Identifying the Fake Base Station: A Location Based Approach

06/14/2018
by   Ke-Wen Huang, et al.
0

Fake base station (FBS) attack is a great security challenge to wireless user equipment (UE). During the cell selection stage, the UE receives multiple synchronization signals (SSs) from multiple nearby base stations (BSs), and then synchronizes itself with the strongest SS. A FBS also can transmit a SS with sufficient power to confuse the UE, which makes the UE connect to the FBS, and may lead to the leakage of private information. In this letter, countermeasure to the FBS attack by utilizing the location information is investigated. Two location awareness based FBS-resistance schemes are proposed by checking the received signal strength according to the position of the UE and a legitimate BS map. The successful cheating rate (SCR) definded as the probability that the UE will connect to the FBS is investigated. Numeric results show that with the two proposed schemes, the SCR can be greatly reduced especially when the transmit power of the FBS is large. Beyond that, a cooperation aided method is further proposed to improve the performance, and we show that the cooperation aided method can further suppress the SCR when the signal strength from the FBS is similar to that from the legitimate BS.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/03/2023

Precheck Sequence Based False Base Station Detection During Handover: A Physical Layer Based Security Scheme

False Base Station (FBS) attack has been a severe security problem for t...
research
05/19/2018

A Tunable Base Station Cooperation Scheme for Poisson Cellular Networks

We propose a tunable location-dependent base station (BS) cooperation sc...
research
03/03/2020

Intelligent UAV Base Station Selection in Urban Environments: A Supervised Learning Approach

When Unmanned Aerial Vehicles (UAVs) connect into the cellular network, ...
research
06/11/2022

Downlink Power Minimization in Intelligent Reconfigurable Surface-Aided Security Classification Wireless Communications System

User privacy protection is considered a critical issue in wireless netwo...
research
06/09/2021

AdaptOver : Adaptive Overshadowing of LTE signals

We introduce AdaptOver, a new LTE signal overshadowing attack that allow...
research
03/21/2023

Capacity Maximization of the 6G Networks Deploying IRS

The objective of the work is to improve the capacity of the micro cell, ...
research
12/14/2020

Localization Attack by Precoder Feedback Overhearing in 5G Networks and Countermeasures

In fifth-generation (5G) cellular networks, users feed back to the base ...

Please sign up or login with your details

Forgot password? Click here to reset