1 Exploiting Opportunistic Scheduling in Cellular Data Networks Radmilo Racic, Denys Ma Hao Chen, Xin Liu University of California, Davis.

Slides:



Advertisements
Similar presentations
6: Opportunistic Communication and Multiuser Diversity
Advertisements

Multiuser Diversity Gain Enhancement by Guard Time Reduction Hend Koubaa, Vegard Hassel, Geir E. Øien Norwegian University of Science and Technology (NTNU)
1 Adaptive Bandwidth Allocation in TDD-CDMA Systems Derek J Corbett & Prof. David Everitt The University of Sydney.
CELLULAR COMMUNICATIONS. LTE Data Rate Requirements And Targets to LTE  reduced delays, in terms of both connection establishment and transmission.
A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
Scheduling in Wireless Systems. 2 CDMA2000: Overall Architecture Mobile Station.
Multiple Access Techniques for wireless communication
Real-time Wireless Sensor Networks CSC536 Spring 2005 Meng Wan 05/09/2005.
2005/12/06OPLAB, Dept. of IM, NTU1 Optimizing the ARQ Performance in Downlink Packet Data Systems With Scheduling Haitao Zheng, Member, IEEE Harish Viswanathan,
Cell Design to Maximize Capacity in CDMA Networks Robert Akl, D.Sc.
1 “Multiplexing Live Video Streams & Voice with Data over a High Capacity Packet Switched Wireless Network” Spyros Psychis, Polychronis Koutsakis and Michael.
Kuang-Hao Liu et al Presented by Xin Che 11/18/09.
Why is TCP not good enough for Mobile Operators? Ulas C. Kozat
1 Mitigating scheduler-induced starvation in 3G wireless networks Nov. 9, 2006 Soshant Bali*, Sridhar Machiraju**, Hui Zang** and Victor S. Frost* * ITTC,
*Sponsored in part by the DARPA IT-MANET Program, NSF OCE Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks Rahul.
1 Cross-Layer Design for Wireless Communication Networks Ness B. Shroff Center for Wireless Systems and Applications (CWSA) School of Electrical and Computer.
HSDPA/HSUPA Packet Scheduling JARNO NIEMELÄ
Investigation of TDMA solution for the hidden terminal problem (With “ Wavion ” ) Final Report Presentation.
6.1 Chapter 6 Bandwidth Utilization: Multiplexing and Spreading Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
50 users per cell (N U =600) N T =6  System uses frequency reuse factor 1. This is not a frequency reuse pattern.  Mitigating inter-cell interference.
Frequencies (or time slots or codes) are reused at spatially-separated locations  exploit power falloff with distance. Best efficiency obtained with minimum.
Interference Minimization and Uplink Relaying For a 3G/WLAN Network Ju Wang Virginia Commonwealth University May, 2005.
Opportunistic Transmission Scheduling With Resource-Sharing Constraints in Wireless Networks From IEEE JOURNAL ON SELECTED AREAS IN COMMUNCATIONS Presented.
Project Title: Data Access Points in Tiered Wireless Networks PI: Shalinee Kishore, Ph.D. Graduate Assistant: Zhenlei Shen Introduction & Objective In.
Fair Real-time Traffic Scheduling over Wireless Local Area Networks Insik Shin Joint work with M. Adamou, S. Khanna, I. Lee, and S. Zhou Dept. of Computer.
1 Real-Time Traffic over the IEEE Medium Access Control Layer Tian He J. Sobrinho and A. krishnakumar.
Network diversity in broadband wireless system ONR workshop 2003 Hui Liu Department of Electrical Engineering University of Washington.
Suk-Bok Lee, Ioannis Pefkianakis, Adam Meyerson, Shugong Xu, Songwu Lu
Multicast Scheduling in Cellular Data Networks Katherine Guo, Arun Netravali, Krishan Sabnani Bell-Labs Research Hyungsuk Won, Han Cai, Do Young Eun, Injong.
Performance Analysis of an innovative scheduling algorithm for OFDMA based IEEE a systems E. Baccarelli, M.Biagi, C.Pelizzoni, N.Cordeschi This work.
An Adaptive Deficit-based Scheduler for IEEE e Networks Nararat RUANGCHAIJATUPON and Yusheng JI The Graduate University for Advanced Studies National.
A 4G System Proposal Based on Adaptive OFDM Mikael Sternad.
Fair Class-Based Downlink Scheduling with Revenue Considerations in Next Generation Broadband wireless Access Systems Bader Al-Manthari, Member, IEEE,
Utility-Optimal Scheduling in Time- Varying Wireless Networks with Delay Constraints I-Hong Hou P.R. Kumar University of Illinois, Urbana-Champaign 1/30.
Energy-Saving Scheduling in IEEE e Networks Chia-Yen Lin, and Hsi-Lu Chao Department of Computer Science National Chiao Tung University.
Fairness-Aware Cooperative Resource Allocation for Self-Healing in SON-based Indoor System Kisong Lee, Student Member, IEEE, Howon Lee, Associate Member,
Statistical-Time Access Fairness Index of One-Bit Feedback Fair Scheduler Fumio Ishizaki Dept. of Systems Design and Engineering Nanzan University, Japan.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lectures Cellular and PCS Systems.
Downlink Scheduling With Economic Considerations to Future Wireless Networks Bader Al-Manthari, Nidal Nasser, and Hossam Hassanein IEEE Transactions on.
Uplink Scheduling with Quality of Service in IEEE Networks Juliana Freitag and Nelson L. S. da Fonseca State University of Campinas, Sao Paulo,
A Joint Channel and Queue-Aware Scheduling for IEEE Wireless Metropolitan Area Networks Mehri Mehrjoo, Xuemin Shen, Kshirassgar Naik WCNC 2007.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 11 Cellular and PCS Systems Dr. Stewart D. Personick Drexel.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 6 Multiplexing.
Overload Prediction Based on Delay in Wireless OFDMA Systems E. O. Lucena, F. R. M. Lima, W. C. Freitas Jr and F. R. P. Cavalcanti Federal University of.
A Fast Handoff Scheme For IP over Bluetooth Sang-Hsu Chung, Hyunsoo Yoon, and Jung-Wan Cho Department of Electrical Engineering & Computer Science Divison.
Algorithms for Resource Allocation in HetNet Jianwei Liu Clemson University.
1 An Analytical Model for the Dimensioning of a GPRS/EDGE Network with a Capacity Constraint on a Group of Cells r , r , r Nogueira,
BOUNDS ON QOS- CONSTRAINED ENERGY SAVINGS IN CELLULAR ACCESS NETWORKS WITH SLEEP MODES - Sushant Bhardwaj.
Traditional Approach to Wireless System Design Compensates for deep fades via diversity techniques over time and frequency 1.
1 A Cross-Layer Scheduling Algorithm With QoS Support in Wireless Networks Qingwen Liu, Student Member, IEEE, Xin Wang, Member, IEEE, and Georgios B. Giannakis,
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
On Exploiting Diversity and Spatial Reuse in Relay-enabled Wireless Networks Karthikeyan Sundaresan, and Sampath Rangarajan Broadband and Mobile Networking,
CDMA X EV-DO by S.Vidhya. CDMA 2000 CDMA2000 (also known as C2K or IMT Multi ‑ Carrier (IMT ‑ MC)) is a family of 3G[1] mobile technology standards,
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
ComNets, RWTH Aachen University Relays in CDMA2000 Martha Clavijo Chair of Communication Networks RWTH Aachen University, Germany FFV 2007, ,
Self-Organized Resource Allocation in LTE Systems with Weighted Proportional Fairness I-Hong Hou and Chung Shue Chen.
Downlink Scheduling for Multimedia Multicast/Broadcast over Mobile WiMAX Connection-oriented Multi- state Adaptation Source:IEEE Wireless Communications.
HSPA/HSDPA (Beyond 3G) PRESENTED BY- NEHA ANAND NUPUR ANAND ROLL NO-50 ROLL NO-55.
1 A Proportional Fair Spectrum Allocation for Wireless Heterogeneous Networks Sangwook Han, Irfanud Din, Woon Bong Young and Hoon Kim ISCE 2014.
Sriram Lakshmanan Zhenyun Zhuang
Bandwidth Utilization: Multiplexing and Spreading
6. Opportunistic Communication and Multiuser Diversity
Scheduling in Wireless Communication Systems
Cross-Layer Optimization for State Update in Mobile Gaming
Analysis and Evaluation of a New MAC Protocol
Qingwen Liu, Student Member, IEEE Xin Wang, Member, IEEE,
Month Year doc.: IEEE /xxxxr0 September 2009
Chapter 6 Multiplexing.
Chrysostomos Koutsimanis and G´abor Fodor
Presentation transcript:

1 Exploiting Opportunistic Scheduling in Cellular Data Networks Radmilo Racic, Denys Ma Hao Chen, Xin Liu University of California, Davis

2 3G Cellular Networks Provide high speed downlink data access Examples –HSDPA (High Speed Downlink Packet Access) –EVDO (Evolution-Data Optimized) Approach: exploring multi-user diversity –Time-varying channel condition –Location-dependent channel condition Opportunistic scheduling –Embracing multi-user diversity

3 TDM (Time Division Multiplexing) Base station use TDM to divide channels into time slots TTI (Transmission Time Interval) –HSDPA: 2 ms –EVDO: 1.67 ms

4 Opportunistic Scheduling Assumptions –Phones’ channel conditions fluctuate independently –But some varying set of phones may have strong channel conditions at any moment Opportunistic scheduling –Phones measure and report their CQIs (Channel Quality Indicators) to base station periodically –Base station schedules a phone with good channel condition

5 Proportional Fair (PF) Scheduler Motivation: strike a balance between throughput and fairness in a single cell Goal: maximize the product of the throughput of all users

6 PF Algorithm Base station schedules

7 PF Vulnerabilities Base station does not verify phone’s CQI reports –Attack: malicious phones may fabricate CQI PF guarantees fairness only within a cell –Attack: malicious phones may exploit hand offs Design flaw: cellular networks trust cell phones for network management

8 Attacks Goal: malicious phones hoard time slots Two-tier attacks –Intra-cell attack: exploit unverified CQI reports –Inter-cell attack: exploit hand off procedure We studied attack impact via simulation

9 Threat Model Assumptions –Attackers control a few phones admitted into the network, e.g.: Via malware on cell phones Via pre-paid cellular data cards –Attackers have modified phones to report arbitrary CQI and to initiate hand off We do not assume that attacker hacks into the network

10 Intra-cell Attack Assumption: attacker knows CQI of every phone (we will relax this assumption later) Approach: at each time slot, attackers –Calculate CQI i (t) required to obtain max –Report CQI i (t) to base station

11 Results from Intra-cell Attack

12 Inter-cell Attack

13 Results from Inter-cell Attack Timeslots Occupied

14 Attack without Knowing CQIs Problem –Attack needs to calculate –But attacker may not know the every phone’s Solution: estimate

15 Results from Unknown CQI Attack Timeslots Occupied

16 CQI Prediction Accuracy

17 Attack Impact on Throughput Before attack –40-55 kbps After attack (1 attacker, 49 victim users) –Attacker: 1.5M bps –Each victim user: kbps

18 Attack Impact on Average Delay Before attack –0.01s between two consecutive transmissions After attack (in a cell of 50 users) –One attacker causes 0.81s delay –Five attackers cause 1.80s delay Impact: disrupt delay-sensitive data traffic –E.g.: VoIP useless if delay > 0.4s

19 Attack Detection Detect anomalies in –Average throughput –Frequency of handoffs Limitations –Difficult to determine appropriate parameters –False positives

20 Attack Prevetion Goal: extend PF to enforce global fairness during hand-off Approach: estimate the initial average throughput in the new cell Estimate average throughput as:

21 Attack Prevention (cont.)

22 Related Work Attacks on scheduling in cellular networks –Using bursty traffic [Bali 07] Other attacks on cellular networks –Using SMS [Enck 05] [Traynor 06] –Attacking connection establishment [Traynor 07] –Attacking battery power [Racic 06]

23 Conclusion Cellular networks grant unwarranted trust in mobile phones We discovered vulnerabilities in PF scheduler –Malicious phone may fabricate CQI reports –Malicious phone may request arbitrary hand offs Attack can severely reduce bandwidth and disrupt delay-sensitive applications Propose to enforce global fairness in PF to prevent attack