Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for attacking fake base stations

A pseudo base station and base station technology, applied in the field of attacking pseudo base stations, can solve problems such as limited effect, difficulty in capturing, and inability to handle multiple pseudo base stations, achieving the effects of low performance requirements and simple attack process.

Active Publication Date: 2021-07-09
CHINA MOBILE COMM GRP CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above solution, the method of monitoring fake base stations based on network-side analysis is a method of post-event monitoring, which cannot eliminate the harm of spam messages sent by fake base stations; moreover, because fake base stations are extremely mobile, it is difficult to capture them. The capture rate is less than 8%. Based on resource consumption, it only reduces the probability of users accessing fake base stations, but cannot completely eliminate the influence of fake base stations. The effect of this method is also affected by device performance, and if there are If there are multiple pseudo base stations, the effect is more limited
[0005] It can be seen that the probability of users accessing pseudo-base stations cannot be eliminated in the prior art, and due to misjudgment of pseudo-base stations, normal base stations and user communications may be affected, and multiple pseudo-base stations cannot be processed at the same time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for attacking fake base stations
  • A method and device for attacking fake base stations
  • A method and device for attacking fake base stations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] In this embodiment, the implementation process of the method of attacking the fake base station is as follows figure 1 shown, including the following steps:

[0051] Step 101, the wireless terminal obtains the parameters of the base station to which it belongs;

[0052] Specifically, the pseudo base station usually sets the same MCC and MNC as the operator's network. At the same time, by modifying the LAC, the wireless terminal within the coverage area initiates a location update process, and induces the wireless terminal to access the pseudo base station by broadcasting relevant parameters. .

[0053] Here, the wireless terminal discovers broadcast system information in each frequency band, and acquires parameters of the system information.

[0054] Wherein, the system information includes: MNC, CRO, LAC, MCC, CRH and so on.

[0055] Step 102, sending information whose value is a boundary value to the base station;

[0056] Here, it is not necessary to judge the au...

Embodiment 2

[0062] In this embodiment, considering that the wireless terminal needs to actively eliminate the surrounding fake base stations, it can actively scan all the surrounding base stations to determine the authenticity of each base station; Communication content monitoring; according to whether it is monitored, it is determined whether to continue to send the content that triggers the exception or to disconnect.

[0063] The implementation process of the method for attacking the fake base station in this embodiment is as follows: image 3 shown, including the following steps:

[0064] Step 301, the wireless terminal scans a predetermined frequency band and discovers more than one base station.

[0065] Specifically, the wireless terminal scans the surrounding GSM frequency band information through wireless frequency scanning, and all base stations covering the wireless terminal can be obtained through frequency scanning.

[0066] Step 302, the wireless terminal obtains the param...

Embodiment 3

[0087] This embodiment is a device for attacking a fake base station, and the structural diagram of the device is as follows Figure 4As shown, the device for attacking a fake base station includes: an acquisition module 41 and a sending module 42; wherein,

[0088] The acquiring module 41 is configured to acquire parameters of the base station to which it belongs;

[0089] Specifically, the pseudo base station usually sets the same MCC and MNC as the operator's network. At the same time, by modifying the LAC, the wireless terminal within the coverage area initiates a location update process, and induces the wireless terminal to access the pseudo base station by broadcasting relevant parameters. .

[0090] Here, the acquiring module 41 finds broadcast system information of each frequency band, and acquires parameters of the system information.

[0091] Wherein, the system information includes: MNC, CRO, LAC, MCC, CRH and so on.

[0092] The sending module 42 is configured t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for attacking a false base station. A wireless terminal acquires parameters of the base station to which it belongs, and sends information whose value is a boundary value to the base station. The invention also discloses a device for attacking a false base station at the same time.

Description

technical field [0001] The invention relates to the field of wireless communication security, in particular to a method and device for attacking a false base station. Background technique [0002] A base station refers to a radio transceiver station that transmits information between wireless terminals through a mobile communication switching center in a certain radio coverage area. Pseudo base station is a miniaturized, vehicle-mountable, and easy-to-move wireless communication device. It illegally uses the frequency of the operator, uses high-power transmission signals and optimized wireless parameter settings, interferes and shields the operator's signal within a certain range, and deceives users. Wireless terminals, such as mobile phones, access and collect user information, and can forge any sending number to forcibly send bad information to the collection within the coverage area. Since 2012, China has gradually discovered the crime of fake base stations. In recent ye...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/122H04W76/30H04W88/08
CPCH04W12/12H04W88/08
Inventor 张滨赵刚冯运波袁捷李祥军郭燕飞王馨裕安宝宇邱勤
Owner CHINA MOBILE COMM GRP CO LTD