A method and device for identifying false base stations

A pseudo base station, base station technology, applied in the field of identification of pseudo base stations, can solve the problem that the accuracy of identification of pseudo base stations is difficult to guarantee, etc.

Active Publication Date: 2020-10-27
XI AN JIAOTONG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] 1) Limitation: At present, most technologies for identifying pseudo-base stations can only identify GSM pseudo-base stations
[0013] 2) Accuracy: With the heterogeneity of the network structure, the setting of network parameters becomes more complex and diverse, and the accuracy of identifying pseudo base stations based on the characteristics of access parameters is difficult to guarantee
[0014] 3) Preventive capability: For terminals, the two methods of identifying fake base stations by analyzing abnormal signaling in the network and identifying fake base stations based on abnormal behavior after access are unavoidable for terminals to be absorbed by fake base stations.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for identifying false base stations
  • A method and device for identifying false base stations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. the embodiment. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0053] First, for ease of understanding, the principle of the random access process involved in each embodiment is briefly introduced here.

[0054] The user terminal accesses the cell to be accessed through the random access process, and the contention-based random access process is divided into the following four steps:

[0055] In the first step, the user terminal sends a random ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and equipment for identifying a pseudo-base station. Since the pseudo-base station is mainly used to obtain user IMSI or send spam short messages, and cannot provide users with complete services, the traffic ratio between the control plane and the user plane of the pseudo-base station and the legal Compared with base stations, there are obvious differences. For the first time, the present invention proposes the basic idea of ​​identifying base station types through control plane and user plane traffic analysis, effectively improving the accuracy of identifying pseudo base stations, and can complete identification before user terminals access pseudo base stations, enhancing The ability to prevent user terminals from being absorbed by fake base stations protects the security of user identity information and prevents users from receiving spam or fraudulent messages. It is of great significance to crack down on illegal and criminal activities of fake base stations and maintain social information security.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a method and equipment for identifying a false base station. Background technique [0002] Pseudo base station is an illegal radio communication device, which pretends to be a legitimate base station of an operator to deceive user terminals to access, steal and embezzle user information, send fraudulent text messages and other illegal activities, causing great hidden dangers to public safety. Therefore, how to identify pseudo base stations is one of the important security issues in wireless communication. How to implement the pseudo base station and how its capabilities largely depend on the corresponding network, such as GSM, 4G, etc. Due to the security loophole of one-way authentication in the GSM network, the terminal cannot verify the identity of the base station, and the fake base station can easily absorb the terminal, steal user identity information, se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/12H04W12/122H04W12/128
CPCH04W12/122H04W12/128
Inventor 王慧明冯月华鲁知朋
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products