Measurement study of scheduler-based attacks in 3G wireless networks

被引:0
|
作者
Bali, Soshant [1 ]
Machiraju, Sridhar [2 ]
Zang, Hui [2 ]
Frost, Victor [1 ]
机构
[1] Univ Kansas, Lawrence, KS 66045 USA
[2] Sprint ATL, Overland Pk, KS USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Though high-speed (3G) wide-area wireless networks have been rapidly proliferating, little is known about the robustness and security properties of these networks. In this paper, we make initial steps towards understanding these properties by studying Proportional Fair (PF), the scheduling algorithm used on the downlinks of these networks. We find that the fairness-ensuring mechanism of PF can be easily corrupted by a malicious user to monopolize the wireless channel thereby starving other users. Using extensive experiments on commercial and laboratory-based CDMA networks, we demonstrate this vulnerability and quantify the resulting performance impact. We find that delay jitter can be increased by up to I second and TCP throughput can be reduced by as much as 25 - 30% by a single malicious user. Based on our results, we argue for the need to use a more robust scheduling algorithm and outline one such algorithm.
引用
收藏
页码:105 / +
页数:2
相关论文
共 50 条
  • [41] Data Outage Across 3G & 2G Wireless Networks
    Bhebhe, Leo
    Arjona, Andres
    2008 IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS, VOLS 1 AND 2, 2008, : 139 - 146
  • [42] Personal networks: An overlay network of wireless personal area networks and 3G networks
    Lo, Anthony
    Lu, Weidong
    Jacobsson, Martin
    Prasad, Venkatesha
    Niernegeers, Ignas
    2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 450 - +
  • [43] Personal networks: An overlay network of wireless personal area networks and 3G networks
    Lo, Anthony
    Lu, Weidong
    Jacobsson, Martin
    Prasad, Venkatesha
    Niemegeers, Ignas
    2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 445 - +
  • [44] Wireless 3G risks
    不详
    COMMUNICATIONS NEWS, 2000, 37 (08): : 14 - 14
  • [45] Whither 3G wireless?
    Studt, T
    R&D MAGAZINE, 2001, 43 (05): : 7 - 7
  • [46] Study on Signaling Storm in 3G Networks
    Li Yong
    Hou Yi-bin
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2455 - 2459
  • [47] A statistical measurement model for the 3G networks QoS evaluation
    Cotanis, I
    2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1231 - 1235
  • [48] Measurement-based performance model of IP traffic over 3G networks
    Tan, Wee Lum
    Yue, OnChing
    TENCON 2005 - 2005 IEEE REGION 10 CONFERENCE, VOLS 1-5, 2006, : 2480 - +
  • [49] Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?
    Kotapati, Kameswari
    Liu, Peng
    La Porta, Thomas F.
    TELECOMMUNICATION SYSTEMS, 2007, 35 (3-4) : 99 - 122
  • [50] Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?
    Kameswari Kotapati
    Peng Liu
    Thomas F. La Porta
    Telecommunication Systems, 2007, 35 : 99 - 122