Detection of Rogue Base Station Using MATLAB
نویسندگان
چکیده
This paper considers the problem of detecting rogue base station in WiMAX/802.16 networks. A rogue base station is an attacker station that duplicates a legitimate base station. The rogue base station puzzles a set of subscribers who try to get service which they believe to be a legitimate base station. It may lead to disturbance in service. The strategy of attack depends on the type of network. Our approach is based on the inconsistencies in sensitivity and received signal strength (RSS) reports received by mobile stations can be seen if a rogue Base Station (BS) is present in a network. These reports can be assessed by the legitimate base stations, for instance, when a mobile station undertakes a handover towards another BS. A new algorithm for detecting a rogue base station is described in this paper.
منابع مشابه
Rogue-Base Station Detection in WiMax/802.16 Wireless Access Networks La détection de fausses stations de base dans les réseaux d’accès sans fil WiMax/802.16
We address to problem of detecting a rogue base station (BS) in WiMax/802.16 wireless access networks. A rogue BS is a malicious station that impersonates a legitimate access point (AP). The rogue BS attack represents a major denial-of-service threat against wireless networks. Our approach is based on the observation that inconsistencies in the signal strength reports received by the mobile sta...
متن کاملRogue-base station detection in WiMax/802.16 wireless access networks
We address the problem of detecting a rogue base station (BS) in WiMax/802.16 wireless access networks. A rogue BS is a malicious station that impersonates a legitimate access point (AP). The rogue BS attack represents a major denial-of-service threat against wireless networks. Our approach is based on the observation that inconsistencies in the signal strength reports received by the mobile st...
متن کاملA Security Architecture for Wimax Networks
Wimax is one of the fast growing technologies in the world as compare to other wireless networks. IEEE has defined standard IEEE 802.16 for Wimax. Wimax growing rapidly due to the services it’s provides and long range accessibility, but still Wimax facing a lot of security issues and threats like jamming , DDOS , Rogue Base station attack ,Reply Attack and so on.Wimax furnish different security...
متن کاملDetection of man-in-the-middle attacks using physical layer wireless security techniques
In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the network. This scenario is referred as a Man-in-the-middle (MITM) attack. In the MITM attack, the attacker...
متن کاملFDMG: Fault detection method by using genetic algorithm in clustered wireless sensor networks
Wireless sensor networks (WSNs) consist of a large number of sensor nodes which are capable of sensing different environmental phenomena and sending the collected data to the base station or Sink. Since sensor nodes are made of cheap components and are deployed in remote and uncontrolled environments, they are prone to failure; thus, maintaining a network with its proper functions even when und...
متن کامل