File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/TMC.2009.146
- Scopus: eid_2-s2.0-77949873062
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Exploiting and defending opportunistic scheduling in cellular data networks
Title | Exploiting and defending opportunistic scheduling in cellular data networks |
---|---|
Authors | |
Keywords | Handoff. Opportunistic scheduling Proportional fair Security Temporal fair |
Issue Date | 2010 |
Citation | IEEE Transactions on Mobile Computing, 2010, v. 9, n. 5, p. 609-620 How to Cite? |
Abstract | Third Generation (3G) cellular networks take advantage of time-varying and location-dependent channel conditions of mobile users to provide broadband services. Under fairness and QoS constraints, they use opportunistic scheduling to efficiently utilize the available spectrum. Opportunistic scheduling algorithms rely on the collaboration among all mobile users to achieve their design objectives. However, we demonstrate that rogue cellular devices can exploit vulnerabilities in popular opportunistic scheduling algorithms, such as Proportional Fair (PF) and Temporal Fair (TF), to usurp the majority of time slots in 3G networks. Our simulations show that under realistic conditions, only five rogue device per 50-user cell can capture up to 95 percent of the time slots, and can cause 2-second end-to-end interpacket transmission delay on VoIP applications for every user in the same cell, rendering VoIP applications useless. To defend against this attack, we propose strengthening the PF and TF schedulers and a robust handoff scheme. © 2010 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/346553 |
ISSN | 2023 Impact Factor: 7.7 2023 SCImago Journal Rankings: 2.755 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Racic, Radmilo | - |
dc.contributor.author | Ma, Denys | - |
dc.contributor.author | Chen, Hao | - |
dc.contributor.author | Liu, Xin | - |
dc.date.accessioned | 2024-09-17T04:11:42Z | - |
dc.date.available | 2024-09-17T04:11:42Z | - |
dc.date.issued | 2010 | - |
dc.identifier.citation | IEEE Transactions on Mobile Computing, 2010, v. 9, n. 5, p. 609-620 | - |
dc.identifier.issn | 1536-1233 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346553 | - |
dc.description.abstract | Third Generation (3G) cellular networks take advantage of time-varying and location-dependent channel conditions of mobile users to provide broadband services. Under fairness and QoS constraints, they use opportunistic scheduling to efficiently utilize the available spectrum. Opportunistic scheduling algorithms rely on the collaboration among all mobile users to achieve their design objectives. However, we demonstrate that rogue cellular devices can exploit vulnerabilities in popular opportunistic scheduling algorithms, such as Proportional Fair (PF) and Temporal Fair (TF), to usurp the majority of time slots in 3G networks. Our simulations show that under realistic conditions, only five rogue device per 50-user cell can capture up to 95 percent of the time slots, and can cause 2-second end-to-end interpacket transmission delay on VoIP applications for every user in the same cell, rendering VoIP applications useless. To defend against this attack, we propose strengthening the PF and TF schedulers and a robust handoff scheme. © 2010 IEEE. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Mobile Computing | - |
dc.subject | Handoff. | - |
dc.subject | Opportunistic scheduling | - |
dc.subject | Proportional fair | - |
dc.subject | Security | - |
dc.subject | Temporal fair | - |
dc.title | Exploiting and defending opportunistic scheduling in cellular data networks | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/TMC.2009.146 | - |
dc.identifier.scopus | eid_2-s2.0-77949873062 | - |
dc.identifier.volume | 9 | - |
dc.identifier.issue | 5 | - |
dc.identifier.spage | 609 | - |
dc.identifier.epage | 620 | - |