Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

4G and 5G air interface attack detection method based on signal and signaling fingerprint

An attack detection and fingerprinting technology, applied in the field of network security, can solve problems such as high hardware requirements, difficult daily implementation and deployment, and affecting normal communication of users, and achieve the effect of simple deployment, low cost, and easy deployment

Active Publication Date: 2021-09-03
INST OF INFORMATION ENG CAS
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the openness of 4G and 5G air interfaces, it is easy to implement signal interference attacks against air interfaces (such as fake base station attacks and jammer attacks).
[0003] In order to prevent air interface attacks (such as fake base stations and jammers that prevent users from using mobile communication networks) from affecting users' normal communication, a large number of solutions have been proposed, such as using fake base station signal identification technology to identify fake base stations, using signal analysis technology to identify jammers, etc. These methods usually require dedicated hardware equipment to analyze signals, which have high requirements on hardware and are not easy to implement and deploy on a daily basis.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 4G and 5G air interface attack detection method based on signal and signaling fingerprint
  • 4G and 5G air interface attack detection method based on signal and signaling fingerprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Preferred examples of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0020] The attack detection process of the present invention is as follows figure 1 As shown, it includes.

[0021] 1. The signal and signaling fingerprint collection stage is as follows: figure 2 shown.

[0022] 1) Search for EARFCN and PCI in each protected area; EARFCN (E-UTRA Absolute Radio Frequency Channel Number) is the center frequency of the carrier, which uniquely identifies the frequency range of an LTE system; PCI (Physical Cell Identifier) ​​is the physical cell identifier , the two parameters of PCI and EARFCN together uniquely determine a frequency point.

[0023] 2) In a protected area, initiate a specific number of authentication requests for each searched EARFCN and PCI within a fixed time interval, and obtain authentication signaling and signal strength parameters (for example, RSRP, RSRQ, RSSI , RINR, etc.) in this way, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a 4G and 5G air interface attack detection method based on signal and signaling fingerprints. The method comprises the following steps: 1) a signal and signaling fingerprint acquisition stage: searching EARFCN and PCI in each target protection area; for each group of searched EARFCN and PCI, generating a signaling fingerprint and a signal fingerprint corresponding to the group of EARFCN and PCI information; 2) an attack detection stage: searching EARFCN and PCI in a target protection area; for each group of searched EARFCN, the PCI obtains a corresponding signaling fingerprint and a corresponding signal fingerprint; Comparing the fingerprint with the corresponding signaling fingerprint and the signal fingerprint acquired in the step 1); and determining whether the air interface attack exists according to the comparison result. Signal attack detection of a certain area can be achieved only by installing drive test software on the terminal, and the air interface attack detection method is simple and easy to deploy.

Description

technical field [0001] The invention mainly relates to the field of network security, in particular to a 4G / 5G air interface attack detection method based on signal and signaling fingerprints. Background technique [0002] With the popularization of 4G and 5G mobile communication networks, whether mobile communication functions can be used normally has become a key factor affecting people's quality of life. Due to the openness of 4G and 5G air interfaces, signal interference attacks on air interfaces are easy to implement (such as fake base station attacks, jammer attacks), etc. Once implemented successfully, it will affect the normal communication of users, resulting in affecting the normal communication of users. [0003] In order to prevent air interface attacks (such as fake base stations and jammers that prevent users from using mobile communication networks) from affecting users' normal communication, a large number of solutions have been proposed, such as using fake b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/121H04W12/122
CPCH04W12/121H04W12/122
Inventor 马璐萍范伟彭诚朱大立李雅
Owner INST OF INFORMATION ENG CAS
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More