File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Exploiting Opportunistic Scheduling in Cellular Data Networks
Title | Exploiting Opportunistic Scheduling in Cellular Data Networks |
---|---|
Authors | |
Issue Date | 2008 |
Citation | Proceedings of the Symposium on Network and Distributed System Security, NDSS 2008, 2008 How to Cite? |
Abstract | Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to efficiently utilize spectrum under fairness or QoS constraints. Opportunistic scheduling algorithms rely on collaboration among all mobile users to achieve their design objectives. However, we demonstrate that rogue cellular devices can exploit vulnerabilities in opportunistic scheduling algorithms, such as Proprotional Fair (PF), to usurp the majority of time slots in 3G networks. Our simulations show that only five rogue device per 50-user cell can use up to 90% of the time slots, and can cause 2 seconds of end-to-end inter-packet transmission delay on VoIP applications for every user in the same cell, rendering VoIP applications useless. To defend against these attacks, we explore several detection and prevention schemes, including modifications to the PF scheduler and a secure handoff procedure. |
Persistent Identifier | http://hdl.handle.net/10722/346557 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Racic, Radmilo | - |
dc.contributor.author | Ma, Denys | - |
dc.contributor.author | Chen, Hao | - |
dc.contributor.author | Liu, Xin | - |
dc.date.accessioned | 2024-09-17T04:11:42Z | - |
dc.date.available | 2024-09-17T04:11:42Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | Proceedings of the Symposium on Network and Distributed System Security, NDSS 2008, 2008 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346557 | - |
dc.description.abstract | Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to efficiently utilize spectrum under fairness or QoS constraints. Opportunistic scheduling algorithms rely on collaboration among all mobile users to achieve their design objectives. However, we demonstrate that rogue cellular devices can exploit vulnerabilities in opportunistic scheduling algorithms, such as Proprotional Fair (PF), to usurp the majority of time slots in 3G networks. Our simulations show that only five rogue device per 50-user cell can use up to 90% of the time slots, and can cause 2 seconds of end-to-end inter-packet transmission delay on VoIP applications for every user in the same cell, rendering VoIP applications useless. To defend against these attacks, we explore several detection and prevention schemes, including modifications to the PF scheduler and a secure handoff procedure. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the Symposium on Network and Distributed System Security, NDSS 2008 | - |
dc.title | Exploiting Opportunistic Scheduling in Cellular Data Networks | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-79960869092 | - |