2021
DOI: 10.1109/access.2021.3103673
|View full text |Cite
|
Sign up to set email alerts
|

A Network-Based Positioning Method to Locate False Base Stations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…A false base station attack takes advantage on the common behavior of User Equipment (UE), which tends to connect to the strongest signal available. The exploit involves broadcasting a stronger signal to lure the UE into connecting, after which various active and passive attacks can be initiated [3]. These attacks include, but are not limited to, Authentication Relay attack, International Mobile Subscriber Identifier (IMSI) Catching, and Denial of Service (DoS) attacks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…A false base station attack takes advantage on the common behavior of User Equipment (UE), which tends to connect to the strongest signal available. The exploit involves broadcasting a stronger signal to lure the UE into connecting, after which various active and passive attacks can be initiated [3]. These attacks include, but are not limited to, Authentication Relay attack, International Mobile Subscriber Identifier (IMSI) Catching, and Denial of Service (DoS) attacks.…”
Section: Introductionmentioning
confidence: 99%
“…These attacks include, but are not limited to, Authentication Relay attack, International Mobile Subscriber Identifier (IMSI) Catching, and Denial of Service (DoS) attacks. As these tactics pose ongoing security challenges, sustained research efforts are imperative to develop effective countermeasures and safeguard against these threats [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation