1 (drive test): 1) The cost of drive test is high and the manpower is limited, so it is difficult to realize the whole network, all-day, real-time test, and it can only be carried out in key areas or after suspected phenomena such as user complaints; 2 ) is more effective for fixedly deployed illegal base stations, but it cannot track illegal base stations in a moving state. When it is known that user complaints or indicators are abnormal, the illegal base station has left the area, and it is even impossible to confirm whether there is an illegal base station attack. Unable to locate illegal base station location
[0015] Defects of method 2 (A port signaling monitoring): 1) Not all location updates from LAC=65534 to legal cells are initiated after the pseudo cell is disconnected from the network; 2) It is necessary to detect illegal base stations through A port signaling monitoring Only the continuous trend of the surrounding cells can be used to locate and judge, which has a lot to do with the flow of people around the pseudo-cell; 3) Port A lacks the exact location of the attacked mobile phone (only the actual LAC area where the terminal is located can be judged, the range is too large ), it is difficult to achieve precise positioning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for rapidly detecting and positioning illegal base station intrusion
  • Method for rapidly detecting and positioning illegal base station intrusion
  • Method for rapidly detecting and positioning illegal base station intrusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0060] Such as figure 1 As shown, the illegal base station intrusion detection and positioning system in the present invention includes a central processing unit 100 and a plurality of user terminals 200 corresponding to it and performing information interaction. The user terminals 200 include a first user terminal, a second user terminal, a 3 user terminals...the Nth user terminal. figure 1 Among them, there are N user terminals, where N≥1, and the number depends on the needs of system deployment. figure 1 What is shown is for illustrative purposes only, and is not intended to limit the content of the present invention.

[0061] figure 1 Among them, the user terminal 200 collects the network parameters and business sending and receiving informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for rapidly detecting and positioning illegal base station intrusion. According to the method, basic network parameters such as LAC, CI and field intensity, acquired by a common user handset and user business behaviors are utilized to determine whether parameter change and the business behaviors are in accordance with various pre-set early warning characteristic conditions, summation of weights in accordance with the characteristic conditions is carried out, whether the present situation belongs to early warning of illegal base station intrusion is determined according to the total weight; when existence of the early warning is determined, a GPS switch of a user is in an open state, present GPS latitude and longitude information of a position of the user is recorded, first-level early warning information is transmitted to a remote central processing unit; report information of multiple terminals are classified by the central processing unit according to LAC codes before attack, secondary integrated alarm analysis on one type of early warning information is carried out to determine whether pre-set alarm characteristic conditions are satisfied, summation of weights in accordance with the alarm characteristic conditions is carried out, whether the present situation belongs to illegal base station intrusion alarm is determined according to the total weight, after existence of the alarm is determined, an illegal base station position during the present illegal base station intrusion is calculated, and real-time alarm is carried out.

Description

technical field [0001] The invention belongs to the field of wireless networks, in particular to a fast detection and positioning method for illegal base station intrusion. Background technique [0002] The current GSM mobile communication system adopts a one-way authentication system, that is, only the network authenticates the terminal, and does not require the terminal to authenticate the network. "Illegal base station" (also known as "pseudo base station" or "simulation base station") equipment utilizes this loophole in the GSM system protocol. Its basic working principle is that by simulating the mobile communication wireless base station system and the background analysis system, using the mobile network system network number (MNC), frequency resources, etc., to pretend to be the adjacent area of ​​the legal base station, the illegal base station system first detects the carrier in the current target area. Frequency information, and then continuously transmit pseudo-p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W88/08H04W12/122H04W12/128
Inventor 李克纪占林宋晓勤汪淼
Owner BEIJING UNION UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products