Exploiting Opportunistic Scheduling in Cellular Data Networks

Third Generation (3G) cellular networks utilize timevarying and location-dependent channel conditions to provide broadband services. They employ opportunistic scheduling to efficiently utilize spectrum under fairness or QoS constraints. Opportunistic scheduling algorithms rely on collaboration among all mobile users to achieve their design objectives. However, we demonstrate that rogue cellular devices can exploit vulnerabilities in opportunistic scheduling algorithms, such as Proprotional Fair (PF), to usurp the majority of time slots in 3G networks. Our simulations show that only five rogue device per 50-user cell can use up to 90% of the time slots, and can cause 2 seconds of end-to-end inter-packet transmission delay on VoIP applications for every user in the same cell, rendering VoIP applications useless. To defend against these attacks, we explore several detection and prevention schemes, including modifications to the PF scheduler and a secure handoff procedure.

[1]  Troels Emil Kolding Link and system performance aspects of proportional fair scheduling in WCDMA/HSDPA , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[2]  Fabio Ricciato,et al.  Unwanted traffic in 3G networks , 2006, CCRV.

[3]  M. Andrews,et al.  Instability of the proportional fair scheduling algorithm for HDR , 2004, IEEE Transactions on Wireless Communications.

[4]  Thomas F. La Porta,et al.  Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..

[5]  Ness B. Shroff,et al.  A framework for opportunistic scheduling in wireless networks , 2003, Comput. Networks.

[6]  Patrick D. McDaniel,et al.  On Attack Causality in Internet-Connected Cellular Networks , 2007, USENIX Security Symposium.

[7]  Sanjiv Nanda,et al.  Adaptation techniques in wireless packet data services , 2000, IEEE Commun. Mag..

[8]  B. Goode,et al.  Voice over Internet protocol (VoIP) , 2002, Proc. IEEE.

[9]  Peng Liu,et al.  A Taxonomy of Cyber Attacks on 3G Networks , 2005, ISI.

[10]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[11]  S.W. Shah,et al.  Cell phone jammer , 2008, 2008 IEEE International Multitopic Conference.

[12]  Xiaodong Wang,et al.  Coordinated load balancing, handoff/cell-site selection, and scheduling in multi-cell packet data systems , 2008, Wirel. Networks.

[13]  Sem C. Borst User-level performance of channel-aware scheduling algorithms in wireless data networks , 2005, IEEE/ACM Transactions on Networking.

[14]  Ramachandran Ramjee,et al.  Generalized Proportional Fair Scheduling in Third Generation Wireless Data Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[15]  Antti Toskala,et al.  HSDPA/HSUPA for UMTS: High Speed Radio Access for Mobile Communications , 2006 .

[16]  David Tse,et al.  Mobility increases the capacity of wireless adhoc networks , 2002 .

[17]  S. Z. Asif Aligning business and technology strategies - an evaluation of a third generation wireless technology , 2003, IEMC '03 Proceedings. Managing Technologically Driven Organizations: The Human Side of Innovation and Change.

[18]  Hirofumi Suzwi,et al.  A Statistical Model for Urban Radio Propagation , 1977 .

[19]  Mohamad Assaad,et al.  Effect of TCP on UMTS-HSDPA system performance and capacity , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[20]  A. Jalali,et al.  Data throughput of CDMA-HDR a high efficiency-high data rate personal communication wireless system , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).

[21]  Raymond Knopp,et al.  Information capacity and power control in single-cell multiuser communications , 1995, Proceedings IEEE International Conference on Communications ICC '95.

[22]  Branimir R. Vojcic,et al.  The Cdma2000 System for Mobile Communications: 3g Wireless Evolution , 2004 .

[23]  Thomas F. La Porta,et al.  Exploiting open functionality in SMS-capable cellular networks , 2005, CCS '05.

[24]  Matthew S. Grob,et al.  CDMA/HDR: a bandwidth-efficient high-speed wireless data service for nomadic users , 2000, IEEE Commun. Mag..

[25]  Ji Yang,et al.  Average rate updating mechanism in proportional fair scheduler for HDR , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[26]  Thomas F. La Porta,et al.  Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks , 2006, IEEE/ACM Transactions on Networking.

[27]  Patrick Traynor,et al.  Mitigating attacks on open functionality in SMS-capable cellular networks , 2009, TNET.

[28]  Varsha Apte,et al.  CAPACITY ANALYSIS OF THE GSM SHORT MESSAGE SERVICE , .

[29]  Frank Kelly,et al.  Charging and rate control for elastic traffic , 1997, Eur. Trans. Telecommun..

[30]  Hao Chen,et al.  Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery , 2006, 2006 Securecomm and Workshops.