{"id":"https://openalex.org/W4401751492","doi":"https://doi.org/10.1109/icccn61486.2024.10637542","title":"Fake Base Station Detection and Blacklisting","display_name":"Fake Base Station Detection and Blacklisting","publication_year":2024,"publication_date":"2024-07-29","ids":{"openalex":"https://openalex.org/W4401751492","doi":"https://doi.org/10.1109/icccn61486.2024.10637542"},"language":"en","primary_location":{"id":"doi:10.1109/icccn61486.2024.10637542","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn61486.2024.10637542","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 33rd International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092771526","display_name":"Sourav Purification","orcid":"https://orcid.org/0009-0009-5995-2923"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sourav Purification","raw_affiliation_strings":["University of Colorado Colorado Springs,Colorado Springs,CO,USA,80918"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado Springs,Colorado Springs,CO,USA,80918","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080519285","display_name":"Simeon Wuthier","orcid":"https://orcid.org/0000-0003-4088-7518"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Simeon Wuthier","raw_affiliation_strings":["University of Colorado Colorado Springs,Colorado Springs,CO,USA,80918"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado Springs,Colorado Springs,CO,USA,80918","institution_ids":["https://openalex.org/I888729015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101877231","display_name":"Jinoh Kim","orcid":"https://orcid.org/0000-0002-9835-1866"},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"Texas A&M University \u2013 Commerce","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]},{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR","US"],"is_corresponding":false,"raw_author_name":"Jinoh Kim","raw_affiliation_strings":["Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129","Texas A&amp;M University-Commerce,Commerce,TX,USA,75428"],"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Texas A&amp;M University-Commerce,Commerce,TX,USA,75428","institution_ids":["https://openalex.org/I206651237"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016013197","display_name":"Jonghyun Kim","orcid":"https://orcid.org/0000-0002-5532-2117"},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"Texas A&M University \u2013 Commerce","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]},{"id":"https://openalex.org/I142401562","display_name":"Electronics and Telecommunications Research Institute","ror":"https://ror.org/03ysstz10","country_code":"KR","type":"facility","lineage":["https://openalex.org/I142401562","https://openalex.org/I2801339556","https://openalex.org/I4210144908","https://openalex.org/I4387152098"]}],"countries":["KR","US"],"is_corresponding":false,"raw_author_name":"Jonghyun Kim","raw_affiliation_strings":["Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129","Texas A&amp;M University-Commerce,Commerce,TX,USA,75428"],"affiliations":[{"raw_affiliation_string":"Electronics and Telecommunications Research Institute,Daejeon,South Korea,34129","institution_ids":["https://openalex.org/I142401562"]},{"raw_affiliation_string":"Texas A&amp;M University-Commerce,Commerce,TX,USA,75428","institution_ids":["https://openalex.org/I206651237"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025389734","display_name":"Sang\u2010Yoon Chang","orcid":"https://orcid.org/0000-0002-5736-5823"},"institutions":[{"id":"https://openalex.org/I888729015","display_name":"University of Colorado Colorado Springs","ror":"https://ror.org/054spjc55","country_code":"US","type":"education","lineage":["https://openalex.org/I888729015"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sang-Yoon Chang","raw_affiliation_strings":["University of Colorado Colorado Springs,Colorado Springs,CO,USA,80918"],"affiliations":[{"raw_affiliation_string":"University of Colorado Colorado Springs,Colorado Springs,CO,USA,80918","institution_ids":["https://openalex.org/I888729015"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5092771526"],"corresponding_institution_ids":["https://openalex.org/I888729015"],"apc_list":null,"apc_paid":null,"fwci":2.6242,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.91106545,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.8953999876976013,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12357","display_name":"Digital Media Forensic Detection","score":0.8953999876976013,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8213000297546387,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.7423999905586243,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blacklisting","display_name":"Blacklisting","score":0.9440263509750366},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5534011125564575},{"id":"https://openalex.org/keywords/base","display_name":"Base (topology)","score":0.5504928827285767},{"id":"https://openalex.org/keywords/blacklist","display_name":"Blacklist","score":0.4564892649650574},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.44724220037460327},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4369432330131531},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2686859369277954}],"concepts":[{"id":"https://openalex.org/C2779797433","wikidata":"https://www.wikidata.org/wiki/Q632959","display_name":"Blacklisting","level":2,"score":0.9440263509750366},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5534011125564575},{"id":"https://openalex.org/C42058472","wikidata":"https://www.wikidata.org/wiki/Q810214","display_name":"Base (topology)","level":2,"score":0.5504928827285767},{"id":"https://openalex.org/C2781345505","wikidata":"https://www.wikidata.org/wiki/Q2535979","display_name":"Blacklist","level":2,"score":0.4564892649650574},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.44724220037460327},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4369432330131531},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2686859369277954},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn61486.2024.10637542","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn61486.2024.10637542","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 33rd International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2129750883","https://openalex.org/W2612869182","https://openalex.org/W2805101420","https://openalex.org/W2810067257","https://openalex.org/W2945358264","https://openalex.org/W2946045894","https://openalex.org/W2952782444","https://openalex.org/W2963061006","https://openalex.org/W2987215725","https://openalex.org/W3095325295","https://openalex.org/W3172023548","https://openalex.org/W4200405708","https://openalex.org/W4284879254","https://openalex.org/W4324007123","https://openalex.org/W4382396178","https://openalex.org/W4382396281","https://openalex.org/W6766295807","https://openalex.org/W6860357885"],"related_works":["https://openalex.org/W2181543702","https://openalex.org/W3172840274","https://openalex.org/W2769847412","https://openalex.org/W4241417517","https://openalex.org/W2991976289","https://openalex.org/W3037489623","https://openalex.org/W2146351192","https://openalex.org/W4379624358","https://openalex.org/W178883471","https://openalex.org/W2980552833"],"abstract_inverted_index":{"A":[0],"fake":[1,13,54,72,126,203,268,288],"base":[2,14,25,55,73,127,137,147,204,220,241,251,256,269,289,317],"station":[3,15,56,74,128,138,148,221,242,257,270],"is":[4,29],"a":[5,71,119,145],"well-known":[6],"security":[7],"issue":[8],"in":[9,19,32,212],"mobile":[10],"networking.":[11],"The":[12],"exploits":[16],"the":[17,20,24,44,53,59,66,77,83,90,94,125,131,136,150,160,166,170,182,187,191,202,213,219,223,240,254,259,264,267,274,279,287,293,299,314,323,326],"vulnerability":[18],"broadcasting":[21],"message":[22],"announcing":[23],"station\u2019s":[26,205,290],"presence,":[27],"which":[28,104,196,284,319],"called":[30],"SIB1":[31],"telecommunications":[33],"protocols":[34],"such":[35],"as":[36],"4G":[37],"LTE":[38],"and":[39,63,86,117,121,139,155,164,190,207,222,234,262,281,292],"5G":[40,162,231],"NR,":[41],"to":[42,47,49,65,142,144,244,272,311],"get":[43],"user":[45,60,78,96,132,171,224],"equipment":[46,79,133,172],"connect":[48],"itself.":[50],"Once":[51],"connected,":[52],"can":[57,92,134,320],"deprive":[58],"of":[61,82,124,185,193],"connectivity":[62,84,98,151,260,324],"access":[64],"Internet/cloud.":[67],"We":[68,115,216,238,276],"discover":[69],"that":[70,130],"(which":[75],"engages":[76],"until":[80],"parts":[81],"setup":[85],"then":[87],"discontinues":[88],"with":[89,286],"protocol)":[91],"disable":[93],"victim":[95],"equipment\u2019s":[97],"for":[99,149,236],"an":[100],"indefinitely":[101],"long":[102],"time,":[103],"we":[105],"validate":[106],"using":[107,229],"our":[108,302],"threat":[109,206],"prototype":[110],"against":[111],"current":[112],"4G/5G":[113],"practice.":[114],"design":[116],"build":[118],"detection":[120,154,280],"blacklisting":[122,156,313],"identification":[123,282],"so":[129],"avoid":[135,312],"move":[140],"on":[141,159,169,226],"connecting":[143],"legitimate":[146,246],"availability.":[152],"Our":[153,179],"scheme":[157,180,303],"builds":[158],"standardized":[161],"protocol":[163,175],"requires":[165],"implementation":[167,243],"only":[168],"(no":[173],"further":[174],"changes),":[176],"facilitating":[177],"practicality.":[178],"uses":[181],"real-time":[183],"information":[184],"both":[186,218],"time":[188],"duration":[189],"number":[192],"request":[194],"transmissions,":[195],"features":[197],"are":[198],"directly":[199],"impacted":[200],"by":[201],"have":[208],"not":[209,321],"been":[210],"studied":[211],"previous":[214],"research.":[215],"implement":[217],"defense":[225],"software-defined":[227],"radio":[228],"open-source":[230],"software":[232],"(srsRAN":[233],"Open5GS)":[235],"validations.":[237],"vary":[239,285],"simulate":[245],"vs.":[247,249],"faulty-but-legitimate":[248],"fake-and-malicious":[250],"stations,":[252],"where":[253],"faulty":[255,316],"notifies":[258],"disruption":[261],"releases":[263],"session":[265],"while":[266],"continues":[271],"hold":[273],"session.":[275],"empirically":[277],"analyze":[278],"thresholds,":[283],"power":[291],"channel":[294],"condition.":[295],"By":[296],"strategically":[297],"selecting":[298],"threshold":[300],"parameters,":[301],"provides":[304],"zero":[305,308],"errors,":[306],"including":[307],"false":[309],"positives":[310],"temporarily":[315],"stations":[318],"provide":[322],"at":[325],"time.":[327]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":3}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
