File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Exploiting and defending opportunistic scheduling in cellular data networks

TitleExploiting and defending opportunistic scheduling in cellular data networks
Authors
KeywordsHandoff.
Opportunistic scheduling
Proportional fair
Security
Temporal fair
Issue Date2010
Citation
IEEE Transactions on Mobile Computing, 2010, v. 9, n. 5, p. 609-620 How to Cite?
AbstractThird Generation (3G) cellular networks take advantage of time-varying and location-dependent channel conditions of mobile users to provide broadband services. Under fairness and QoS constraints, they use opportunistic scheduling to efficiently utilize the available spectrum. Opportunistic scheduling algorithms rely on the collaboration among all mobile users to achieve their design objectives. However, we demonstrate that rogue cellular devices can exploit vulnerabilities in popular opportunistic scheduling algorithms, such as Proportional Fair (PF) and Temporal Fair (TF), to usurp the majority of time slots in 3G networks. Our simulations show that under realistic conditions, only five rogue device per 50-user cell can capture up to 95 percent of the time slots, and can cause 2-second end-to-end interpacket transmission delay on VoIP applications for every user in the same cell, rendering VoIP applications useless. To defend against this attack, we propose strengthening the PF and TF schedulers and a robust handoff scheme. © 2010 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/346553
ISSN
2023 Impact Factor: 7.7
2023 SCImago Journal Rankings: 2.755

 

DC FieldValueLanguage
dc.contributor.authorRacic, Radmilo-
dc.contributor.authorMa, Denys-
dc.contributor.authorChen, Hao-
dc.contributor.authorLiu, Xin-
dc.date.accessioned2024-09-17T04:11:42Z-
dc.date.available2024-09-17T04:11:42Z-
dc.date.issued2010-
dc.identifier.citationIEEE Transactions on Mobile Computing, 2010, v. 9, n. 5, p. 609-620-
dc.identifier.issn1536-1233-
dc.identifier.urihttp://hdl.handle.net/10722/346553-
dc.description.abstractThird Generation (3G) cellular networks take advantage of time-varying and location-dependent channel conditions of mobile users to provide broadband services. Under fairness and QoS constraints, they use opportunistic scheduling to efficiently utilize the available spectrum. Opportunistic scheduling algorithms rely on the collaboration among all mobile users to achieve their design objectives. However, we demonstrate that rogue cellular devices can exploit vulnerabilities in popular opportunistic scheduling algorithms, such as Proportional Fair (PF) and Temporal Fair (TF), to usurp the majority of time slots in 3G networks. Our simulations show that under realistic conditions, only five rogue device per 50-user cell can capture up to 95 percent of the time slots, and can cause 2-second end-to-end interpacket transmission delay on VoIP applications for every user in the same cell, rendering VoIP applications useless. To defend against this attack, we propose strengthening the PF and TF schedulers and a robust handoff scheme. © 2010 IEEE.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Mobile Computing-
dc.subjectHandoff.-
dc.subjectOpportunistic scheduling-
dc.subjectProportional fair-
dc.subjectSecurity-
dc.subjectTemporal fair-
dc.titleExploiting and defending opportunistic scheduling in cellular data networks-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TMC.2009.146-
dc.identifier.scopuseid_2-s2.0-77949873062-
dc.identifier.volume9-
dc.identifier.issue5-
dc.identifier.spage609-
dc.identifier.epage620-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats