Udi Ben-Porat ETH Zurich Switzerland

Slides:



Advertisements
Similar presentations
Lookback Scheduling for Long-Term Quality-of-Service Over Multiple Cells Hatem Abou-zeid*, Stefan Valentin, Hossam S. Hassanein*, and Mohamed F. Feteiha.
Advertisements

Multiuser Diversity Gain Enhancement by Guard Time Reduction Hend Koubaa, Vegard Hassel, Geir E. Øien Norwegian University of Science and Technology (NTNU)
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
Data and Computer Communications
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Fine-grained Channel Access in Wireless LAN SIGCOMM 2010 Kun Tan, Ji Fang, Yuanyang Zhang,Shouyuan Chen, Lixin Shi, Jiansong Zhang, Yongguang Zhang.
 Liang Guo  Ibrahim Matta  Computer Science Department  Boston University  Presented by:  Chris Gianfrancesco and Rick Skowyra.
1 of 56 Idle Sense: An Optimal Access Method for High Throughput and Fairness in Rate Diverse Wireless LANs Martin HeusseFranck Rosseau Romaric GuillierAndrzej.
1 «Performance Analysis for a New Medium Access Control Protocol in Wireless LANs» By YOUNGGOO KWON and YUGUANG FANG Presentation by Ampatzis Efthimios.
Contention Window Optimization for IEEE DCF Access Control D. J. Deng, C. H. Ke, H. H. Chen, and Y. M. Huang IEEE Transaction on Wireless Communication.
On the Exploitation of CDF based Wireless Scheduling Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya, Israel Hanoch Levy ETH Zurich,
Communication Networks Lecture 5 NETW 501-L5: NETW 501-L5: Medium Access Control Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204,
1 “Multiplexing Live Video Streams & Voice with Data over a High Capacity Packet Switched Wireless Network” Spyros Psychis, Polychronis Koutsakis and Michael.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
A Layered Hybrid ARQ Scheme for Scalable Video Multicast over Wireless Networks Zhengye Liu, Joint work with Zhenyu Wu.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Efficiency Reservation Protocols Voice and Data Techniques - PRMA - Variable rate CDMA.
1 The Good, The Bad and the Ugly: Network Performance in Malicious Environment Udi Ben-Porat ETH Zurich, Switzerland Anat Bremler-Barr IDC Herzliya, Israel.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Fair Real-time Traffic Scheduling over Wireless Local Area Networks Insik Shin Joint work with M. Adamou, S. Khanna, I. Lee, and S. Zhou Dept. of Computer.
Spring 2000Nitin BahadurAdvanced Computer Networks A Comparison of Mechanisms for Improving TCP Performance over Wireless Links By: Hari B., Venkata P.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,
1 Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Udi Ben-Porat Tel-Aviv University, Israel Anat Bremler-Barr IDC Herzliya,
Multicast Scheduling in Cellular Data Networks Katherine Guo, Arun Netravali, Krishan Sabnani Bell-Labs Research Hyungsuk Won, Han Cai, Do Young Eun, Injong.
Fen Hou and Pin-Han Ho Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario Wireless Communications and Mobile.
Fair Class-Based Downlink Scheduling with Revenue Considerations in Next Generation Broadband wireless Access Systems Bader Al-Manthari, Member, IEEE,
Utility-Optimal Scheduling in Time- Varying Wireless Networks with Delay Constraints I-Hong Hou P.R. Kumar University of Illinois, Urbana-Champaign 1/30.
Michael J. Neely, University of Southern California CISS, Princeton University, March 2012 Wireless Peer-to-Peer Scheduling.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs K.Murugan, B.Dushyanth, E.Gunasekaran S.Arivuthokai, RS.Bhuvaneswaran, S.Shanmugavel.
27th, Nov 2001 GLOBECOM /16 Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail-Drop / RED Routers Go Hasegawa Osaka University, Japan.
Utility Maximization for Delay Constrained QoS in Wireless I-Hong Hou P.R. Kumar University of Illinois, Urbana-Champaign 1 /23.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Downlink Scheduling With Economic Considerations to Future Wireless Networks Bader Al-Manthari, Nidal Nasser, and Hossam Hassanein IEEE Transactions on.
Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks I-Hong Hou.
A Joint Channel and Queue-Aware Scheduling for IEEE Wireless Metropolitan Area Networks Mehri Mehrjoo, Xuemin Shen, Kshirassgar Naik WCNC 2007.
Multiple Access.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
Giuseppe Bianchi Random Access Performance the case of Aloha.
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
Analysis of TCP Latency over Wireless Links Supporting FEC/ARQ-SR for Error Recovery Raja Abdelmoumen, Mohammad Malli, Chadi Barakat PLANETE group, INRIA.
An Overview of the Aloha protocols J.-F. Pâris University of Houston.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Rami Melhem Sameh Gobriel & Daniel Mosse Modeling an Energy-Efficient MAC Layer Protocol.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
ECEN 621, Prof. Xi Zhang ECEN “ Mobile Wireless Networking” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP Congestion Control.
ComNets, RWTH Aachen University Relays in CDMA2000 Martha Clavijo Chair of Communication Networks RWTH Aachen University, Germany FFV 2007, ,
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Speaker: Yu-Jen Lai Cheng-Chih Chao Advisor: Hung-Yu Wei 2009/06/08 1 Dong Nguyen, Tuan Tran, Thinh Nguyen, and Bella Bose, Fellow, IEEE IEEE TRANSACTIONS.
1 A Throughput Enhancement Handover Algorithm for WiMAX Network Architecture Hao-Ming Chang and Gwo-Jong Yu Graduate School of Mathematical Sciences, Aletheia.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
MEDIUM ACCESS CONTROL PROTOCOL
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Services of DLL Framing Link access Reliable delivery
Distributed Prioritized on Demand Contention
Aggressiveness Protective Fair Queuing for Bursty Applications
Performance Issues & Improvement on MAC
The War Between Mice & Elephants by, Matt Hartling & Sumit Kumbhar
Udi Ben-Porat ETH Zurich Switzerland
Wireless MAC Multimedia Extensions Albert Banchs, Witold Pokorski
Presentation transcript:

On the Vulnerability of the Proportional Fairness Scheduler to Retransmissions Attacks Udi Ben-Porat ETH Zurich Switzerland Anat Bremler-Barr IDC Herzliya Israel Hanoch Levy Tel-Aviv University Israel Bernhard Plattner ETH Zurich Switzerland INFOCOM 2011

Scheduler’s objectives: Wireless Scheduling Players: Base Station (BS) and Clients Time is divided to time slots In each slot, data is sent to one user only Clients have variable channel conditions The scheduler selects a client for transmission based on the reported channel condition of the users Scheduler’s objectives: Good overall throughput performance of the system Fairness among users (avoid starvation)

PROBLEM & Contributions The Common Scheduler – Proportional Fairness (PFS) Fair & Efficient (widely studied and deployed) PROBLEM: Retransmission policy overlooked ISSUE: Malicious Users can Downgrade Performance Contributions: Expose vulnerability of the PFS wireless scheduler Examine and Analyze potential solutions Propose a solution that maintains fairness and immune to attacks * All claims in this work are analytically proved and backed up by simulations.

Proportional Fairness Scheduler (PFS) – User Info Rate (at time t) Ri(t) Vi(t) Ai(t) Priority Value Throughput Average (until t) The user with the highest priority is scheduled

Proportional Fairness Scheduler (PFS) A1(t) =200 A2(t) =100 Throughput Average V1(t) = 2 Priority Value V2(t) = 3 Priority Value Rate R1(t) = 400 b/s R2(t) = 300 b/s DATA User 1 Base Station User 2

Throughput Average Ai(t) Throughput Average update – “Admitted Average”: 1ircv(t) = 1 if user i received a transmission in time t (o/w 0) Ri(t) is the “price” the user “pays” per transmission Higher “price”  Higher Ai(t)  Harder to “win” future time slots Ai(t+1) = (1- ε)Ai(t) + ε1ircv(t)Ri(t)

Frame Losses and Retransmissions Hmm… Sorry, I didn’t get it. Send again please! Hey! What about us? OK, just a moment DATA 1. When to retransmit a lost frame? Should pending retransmissions get the highest priority? 2. What is the real received data rate? Due to losses, Ri(t) does not reflect the real rate to the user

Frame Losses and Retransmissions When to retransmit a lost frame? „Fast Ret.“ Retransmit immediately (ignore other users) „Slow Ret.“ Some other user has higher priority? - Delay retransmission Effective Rate - Rei(t) Effective Rate = The rate the user is expected to receive Example: Ri(t) = 200 Kb/s , Loss Prob. = 0.2  Rei(t) = 160 Kb/s Vi(t) = Rei(t) / Ai(t)

Frame Losses and Retransmissions Regular User Time Data ack/nak Payment 1 2 101000100101010110111000 = 0 200 Kb/slot 200Kb 0 Kb Rate selected: 200 b/s Prob. For frame loss = 0.2 Rei(t) = 200(1-0.2)=160 b/s NEW DATA Base Station User i

Frame Losses and Retransmissions Regular User Time Data ack/nak Payment 1 2 101000100101010110111000 = 200 200 Kb/slot 200Kb 0 Kb 200Kb 200 Kb Rate selected: 200 b/s Prob. For frame loss = 0.2 Rei(t) = 200(1-0.2)=160 b/s RETRANSMISSION Base Station User i

  Our Contributions Retransmissions Scheduling – Vulnerable! Propose Immune & Fair solutions Fast Ret. Slow Ret. Averaging Method Immune Fair Admitted Avg. (original)   Transmission Avg. Effective Avg. Initial Effective Avg.

Admitted Average – Malicious Attack Rate selected: 200 b/s Prob. For frame loss = 0.2 Rei(t) = 200(1-0.2)=160 b/s Malicious user Time Data Ack/Nak Payment 1 2 3 4 5 101000100101010110111000 = 0 200 Kb/slot 200Kb 0 Kb NEW DATA Malicious User Base Station

Admitted Average – Malicious Attack Rate selected: 200 b/s Prob. For frame loss = 0.2 Rei(t) = 200(1-0.2)=160 b/s Malicious user Time Data Ack/Nak Payment 1 2 3 4 5 101000100101010110111000 = 200 200 Kb/slot 200Kb 0 Kb 200Kb 0 Kb 200Kb 0 Kb 200Kb 0 Kb RETRANSMISSION 200Kb 200 Kb Malicious User Base Station

Retransmissions Attack – Simulation Results Example: 10% are malicious # of retransmissions are limited to Lmax =10 40% time share loss for every regular user X – Percentage of malicious users Y – Time share loss for regular users

  Results Fast Ret. Slow Ret. Averaging Method Immune Fair Admitted Avg. (original)  

Sol #1 – Transmission Average Sol #1 - “Pay” for every transmitted frame 1isnd(t) = 1 if a frame was sent (o/w 0) Ai(t+1) = (1- ε)Ai(t) + ε1isnd(t)Ri(t)

Immunity of “Transmission Average” Regular User Time Data Ack/Nak Payment 1 2 Malicious user Time Data Ack/Nak Payment 1 2 3 4 5 101000100101010110111000 101000100101010110111000 200Kb 200 Kb 200Kb 200 Kb 200Kb 200 Kb 200Kb 200 Kb Total “Payment”: 400Kb 200Kb 200 Kb The Scheduler is immune to attack What about Fairness? 200Kb 200 Kb 200Kb 200 Kb Total “Payment”: 1000Kb

Transmission Average – Distorted Fairness 2 Regular users Results* User Effective Rate Rei(t) Rate Ri(t) Frame Loss Prob. “Payment” per bit Time Share Download Speed A 100 b/s 200 b/s 0.5 1/(1-0.5) = 2 38% 38 b/s B 90 b/s 0.1 1/(1-0.1) = 1.1 62% 55.8 b/s User A has a better channel condition than User B, but still… …gets smaller time share …receives less throughput This stands against any notion of fairness! * Long run results. Derived from an analytical result proved in the paper.

  Results Fast Ret. Slow Ret. Averaging Method Immune Fair Admitted Avg. (original)   Transmission Avg.

Sol #2 – Effective Average “Pay for what I expect you to receive” Immune: Malicious has to pay for excessive ret. Fair: Ai(t+1) = The throughput user i actually received Ai(t+1) = (1- ε)Ai(t) + ε1isnd(t)Rei(t)

Effective Average (Sol. #2) Regular user Time Rei(t) Effective Rate Data ACK/NAK Payment 1 3 101000100101010110111000 150 b/s 300 b 150 b/s 150 b/s 300 b 150 b/s Regular user: 300 b/s, 2 transmissions Rate selected: 300 b/s Frame loss Probability = 1/2 Rei(t) = 150 b/s

Effective Average (Sol. #2) for Fast retransmissions Malicious user Time Rei(t) Effective Rate Data ACK/NAK Payment 1 2 3 101000100101010110111000 150 b/s 300 b 150 b/s 10 b/s 10 b/s 10 b/s 10 b/s Rate selected: 300 b/s Frame loss Probability = 1/2 Rei(t) = 150 b/s Regular user: 300 b/s, 2 transmissions Malicious user: 170 b/s, 3 transmissions

  Results Fast Ret. Slow Ret. Averaging Method Immune Fair Admitted Avg. (original)   Transmission Avg. Effective Avg.

Sol #3 – Initial Effective Rate (for Fast Ret.) Initial Effective Rate (sol #3) Every retransmission costs as the first transmission Fi (t)= The last time slot where user i received an initial trans. Choosing fast retransmission is preferred when: Small changes in channel conditions between slots Time slots are very short Channel condition is stable The preferred user in time t, is probably also the one in t+1 Ai(t+1) = (1- ε)Ai(t) + ε1isnd(t) Rei(Fi (t))

  Results Fast Ret. Slow Ret. Averaging Method Immune Fair Admitted Avg. (original)   Transmission Avg. Effective Avg. Initial Effective Avg.

Conclusions The Proportional Fairness Scheduler is vulnerable to retransmissions attacks Both for Fast and Slow retransmission methods We proposed modifications to PFS Proved to be proportional fair and immune to ret. attacks

Questions?