Towards a trustworthy PF scheduler for cellular data networks

Cellular data networks are proliferating to address the need for ubiquitous connectivity. To cope with the increasing number of subscribers and with the spatio-temporal variations of the wireless signals, current cellular networks use opportunistic schedulers, such as the Proportional Fairness scheduler (PF), to maximize network throughput while maintaining fairness among users. Such scheduling decisions are based on channel quality metrics and Automatic Repeat reQuest (ARQ) feedback reports provided by the User's Equipment (UE). Implicit in current networks is the a priori trust on every UE's feedback. Malicious UEs can thus exploit this trust to disrupt service by intelligently faking their reports. This work proposes a trustworthy version of the PF scheduler (called TPF) to mitigate the effects of such Denial-of-Service (DoS) attacks. In brief, based on the channel quality reported by the UE, we assign a probability to possible ARQ feedbacks. We then use the probability associated with the actual ARQ report to assess the UE's trustworthiness. We adapt the scheduling mechanism to give higher priority to more trusted users. Our evaluations show that TPF (i) does not induce any performance degradation under benign settings, and (ii) it completely mitigates the effects of the activity of malicious UEs.

[1]  Fredrik Gunnarsson,et al.  Channel Characterization and HSDPA Bit Rate Prediction of a Dense City Network , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[2]  Ulf Bodin,et al.  Scheduling Support for Mixed VoIP and Web Traffic over HSDPA , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[3]  Harish Viswanathan,et al.  Optimizing the ARQ performance in downlink packet data systems with scheduling , 2005, IEEE Transactions on Wireless Communications.

[4]  Hao Chen,et al.  Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks , 2010, IEEE Transactions on Mobile Computing.

[5]  Bernhard Plattner,et al.  On the vulnerability of the proportional fairness scheduler to retransmission attacks , 2011, 2011 Proceedings IEEE INFOCOM.

[6]  Hui Zang,et al.  A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks , 2007, PAM.

[7]  Yih-Chun Hu,et al.  A Study on False Channel Condition Reporting Attacks in Wireless Networks , 2014, IEEE Transactions on Mobile Computing.

[8]  Hao Chen,et al.  Exploiting Opportunistic Scheduling in Cellular Data Networks , 2008, NDSS.

[9]  Ramachandran Ramjee,et al.  Generalized Proportional Fair Scheduling in Third Generation Wireless Data Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[10]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[11]  A. Correia,et al.  Usage of link-level performance indicators for HSDPA network-level simulations in E-UMTS , 2004, Eighth IEEE International Symposium on Spread Spectrum Techniques and Applications - Programme and Book of Abstracts (IEEE Cat. No.04TH8738).