User equipment (UE) and cellular networks implement one or more techniques to detect and mitigate rogue base stations/cells. In one approach, a UE implements base station authentication techniques for detecting and mitigating rogue base stations. In this approach, the UE detects a failed authentication procedure and determines the associated base station is a rogue base station. The UE stores identifying information associated with the rogue base station and location information associated with the UE. Upon attachment with a legitimate base station/cell, the UE sends the identifying information and location information to the network. In another example, the network implements reverse mobility detection techniques for detecting and mitigating rogue base stations. In this approach, static mobile UEs are located throughout the network and monitor signal strength variations associated with cells for detecting rogue base stations. In yet another approach, a UE is configured to detect when a base station is attempting to downgrade the UE to a lower order radio access technology (RAT) and identifies the base station as a rogue base station. In a further approach, a UE is configured to determine when a received signal strength indicator (RSSI) is abnormally high, indicating that a rogue base station is using a signal-jamming mechanism.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Venkata, Madhu, "Rogue Base Station Detection Techniques", Technical Disclosure Commons, (January 24, 2021)