Detection of Rogue Base Station Using MATLAB

نویسندگان

  • Ramanpreet Singh
  • Sukhwinder Singh
چکیده

This paper considers the problem of detecting rogue base station in WiMAX/802.16 networks. A rogue base station is an attacker station that duplicates a legitimate base station. The rogue base station puzzles a set of subscribers who try to get service which they believe to be a legitimate base station. It may lead to disturbance in service. The strategy of attack depends on the type of network. Our approach is based on the inconsistencies in sensitivity and received signal strength (RSS) reports received by mobile stations can be seen if a rogue Base Station (BS) is present in a network. These reports can be assessed by the legitimate base stations, for instance, when a mobile station undertakes a handover towards another BS. A new algorithm for detecting a rogue base station is described in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rogue-Base Station Detection in WiMax/802.16 Wireless Access Networks La détection de fausses stations de base dans les réseaux d’accès sans fil WiMax/802.16

We address to problem of detecting a rogue base station (BS) in WiMax/802.16 wireless access networks. A rogue BS is a malicious station that impersonates a legitimate access point (AP). The rogue BS attack represents a major denial-of-service threat against wireless networks. Our approach is based on the observation that inconsistencies in the signal strength reports received by the mobile sta...

متن کامل

Rogue-base station detection in WiMax/802.16 wireless access networks

We address the problem of detecting a rogue base station (BS) in WiMax/802.16 wireless access networks. A rogue BS is a malicious station that impersonates a legitimate access point (AP). The rogue BS attack represents a major denial-of-service threat against wireless networks. Our approach is based on the observation that inconsistencies in the signal strength reports received by the mobile st...

متن کامل

A Security Architecture for Wimax Networks

Wimax is one of the fast growing technologies in the world as compare to other wireless networks. IEEE has defined standard IEEE 802.16 for Wimax. Wimax growing rapidly due to the services it’s provides and long range accessibility, but still Wimax facing a lot of security issues and threats like jamming , DDOS , Rogue Base station attack ,Reply Attack and so on.Wimax furnish different security...

متن کامل

Detection of man-in-the-middle attacks using physical layer wireless security techniques

In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the network. This scenario is referred as a Man-in-the-middle (MITM) attack. In the MITM attack, the attacker...

متن کامل

FDMG: Fault detection method by using genetic algorithm in clustered wireless sensor networks

Wireless sensor networks (WSNs) consist of a large number of sensor nodes which are capable of sensing different environmental phenomena and sending the collected data to the base station or Sink. Since sensor nodes are made of cheap components and are deployed in remote and uncontrolled environments, they are prone to failure; thus, maintaining a network with its proper functions even when und...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011