SMDFbs: Specification-Based Misbehavior Detection for False
In this paper, we present a novel false base station attack detection system, leveraging behavior rule specification-based method tailored to the 5G ecosystem. Our proposed innovative
Design of Wireless Communication Base Station
It is to design a wireless communication base station monitoring system based on artificial intelligence and network security.
Rogue Base Station Detection Using A Machine Learning Approach
In this paper, a novel machine learning approach is proposed to identify the rogue base station in the mobile networks based on the key base station parameters.
Fake Base Station Detection and Blacklisting
We design and build a detection and blacklisting identification of the fake base station so that the user equipment can avoid the base station and move on to connecting to a legitimate base
Characterization of Monostatic Base Stations Sensing
We introduce a novel architecture that repurposes existing 3GPP signals—Synchronization Signal Blocks (SSBs) and Positioning Reference Signals (PRSs)—for monostatic sensing at base
Detection of false base stations based on signal times of arrival
Apparatus, methods, and computer-readable media for facilitating detection of false base stations based on signal times of arrival are disclosed herein. An example method for
Anomaly Detection Against Fake Base Station
Mobile networking in 4G and 5G remains vulnerable against fake base stations. A fake base station can inject and manipulate the
Rogue Base Station Detection in Industrial Internet of Things
In this study, we aim to identify and address the security threats posed by rogue base stations in the IIoT. Our detection approach is based on reference signal received power (RSRP)
Detecting false base stations in mobile networks
Device-Assisted Network-Based DetectionDevice-Assisted PartNetwork-Based PartExperiments in Our LabRoad AheadWe ran some experiments with a 4G setup in one of our test labs, the Smartphone lab, which we will now describe from a rather technical perspective. The setup, shown in Figure 3, uses base stations of two network generations, 2G base stations called BTS, and 4G base stations called eNB. The purpose is to verify that a 4G network can be used to dete...See more on ericsson CISA[PDF]
Location Detection of Rogue Base Sations/IMSI Catchers
The eventual goal of this technology, through additional validation processes, is to develop tools so industry can identify and confirm whether specific activities are cell sites or rogue base
PDF version includes complete article with source references. Suitable for printing and offline reading.
