Unlock instant, AI-driven research and patent intelligence for your innovation.

A Fast Detection and Location Method of Illegal Base Station Intrusion

An illegal base station and positioning method technology, applied in the field of wireless networks, can solve problems such as departure, high cost of drive test, and difficult precise positioning

Inactive Publication Date: 2017-03-29
BEIJING UNION UNIVERSITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (2) It can be distinguished by some parameters, such as T3212, RXLEVACCESS_MIN, LAC, CI (cell identity) and other parameters are quite different from those set on the network; although the BCCH of the fake cell is the same as that of the legal cell, but the LAC and CI are quite different
[0014] Disadvantages of Method 1 (drive test): 1) The cost of drive test is high and the manpower is limited, so it is difficult to realize the whole network, all-day, real-time test, and it can only be carried out in key areas or after suspected phenomena such as user complaints; 2 ) is more effective for fixedly deployed illegal base stations, but it cannot track illegal base stations in a moving state. When it is known that user complaints or indicators are abnormal, the illegal base station has left the area, and it is even impossible to confirm whether there is an illegal base station attack. Unable to locate illegal base station location
[0015] Defects of method 2 (A port signaling monitoring): 1) Not all location updates from LAC=65534 to legal cells are initiated after the pseudo cell is disconnected from the network; 2) It is necessary to detect illegal base stations through A port signaling monitoring Only the continuous trend of the surrounding cells can be used to locate and judge, which has a lot to do with the flow of people around the pseudo-cell; 3) Port A lacks the exact location of the attacked mobile phone (only the actual LAC area where the terminal is located can be judged, the range is too large ), it is difficult to achieve precise positioning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fast Detection and Location Method of Illegal Base Station Intrusion
  • A Fast Detection and Location Method of Illegal Base Station Intrusion
  • A Fast Detection and Location Method of Illegal Base Station Intrusion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0060] Such as figure 1 As shown, the illegal base station intrusion detection and positioning system in the present invention includes a central processing unit 100 and a plurality of user terminals 200 corresponding to it and performing information interaction. The user terminals 200 include a first user terminal, a second user terminal, a third User terminal...Nth user terminal. figure 1 Among them, there are N user terminals, where N≥1, and the number depends on the needs of system deployment. figure 1 What is shown is for illustrative purposes only, and is not intended to limit the content of the present invention.

[0061] figure 1 Among them, the user terminal 200 collects the network parameters and business sending and receiving informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a fast detection and location method for illegal base station intrusion. This method uses the basic network parameters (LAC, CI, field strength, etc.) collected on ordinary users' mobile phones and user business behaviors to judge whether the parameter changes and business behaviors meet the preset warning characteristic conditions, and sum up the weights that meet the characteristic conditions. According to the total weight, it is judged whether it is an early warning of illegal base station intrusion; after the early warning is judged, when the user's GPS switch is turned on, the GPS latitude and longitude information of the current user's location is recorded, and the first-level early warning information is transmitted to the remote central processing unit; the central processing unit classifies the reported information of multiple terminals according to the LAC code before the attack, conducts a second comprehensive alarm analysis on the early warning information belonging to one category, and determines whether the preset alarm feature conditions are met, and will meet the alarm feature conditions. The weights are summed up to determine whether the current illegal base station intrusion alarm is based on the total weight. After the alarm is judged to be established, the illegal base station position at the time of the illegal base station intrusion is calculated and a real-time alarm is issued.

Description

technical field [0001] The invention belongs to the field of wireless networks, in particular to a fast detection and positioning method for illegal base station intrusion. Background technique [0002] The current GSM mobile communication system adopts a one-way authentication system, that is, only the network authenticates the terminal, and does not require the terminal to authenticate the network. "Illegal base station" (also known as "pseudo base station" or "simulation base station") equipment utilizes this loophole in the GSM system protocol. Its basic working principle is that by simulating the mobile communication wireless base station system and the background analysis system, using the mobile network system network number (MNC), frequency resources, etc., to pretend to be the adjacent area of ​​the legal base station, the illegal base station system first detects the carrier in the current target area. Frequency information, and then continuously transmit pseudo-p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/08H04W88/08H04W12/122H04W12/128
Inventor 李克纪占林宋晓勤汪淼
Owner BEIJING UNION UNIVERSITY