Why We Cannot Win: On Fake Base Stations and Their
Fake base stations (FBS) — also known as IMSI catchers and Stingrays — can identify and track mobile phones and further intercept their communication. They masquerade as a network
The faulty base station establishes a radio connection with the user equipment and releases the connection afterward due to the worst channel conditions. Because our reference values come from the worst channel conditions, the optimal thresholds hence ensure fake base station detection with zero false positives under varying network conditions.
Similar to many other detection-based schemes, there can be a fake base station that can avoid detection, i.e., it is not detected as a faulty base station, but that would result in the attacker reducing its availability threat impact and releasing the connectivity setup.
A fake base station is a well-known security issue in mobile networking. The fake base station exploits the vulnerability in the broadcasting message announcing
Once a fake base station is detected and blacklisted, in active defense, the user equipment has to redirect its connection to a legitimate base station. The detection and blacklisting may not be sufficient to ensure restoring connectivity.
PDF version includes complete article with source references.
Get technical specifications, application guides, and ROI analysis tools for containerized microgrid solutions, mobile energy storage containers, and portable power systems.
15 Industrialna Street, Włochy District
Warsaw, Poland 02-492
Sales & General: +48 22 824 4067
Technical Support: +48 607 809 270
Monday - Friday: 8:00 AM - 6:00 PM CET
Saturday: 8:00 AM - 2:00 PM CET