haku: @supervisor Hämäläinen, Jyri / yhteensä: 80
viite: 6 / 80
Tekijä:Abodunrin, Dare
Työn nimi:Detection and Mitigation methodology for Fake Base Stations Detection on 3G / 2G Cellular Networks.
Julkaisutyyppi:Diplomityö
Julkaisuvuosi:2015
Sivut:62 + 10      Kieli:   eng
Koulu/Laitos/Osasto:Sähkötekniikan korkeakoulu
Oppiaine:Radio Communications   (S3019)
Valvoja:Hämäläinen, Jyri
Ohjaaja:Miche, Yoan
Elektroninen julkaisu: http://urn.fi/URN:NBN:fi:aalto-201509184354
Sijainti:P1 Ark Aalto  3036   | Arkisto
Avainsanat:IMEI/IMSI
LAC/CID
signal strength
fake base station
base station
Tiivistelmä (eng):Development in technology is rapid, and same can be said particularly in the telecommunication industry, which has experienced an explosive growth both in the massive adoption rate of smart mobile devices and in the huge volume of data traffic generated daily in the recent time.
Mobile devices have become extremely smart and used for purposes other than making calls and text messages, making it become an integral part of everyday human life.
But while we celebrate this technological achievement, attacks on them have also increasingly become alarming such that our sensitive data transported over the wireless network are not only unsafe, but can easily be illegally requested for by an unauthorized device, also participating invisibly in the network.

We briefly studied the security features available in different generations of mobile communication technologies i.e 2G, 3G, and 4G, with the aim of understanding how fake base station attacks practically occur, and to understand the effect of exposing certain parameters such as IMEI/IMSI, LAC/CID to a third party, usually an intruder.

This work focuses on proposing a detection methodology as a mitigating approach to lessen fake base station attack in a cellular network.
A fake base station is an attacking equipment solely used to duplicate a legitimate base station.
While we acknowledge that the strategy of attack depends on the type of network, our approach is based on finding dissimilarities in parameters such as the received signal strengths, and existence of base stations participating in a network, from two different database systems.
With this set of information, it is possible to arrive at a conclusion to state if a transmitting device is suspicious or legitimate.
We present our detecting and mitigating algorithm which is the objective of this work.
ED:2015-09-27
INSSI tietueen numero: 52071
+ lisää koriin
INSSI