Abstract
Wireless networking protocols are increasingly being designed to exploit a user’s measured channel condition; we call such protocols channel-aware. Each user reports its measured channel condition to a manager of wireless resources and a channel-aware protocol uses these reports to determine how resources are allocated to users. In a channel-aware protocol, each user’s reported channel condition affects the performance of every other user. A possible attack against channel-aware protocols is false feedback of channel condition. The deployment of channel-aware protocols increases the risks posed by false feedback. In this paper, we study the potential impact of an attacker that falsely reports its channel condition and propose a defense mechanism to securely estimate channel condition. We analyze our mechanism and evaluate the system performance deploying our mechanism through simulation. Our evaluation shows that our mechanism effectively thwarts channel condition misreporting attack.
This material is based upon work partially supported by USARO under Contract No. W-911-NF-0710287 and the NSF under Grant No. CNS-0953600.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jalali, A., Padovani, R., Pankaj, R.: Data throughput of cdma-hdr a high efficiency-high data rate personal communication wireless system. In: Proc. IEEE VTC, vol. 3, pp. 1854–1858 (May 2000)
Viswanath, P., Tse, D.N.C., Laroia, R.: Opportunistic beamforming using dumb antennas. IEEE Transactions on Information Theory 48(6), 1277–1294 (2002)
Sendonaris, A., Erkip, E., Aazhang, B.: Increasing uplink capacity via user cooperation diversity. In: Proceedings of IEEE International Symposium on Information Theory, p. 156 (August 1998)
Luo, H., Ramjee, R., Sinha, P., Li, L.E., Lu, S.: Ucan: a unified cellular and ad-hoc network architecture. In: ACM MobiCom, pp. 353–367. ACM, New York (2003)
De Couto, D.S.J., Aguayo, D., Bicket, J., Morris, R.: A high-throughput path metric for multi-hop wireless routing. In: ACM MobiCom, pp. 134–146. ACM, New York (2003)
Draves, R., Padhye, J., Zill, B.: Comparison of routing metrics for static multi-hop wireless networks. In: ACM SIGCOMM, pp. 133–144. ACM, New York (2004)
Jing, T., Wang, H.J., Hu, Y.C.: Preserving location privacy in wireless lans. In: Proc. ACM MOBISYS (June 2007)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2002)
Racic, R., Ma, D., Chen, H., Liu, X.: Exploiting opportunistic scheduling in cellular data networks. In: NDSS (2008)
Odyssey 8500, http://www.wavesat.com/pdf/OD-8500-IC-PB.pdf
Smith III, J.O.: Spectral Audio Signal Processing. In: Center for Computer Research in Music and Acoustics, CCRMA (2009)
Proakis, J.: Digital Communications, 4th edn., McGraw-Hill Science/Engineering/Math (August 2000)
Physical layer procedures (fdd), release 5. 3GPP TS25.214 V5.5.0 (June 2003), http://www.3gpp.org/ftp/Specs/archive/25_series/25.214/25214-550.zip
Russell, S.J., Norvig, P.: Artificial Intelligence: A Modern Approach. Pearson Education, London (2003), http://portal.acm.org/citation.cfm?id=773294
ns-2: Network simulator, http://www.isi.edu/nsnam/ns/
eurane: Enhanced umts radio access network extensions for ns-2, http://eurane.ti-wmc.nl/eurane/
Selection procedures for the choice of radio transmission technologies of the umts. ETSI TS UMTS 30.03 V3.2.0
Carbunar, B., Ioannis, I., Nita-Rotaru, C.: Janus: A framework for scalable and secure routing in hybrid wireless networks. IEEE Transactions on Dependable and Secure Computing (2008)
Haas, J.J., Hu, Y.C.: Secure unified cellular ad hoc network routing. In: IEEE Globecom (2009)
Bali, S., Machiraju, S., Zang, H., Frost, V.: A measurement study of scheduler-based attacks in 3G wireless networks. In: Uhlig, S., Papagiannaki, K., Bonaventure, O. (eds.) PAM 2007. LNCS, vol. 4427, pp. 105–114. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Kim, D., Hu, YC. (2010). A Study on False Channel Condition Reporting Attacks in Wireless Networks. In: Jajodia, S., Zhou, J. (eds) Security and Privacy in Communication Networks. SecureComm 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 50. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16161-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-16161-2_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16160-5
Online ISBN: 978-3-642-16161-2
eBook Packages: Computer ScienceComputer Science (R0)