Detection and Mitigation methodology for Fake Base Stations Detection on 3G / 2G Cellular Networks.

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.advisorMiche, Yoan
dc.contributor.authorAbodunrin, Dare
dc.contributor.schoolSähkötekniikan korkeakoulufi
dc.contributor.supervisorHämäläinen, Jyri
dc.date.accessioned2015-09-18T08:34:51Z
dc.date.available2015-09-18T08:34:51Z
dc.date.issued2015-08-24
dc.description.abstractDevelopment in technology is rapid, and same can be said particularly in the telecommunication industry, which has experienced an explosive growth both in the massive adoption rate of smart mobile devices and in the huge volume of data traffic generated daily in the recent time. Mobile devices have become extremely smart and used for purposes other than making calls and text messages, making it become an integral part of everyday human life. But while we celebrate this technological achievement, attacks on them have also increasingly become alarming such that our sensitive data transported over the wireless network are not only unsafe, but can easily be illegally requested for by an unauthorized device, also participating invisibly in the network. We briefly studied the security features available in different generations of mobile communication technologies i.e 2G, 3G, and 4G, with the aim of understanding how fake base station attacks practically occur, and to understand the effect of exposing certain parameters such as IMEI/IMSI, LAC/CID to a third party, usually an intruder. This work focuses on proposing a detection methodology as a mitigating approach to lessen fake base station attack in a cellular network. A fake base station is an attacking equipment solely used to duplicate a legitimate base station. While we acknowledge that the strategy of attack depends on the type of network, our approach is based on finding dissimilarities in parameters such as the received signal strengths, and existence of base stations participating in a network, from two different database systems. With this set of information, it is possible to arrive at a conclusion to state if a transmitting device is suspicious or legitimate. We present our detecting and mitigating algorithm which is the objective of this work.en
dc.format.extent62 + 10
dc.format.mimetypeapplication/pdfen
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/17738
dc.identifier.urnURN:NBN:fi:aalto-201509184354
dc.language.isoenen
dc.locationP1fi
dc.programmeTLT - Master’s Programme in Communications Engineering (TS2005)fi
dc.programme.majorRadio Communicationsfi
dc.programme.mcodeS3019fi
dc.rights.accesslevelopenAccess
dc.subject.keywordIMEI/IMSIen
dc.subject.keywordLAC/CIDen
dc.subject.keywordsignal strengthen
dc.subject.keywordfake base stationen
dc.subject.keywordBase stationen
dc.titleDetection and Mitigation methodology for Fake Base Stations Detection on 3G / 2G Cellular Networks.en
dc.typeG2 Pro gradu, diplomityöen
dc.type.okmG2 Pro gradu, diplomityö
dc.type.ontasotMaster's thesisen
dc.type.ontasotDiplomityöfi
dc.type.publicationmasterThesis
local.aalto.idinssi52071
local.aalto.openaccessyes
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
master_Abodunrin_Dare_2015.pdf
Size:
2.88 MB
Format:
Adobe Portable Document Format