Font Size: a A A

Research And Implementation Of Key Technologies To Identify Illegal Pseudo Base Station

Posted on:2017-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:W Y XingFull Text:PDF
GTID:2348330536480031Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Recently,illegal pseudo base station is one of the hottest issues in the field of mobile communication security.They use authentication mechanism of the GSM communication system,to carry out false text messages to the users and send fraud by SMS,which has threatened the users' personal safety and property security.At present,there are many limitations in the prevention and treatment of pseudo base station,but it's difficult to eradicate the problem.Therefore,it has great significance to explore the effective identification mechanism of pseudo base station so as to achieve the purpose of preventing and controlling illegal pseudo base station.This thesis firstly introduces the background,significance and the research trends at home and abroad.In view of the serious spread of pseudo base station,the thesis analyzes the defects of GSM network access as the starting point,establishes the technical system to find and identify the illegal pseudo base station,analyzes and studies the design in detail.The thesis analyzes the working process of the common base station and pseudo base station.Then it puts forward its own system design plan,including system design module partition and key algorithms.Finally,this paper introduces the system design details,including solution,system architecture,system design steps and the implementation process.At present,the system which the author participated in the design has put into operation.Its function has achieved the desired goal and it plays an important role to strike the illegal pseudo base station.
Keywords/Search Tags:Pseudo base station, fraud by SMS, signaling, locating, location updating, identification
PDF Full Text Request
Related items