File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Exploiting Opportunistic Scheduling in Cellular Data Networks

TitleExploiting Opportunistic Scheduling in Cellular Data Networks
Authors
Issue Date2008
Citation
Proceedings of the Symposium on Network and Distributed System Security, NDSS 2008, 2008 How to Cite?
AbstractThird Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to efficiently utilize spectrum under fairness or QoS constraints. Opportunistic scheduling algorithms rely on collaboration among all mobile users to achieve their design objectives. However, we demonstrate that rogue cellular devices can exploit vulnerabilities in opportunistic scheduling algorithms, such as Proprotional Fair (PF), to usurp the majority of time slots in 3G networks. Our simulations show that only five rogue device per 50-user cell can use up to 90% of the time slots, and can cause 2 seconds of end-to-end inter-packet transmission delay on VoIP applications for every user in the same cell, rendering VoIP applications useless. To defend against these attacks, we explore several detection and prevention schemes, including modifications to the PF scheduler and a secure handoff procedure.
Persistent Identifierhttp://hdl.handle.net/10722/346557

 

DC FieldValueLanguage
dc.contributor.authorRacic, Radmilo-
dc.contributor.authorMa, Denys-
dc.contributor.authorChen, Hao-
dc.contributor.authorLiu, Xin-
dc.date.accessioned2024-09-17T04:11:42Z-
dc.date.available2024-09-17T04:11:42Z-
dc.date.issued2008-
dc.identifier.citationProceedings of the Symposium on Network and Distributed System Security, NDSS 2008, 2008-
dc.identifier.urihttp://hdl.handle.net/10722/346557-
dc.description.abstractThird Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to efficiently utilize spectrum under fairness or QoS constraints. Opportunistic scheduling algorithms rely on collaboration among all mobile users to achieve their design objectives. However, we demonstrate that rogue cellular devices can exploit vulnerabilities in opportunistic scheduling algorithms, such as Proprotional Fair (PF), to usurp the majority of time slots in 3G networks. Our simulations show that only five rogue device per 50-user cell can use up to 90% of the time slots, and can cause 2 seconds of end-to-end inter-packet transmission delay on VoIP applications for every user in the same cell, rendering VoIP applications useless. To defend against these attacks, we explore several detection and prevention schemes, including modifications to the PF scheduler and a secure handoff procedure.-
dc.languageeng-
dc.relation.ispartofProceedings of the Symposium on Network and Distributed System Security, NDSS 2008-
dc.titleExploiting Opportunistic Scheduling in Cellular Data Networks-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-79960869092-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats