5g positioning truth detection and attack traceability method, system, equipment and application

A 5G, positioning data technology, applied in services, electrical components, safety devices, etc. based on location information, can solve problems such as the inability to guarantee the security feasibility and accuracy of positioning data, insecurity, and decreased positioning accuracy, and achieve a protected position. The effect of authenticity, reliability, resistance to interference attacks, and improved positioning accuracy

Active Publication Date: 2021-10-08
XIDIAN UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing method does not consider the interference and attack that the user may encounter during the uplink wireless signal transmission, causing the base station to obtain inaccurate or insecure positioning parameters; it also does not consider the possible attack on the base station, if it participates in positioning, it may directly provide false information. Positioning parameters, resulting in decreased positioning accuracy or even false positioning
Therefore, there are major security flaws in the existing solutions, which cannot protect the possible attacks in the positioning system, cannot guarantee the security, feasibility and accuracy of positioning data, and cannot complete the attack detection on users and the traceability of attacks on malicious base stations.
[0004] Through the above analysis, the problems and defects of the existing technology are as follows: the existing scheme has major security flaws, cannot protect the possible attacks in the positioning system, cannot guarantee the security, feasibility and accuracy of the positioning data, and cannot complete the user's monitoring. Attack detection and attack source tracing on malicious base stations
[0005] The difficulty in solving the above problems and defects is that the existing technology cannot guarantee the security and reliability of the positioning system. For example, when the user transmits the uplink signal, the existing solution only considers the security of the signal transmission and cannot guarantee the positioning Safe extraction of parameters, especially when multiple base stations participate in positioning, it is impossible to identify the interfered base station and its positioning parameters

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 5g positioning truth detection and attack traceability method, system, equipment and application
  • 5g positioning truth detection and attack traceability method, system, equipment and application
  • 5g positioning truth detection and attack traceability method, system, equipment and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the objectives, technical solutions and advantages of the present invention, the present invention will be further described in detail below with reference to the embodiments. It should be understood that the specific embodiments described herein are merely intended to illustrate the invention and are not intended to limit the invention.

[0064] For problems in the prior art, the present invention provides a 5G positioning true value detection and attack traceability method, system, device, and application, which will be described in detail below with reference to the drawings.

[0065] like figure 1 As shown, the 5G positioning true value detection and attack traceability of the present invention includes the following steps:

[0066] S101: User equipment sends a positioning request to the surrounding base station in order to obtain its own location information.

[0067] S102: In the wireless signal sent from the user equipment, the base stations involved...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of user positioning security in mobile communication networks, and discloses a method, system, device and application for 5G positioning truth detection and attack traceability; relevant parameters are extracted from wireless signals sent by users, and the data fusion center utilizes clustering The method clusters the positioning data, excludes abnormal data, and realizes truth detection and credible positioning information calculation; uses the historical records of positioning parameters to extract relevant features, and completes the training of user attack detection model and base station traceability model. , respectively analyze the positioning parameters of the user to be detected and the parameters uploaded by the positioning base station, and effectively complete the attack detection of the target user and the attack traceability of the malicious base station. The invention can not only ensure the authenticity and reliability of user positioning, but also has extremely high positioning accuracy, and can effectively resist interference attacks on user wireless positioning signals and internal attacks on base stations responsible for positioning, ensuring the security of the positioning system, and has excellent robustness.

Description

Technical field [0001] The present invention belongs to the user-positioning security technology in the mobile communication network, in particular, to a 5G positioning true value detection and attack traceability method, system, equipment, and application. Background technique [0002] At present: With the rapid development of 5G, network performance and capacity have been continuously optimized and improved, the number of network infrastructure has also increased significantly, so that the base station-based wireless positioning mode has broad application prospects. The base station can extract the relevant parameters from the wireless signal from the user equipment to obtain positioning information of the device. This approach can effectively reduce the power consumption of terminal equipment, but also realize precision positioning in special environments such as indoor equipment, bringing great convenience to people's lives. Future 5G network base station (BS) will have a ver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/02H04W12/121H04W12/122
CPCH04W4/023H04W4/025
Inventor 闫峥李怡霖王普
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products