A Study on False Channel Condition Reporting Attacks in Wireless Networks

Wireless networking protocols are increasingly being designed to exploit a user's measured channel condition; we call such protocols channel-aware. Each user reports the measured channel condition to a manager of wireless resources and a channel-aware protocol uses these reports to determine how resources are allocated to users. In a channel-aware protocol, each user's reported channel condition affects the performance of every other user. The deployment of channel-aware protocols increases the risks posed by false channel-condition feedback. In this paper, we study what happens in the presence of an attacker that falsely reports its channel condition. We perform case studies on channel-aware network protocols to understand how an attack can use false feedback and how much the attack can affect network performance. The results of the case studies show that we need a secure channel condition estimation algorithm to fundamentally defend against the channel-condition misreporting attack. We design such an algorithm and evaluate our algorithm through analysis and simulation. Our evaluation quantifies the effect of our algorithm on system performance as well as the security and the performance of our algorithm.

[1]  John Launer Odyssey , 2012, Postgraduate Medical Journal.

[2]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[3]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[4]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[5]  Bernhard Plattner,et al.  On the vulnerability of the proportional fairness scheduler to retransmission attacks , 2011, 2011 Proceedings IEEE INFOCOM.

[6]  Haiyun Luo,et al.  UCAN: a unified cellular and ad-hoc network architecture , 2003, MobiCom '03.

[7]  Hui Zang,et al.  A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks , 2007, PAM.

[8]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[9]  Amitava Ghosh,et al.  IEEE 802.16e system performance: analysis and simulations , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.

[10]  Yih-Chun Hu,et al.  Secure Unified Cellular Ad Hoc Network Routing , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[11]  Josephine Antoniou,et al.  A discrete event based simulation environment for enhanced UMTS 3rd generation networks , 2004, SAC '04.

[12]  Elza Erkip,et al.  Increasing uplink capacity via user cooperation diversity , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[13]  Cristina Nita-Rotaru,et al.  JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks , 2009, IEEE Transactions on Dependable and Secure Computing.

[14]  S. Russel and P. Norvig,et al.  “Artificial Intelligence – A Modern Approach”, Second Edition, Pearson Education, 2003. , 2015 .

[15]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[16]  A. Jalali,et al.  Data throughput of CDMA-HDR a high efficiency-high data rate personal communication wireless system , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).

[17]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[18]  Helen J. Wang,et al.  Preserving location privacy in wireless lans , 2007, MobiSys '07.

[19]  Jitendra Padhye,et al.  Comparison of routing metrics for static multi-hop wireless networks , 2004, SIGCOMM '04.

[20]  Hao Chen,et al.  Exploiting and Defending Opportunistic Scheduling in Cellular Data Networks , 2010, IEEE Transactions on Mobile Computing.

[21]  Fernando Lopez-Lezcano,et al.  Center for Computer Research in Music and Acoustics (CCRMA) , 1994, ICMC.

[22]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[23]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[24]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.

[25]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[26]  David Tse,et al.  Opportunistic beamforming using dumb antennas , 2002, IEEE Trans. Inf. Theory.

[27]  Hao Chen,et al.  Exploiting Opportunistic Scheduling in Cellular Data Networks , 2008, NDSS.

[28]  Joseph Mitola,et al.  The software radio architecture , 1995, IEEE Commun. Mag..

[29]  Helmut Kurth,et al.  Certifying open source - the Linux experience , 2004, IEEE Security & Privacy Magazine.