Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

5G positioning true value detection and attack tracing method, system and device and application

A 5G, positioning data technology, applied in services, security devices, electrical components, etc. based on location information, it can solve the problem of not being able to protect the attack of the positioning system, unable to guarantee the feasibility and accuracy of the security of the positioning data, and unable to physically guarantee the security of the positioning system. issues of reliability and credibility

Active Publication Date: 2021-04-02
XIDIAN UNIV
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing method does not consider the interference and attack that the user may encounter during the uplink wireless signal transmission, causing the base station to obtain inaccurate or insecure positioning parameters; it also does not consider the possible attack on the base station, if it participates in positioning, it may directly provide false information. Positioning parameters, resulting in decreased positioning accuracy or even false positioning
Therefore, there are major security flaws in the existing schemes, which cannot protect the possible attacks in the positioning system, cannot guarantee the security, feasibility and accuracy of positioning data, and cannot complete the attack detection on users and the traceability of attacks on malicious base stations.
[0004] Through the above analysis, the problems and defects of the existing technology are as follows: the existing scheme has major security flaws, cannot protect the possible attacks in the positioning system, cannot guarantee the security, feasibility and accuracy of the positioning data, and cannot complete the user's monitoring. Attack detection and attack source tracing on malicious base stations
[0005] The difficulty in solving the above problems and defects is that the existing technology cannot guarantee the security and reliability of the positioning system. For example, when the user transmits the uplink signal, the existing solution only considers the security of the signal transmission and cannot guarantee the positioning Safe extraction of parameters, especially when multiple base stations participate in positioning, it is impossible to identify the interfered base station and its positioning parameters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 5G positioning true value detection and attack tracing method, system and device and application
  • 5G positioning true value detection and attack tracing method, system and device and application
  • 5G positioning true value detection and attack tracing method, system and device and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0064] Aiming at the problems existing in the prior art, the present invention provides a method, system, device and application for 5G positioning truth detection and attack traceability. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0065] like figure 1 As shown, the 5G positioning truth detection and attack traceability method provided by the present invention includes the following steps:

[0066] S101: In order to obtain its location information, the user equipment sends a positioning request to surrounding base stations.

[0067] S102: From the wireless signal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of user positioning security in a mobile communication network, and discloses a 5G positioning true value detection and attack tracing method, system and device and application. The method comprises the steps of: extracting related parameters from a wireless signal sent by a user, clustering the positioning data by the data fusion center by using a clustering method, eliminating abnormal data, and realizing true value detection and credible positioning information calculation; and according to the method, utilizing historical records of positioningparameters to extract related features, completing training of a user attack detection model and a base station tracing model, in subsequent positioning, analyzing the positioning parameters of a userneeding to be detected and parameters uploaded by a positioning base station respectively, and effectively completing attack detection of a target user and attack tracing of a malicious base station.According to the invention, the real credibility of user positioning can be guaranteed, the extremely high positioning precision is achieved, interference attacks for user wireless positioning signals and internal attacks for positioning base stations can be effectively resisted, the safety of a positioning system is guaranteed, and the extremely good robustness is achieved.

Description

technical field [0001] The invention belongs to the technical field of user positioning security in mobile communication networks, and in particular relates to a 5G positioning truth detection and attack traceability method, system, device and application. Background technique [0002] At present: With the rapid development of 5G, network performance and capacity have been continuously optimized and improved, and the number of corresponding network infrastructure has also increased significantly, making the base station-based wireless positioning method have broad application prospects. The base station can extract relevant parameters from the wireless signal from the user equipment, so as to obtain the location information of the equipment. This method can not only effectively reduce the power consumption of terminal equipment, but also realize precise positioning in special environments such as indoors, which brings great convenience to people's lives. The base station (B...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/02H04W12/121H04W12/122
CPCH04W4/023H04W4/025
Inventor 闫峥李怡霖王普
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products