Professional Documents
Culture Documents
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: support@huawei.com
Contents
1 Change History.........................................................................................................................1
1.1 5G RAN6.1 Draft A (2021-12-30)...................................................................................................................................... 1
3 Overview....................................................................................................................................6
4 Fake Base Station Identification and Detection in SA Networking............................ 7
4.1 Principles.................................................................................................................................................................................... 7
4.1.1 Principles and Procedure of Fake Base Station Detection..................................................................................... 7
4.1.2 Fake Base Station Whitelist Management................................................................................................................11
4.1.3 Geographic Display of Fake Base Stations............................................................................................................... 11
4.1.4 Fake Base Station Detection Results...........................................................................................................................12
4.2 Network Analysis.................................................................................................................................................................. 12
4.2.1 Benefits................................................................................................................................................................................. 12
4.2.2 Impacts.................................................................................................................................................................................. 12
4.3 Requirements......................................................................................................................................................................... 13
4.3.1 Licenses................................................................................................................................................................................. 13
4.3.2 Software................................................................................................................................................................................13
4.3.3 Hardware.............................................................................................................................................................................. 13
4.3.4 Others.................................................................................................................................................................................... 14
4.4 Operation and Maintenance............................................................................................................................................. 14
4.4.1 Data Configuration........................................................................................................................................................... 14
4.4.1.1 Data Preparation............................................................................................................................................................ 14
4.4.1.2 Using MML Commands............................................................................................................................................... 15
4.4.1.3 Using the MAE-Deployment...................................................................................................................................... 15
4.4.2 Activation Verification..................................................................................................................................................... 15
4.4.3 Network Monitoring......................................................................................................................................................... 15
7 Reference Documents...........................................................................................................19
1 Change History
Technical Changes
Change Parameter RAT Base Station
Description Change Model
Editorial Changes
Revised descriptions.
This document only provides guidance for feature activation. Feature deployment and
feature gains depend on the specifics of the network scenario where the feature is
deployed. To achieve optimal gains, contact Huawei professional service engineers.
Software Interfaces
Any parameters, alarms, counters, or managed objects (MOs) described in Feature
Parameter Description documents apply only to the corresponding software
release. For future software releases, refer to the corresponding updated product
documentation.
3 Overview
4.1 Principles
Figure 4-2 Requirements for the inter-site distance of fake base stations
For details about how to handle fake base station detection results and how to use
the MAE, see MAE-Evaluation Operation and Maintenance in iMaster MAE Product
Documentation (EulerOS, TaiShan).
NOTE
For details, see MAE-Evaluation Operation and Maintenance in iMaster MAE Product
Documentation (EulerOS, TaiShan).
● Fake base station locating results, which indicate the locations of fake base
stations that are calculated based on UE-reported measurement results
related to fake base stations.
– Prerequisites for viewing fake base station locating results: A fake base
station locating task has been started for a specified region on the MAE-
Evaluation.
– Dependency of fake-base station locating: Intra- and inter-frequency MR
sampling has been enabled on NEs.
– Impacts of fake base station locating: As inter-frequency MR sampling
needs to be enabled on the NE side, the service traffic volume may
decrease by approximately 6.5% in heavy-load scenarios.
– Errors of fake base station locating: There is a 70% probability that the
locating error ranges from 100 m to 200 m, only for stationary fake base
stations in dense urban areas.
– Restrictions on fake base station locating: This function applies only in
dense urban areas with an inter-site distance of approximately 500 m.
NOTE
For details, see MAE-Evaluation Operation and Maintenance in iMaster MAE Product
Documentation (EulerOS, TaiShan).
For details, see MAE-Evaluation Operation and Maintenance in iMaster MAE Product
Documentation (EulerOS, TaiShan).
4.2.1 Benefits
None
4.2.2 Impacts
Network Impacts
When fake base station locating is enabled, inter-frequency MR subscription tasks
must be delivered to NEs in the selected area. When NEs are heavily loaded,
subscribing to inter-frequency MRs may decrease the service traffic volume by
approximately 6.5%.
Function Impacts
None
4.3 Requirements
4.3.1 Licenses
To enable fake base station detection on the MAE-Evaluation, the license for fake
base station detection must be activated. For details, see MAE-Evaluation
Operation and Maintenance in iMaster MAE Product Documentation (EulerOS,
TaiShan).
4.3.2 Software
Before activating this function, ensure that its prerequisite functions have been
activated and mutually exclusive functions have been deactivated. For detailed
operations, see the relevant feature documents.
Prerequisite Functions
RAT Function Name Function Switch Reference
4.3.3 Hardware
Base Station Models
3900 and 5900 series base stations. 3900 series base stations must be configured
with the BBU3910.
Boards
All NR-capable main control boards and baseband processing units support this
function. For details, see the BBU technical specifications in 3900 & 5900 Series
Base Station Product Documentation.
RF Modules
All NR-capable RF modules support this function. For details, see the technical
specifications of RF modules in 3900 & 5900 Series Base Station Product
Documentation.
4.3.4 Others
None
1. Create a customized analysis region for fake base station identification and
detection in SA networking. For details, see section "Managing Customized
Regions" by choosing "Operation and Maintenance" > "MAE-Evaluation
Operation and Maintenance" > "Topic" in MAE Product Documentation
(EulerOS, TaiShan).
2. Check whether the prerequisite functions of fake base station identification
and detection in SA networking are enabled for cells in the created analysis
region. For details about the prerequisite functions, see Prerequisite
Functions.
If the prerequisite functions are disabled, it is recommended that the
prerequisite functions be enabled before the fake base station identification
and detection in SA networking is enabled. Otherwise, the accuracy of the
detection results will be affected.
3. Enable the fake base station identification and detection in SA networking for
the created analysis region. For details, see "How Do I Turn on the Fake BTS
Detection Switch?" by choosing "Operation and Maintenance" > "MAE-
Evaluation Operation and Maintenance"> "Topic" > "Coverage Report" in MAE
Product Documentation (EulerOS, TaiShan).
Figure 5-1 Fake base station identification and detection in NSA networking
In NSA networking, IMSI-related access messages over the air interface are
processed or forwarded by eNodeBs, but not gNodeBs. Signal interference and
simulation in fake base station attacks are also targeted at eNodeBs. Therefore,
the eNodeBs are the real victims. In fake base station identification and detection
in NSA networking, eNodeBs collect and report data to the MAE-Evaluation. For
details about related requirements and operations, see Fake Base Station
Identification and Detection in eRAN Feature Documentation.
6 Glossary
7 Reference Documents
● 3GPP TS 38.104: "NR; Base Station (BS) radio transmission and reception"
● ANR
● MAE-Evaluation Operation and Maintenance in MAE Product Documentation
(EulerOS, TaiShan)
● Fake Base Station Identification and Detection in eRAN Feature
Documentation
● "Technical Specifications" in 3900 & 5900 Series Base Station Product
Documentation