The magic foot of a ruler road: Talk about how to restrain false base station

Source: Internet
Author: User
Keywords Pseudo base station tall can spam message
In recent times, the creation of spam message of the pseudo-base station has become a hot topic in the communications industry, for this reason, as a technical person, I also specially studied, trying to understand the working principle of pseudo base station, so that can find a way to restrain. The so-called pseudo base station, is unable to connect with the operator mobile network, can not provide mobile service base station. At present, the pseudo base stations are GSM base stations, mainly GSM network popularization rate is high, the user is many, the other GSM network protection is not perfect. Pseudo-base stations also have several stages of development, the early pseudo base station is only used to intercept the mobile phone information, so as to facilitate the flow of personnel management. However, opened the pseudo-base station this Pandora box, some people found incredibly can also be used to distribute short message, this is linked with commercial interests hook, so pseudo base station began to flood up. False base station why can make waves, intercept mobile phone related information, even issued a short message? Let's look at the workflow of the pseudo base station. You can see that the pseudo base station first use high-power radio signals to suppress the surrounding GSM cell signal, making the peripheral phone due to the difference in signal intensity, have changed, take refuge in the pseudo base station here. The pseudo base station also broadcasts a very unique number that allows the phone to be found in a new area and needs to be registered again. In the registration stage, pseudo base station simulates a real base station, interacts with mobile phone, implements the authentication process, and obtains the IMSI of mobile phone users. IMSI is a mobile phone user full network of unique identification, can be understood as the identity card number. After the location registration is completed, the pseudo base station utilizes the obtained IMSI, the paging terminal. After the terminal response, the pseudo base station sends short message, in which the main call number uses the forged number to deceive the user. Understanding the working principle of the pseudo base station, we see that there is any way to restrain. One way to do this is to get carriers to patch up mobile networks, so that the coverage of pseudo base stations is never stronger than mobile networks. This is obviously a stupid way, the current pseudo-base station power has reached 10W level, if the operator's network to upgrade to such a level, regardless of the feasibility of the construction station, light electromagnetic radiation one, it is enough to deter people. Another method is to improve the mobile network location registration process, authentication process is not only the network to the terminal authentication, there should be terminal to the network authentication. This new authentication method has been implemented in WCDMA networks, but it is difficult to implement in GSM network. In the GSM network will continue to serve the situation, we have any simple way to curb the pseudo-base station to send spam messages? The method is also some, even though the handset received the spam message, but does not display, this also achieved the restraint false base station the effect. Of course this is a stopgap, the best way is to upgrade the GSM network. How to not let spam message display? Here I introduce a processing idea. From the working principle of the pseudo base station can see, the pseudo base station can obtain the IMSI of the handset only, get phone number. That is, only know the ID number, do not know the name. So we can ask to add a field to the short message, which is called the number. Using the called number, the phone can verify whether it is issued to their own, do not comply with the initiative to delete, so the spam message will not have the opportunity to see. This approach involves the transformation of the SMS Center, and the need to add a judgment on the phone's short message function, if it is a smartphone, it should be very convenient to implement. In short, the magic of a ruler road, the control of false base station technology without difficulties, as long as there is a positive attitude, pseudo-base station to create spam messages have no chance to stir up trouble.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.