Proceedings of the 2015 International Conference on Applied Science and Engineering Innovation 2015
DOI: 10.2991/asei-15.2015.185
|View full text |Cite
|
Sign up to set email alerts
|

A Self-testing Approach Defending against Rogue Base Station Hijacking of Intelligent Terminal

Abstract: The flexibility and convenience offered by mobile communication have made it one of the fastest growing areas of telecommunications, and communication security has become particularly significant and prominent. One of the most challenging security threats is the attack of rogue base station which posing as a radio transceiver station. It uses the same high-power electromagnetic frequencies to occupy the spectrum resources to send large amounts of spam messages. Rogue base station, if undetected, can be an open… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Malicious adversaries could measure and collect the carrier frequency of the targeted cell as described in [16,17].…”
Section: Rogue Femtocells Reatmentioning
confidence: 99%
“…Malicious adversaries could measure and collect the carrier frequency of the targeted cell as described in [16,17].…”
Section: Rogue Femtocells Reatmentioning
confidence: 99%
“…However, this scheme still cannot solve the problem of rogue BS attack. In [22], the authors proposed a self-testing approach to defend against rogue BS attack of intelligent terminal. However, their work did not focus on MMR networks and thus cannot address the other security issues in MMR networks we discussed in Section 1.…”
Section: Related Workmentioning
confidence: 99%