Skip to main content

A Study on False Channel Condition Reporting Attacks in Wireless Networks

  • Conference paper
Book cover Security and Privacy in Communication Networks (SecureComm 2010)

Abstract

Wireless networking protocols are increasingly being designed to exploit a user’s measured channel condition; we call such protocols channel-aware. Each user reports its measured channel condition to a manager of wireless resources and a channel-aware protocol uses these reports to determine how resources are allocated to users. In a channel-aware protocol, each user’s reported channel condition affects the performance of every other user. A possible attack against channel-aware protocols is false feedback of channel condition. The deployment of channel-aware protocols increases the risks posed by false feedback. In this paper, we study the potential impact of an attacker that falsely reports its channel condition and propose a defense mechanism to securely estimate channel condition. We analyze our mechanism and evaluate the system performance deploying our mechanism through simulation. Our evaluation shows that our mechanism effectively thwarts channel condition misreporting attack.

This material is based upon work partially supported by USARO under Contract No. W-911-NF-0710287 and the NSF under Grant No. CNS-0953600.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jalali, A., Padovani, R., Pankaj, R.: Data throughput of cdma-hdr a high efficiency-high data rate personal communication wireless system. In: Proc. IEEE VTC, vol. 3, pp. 1854–1858 (May 2000)

    Google Scholar 

  2. Viswanath, P., Tse, D.N.C., Laroia, R.: Opportunistic beamforming using dumb antennas. IEEE Transactions on Information Theory 48(6), 1277–1294 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  3. Sendonaris, A., Erkip, E., Aazhang, B.: Increasing uplink capacity via user cooperation diversity. In: Proceedings of IEEE International Symposium on Information Theory, p. 156 (August 1998)

    Google Scholar 

  4. Luo, H., Ramjee, R., Sinha, P., Li, L.E., Lu, S.: Ucan: a unified cellular and ad-hoc network architecture. In: ACM MobiCom, pp. 353–367. ACM, New York (2003)

    Google Scholar 

  5. De Couto, D.S.J., Aguayo, D., Bicket, J., Morris, R.: A high-throughput path metric for multi-hop wireless routing. In: ACM MobiCom, pp. 134–146. ACM, New York (2003)

    Google Scholar 

  6. Draves, R., Padhye, J., Zill, B.: Comparison of routing metrics for static multi-hop wireless networks. In: ACM SIGCOMM, pp. 133–144. ACM, New York (2004)

    Google Scholar 

  7. Jing, T., Wang, H.J., Hu, Y.C.: Preserving location privacy in wireless lans. In: Proc. ACM MOBISYS (June 2007)

    Google Scholar 

  8. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2002)

    Google Scholar 

  9. Racic, R., Ma, D., Chen, H., Liu, X.: Exploiting opportunistic scheduling in cellular data networks. In: NDSS (2008)

    Google Scholar 

  10. Odyssey 8500, http://www.wavesat.com/pdf/OD-8500-IC-PB.pdf

  11. Airspan, http://www.airspan.com/products_wimax.aspx

  12. Sdr, http://en.wikipedia.org/wiki/Software-defined_radio

  13. Smith III, J.O.: Spectral Audio Signal Processing. In: Center for Computer Research in Music and Acoustics, CCRMA (2009)

    Google Scholar 

  14. Proakis, J.: Digital Communications, 4th edn., McGraw-Hill Science/Engineering/Math (August 2000)

    Google Scholar 

  15. Physical layer procedures (fdd), release 5. 3GPP TS25.214 V5.5.0 (June 2003), http://www.3gpp.org/ftp/Specs/archive/25_series/25.214/25214-550.zip

  16. Russell, S.J., Norvig, P.: Artificial Intelligence: A Modern Approach. Pearson Education, London (2003), http://portal.acm.org/citation.cfm?id=773294

    MATH  Google Scholar 

  17. ns-2: Network simulator, http://www.isi.edu/nsnam/ns/

  18. eurane: Enhanced umts radio access network extensions for ns-2, http://eurane.ti-wmc.nl/eurane/

  19. Selection procedures for the choice of radio transmission technologies of the umts. ETSI TS UMTS 30.03 V3.2.0

    Google Scholar 

  20. Carbunar, B., Ioannis, I., Nita-Rotaru, C.: Janus: A framework for scalable and secure routing in hybrid wireless networks. IEEE Transactions on Dependable and Secure Computing (2008)

    Google Scholar 

  21. Haas, J.J., Hu, Y.C.: Secure unified cellular ad hoc network routing. In: IEEE Globecom (2009)

    Google Scholar 

  22. Bali, S., Machiraju, S., Zang, H., Frost, V.: A measurement study of scheduler-based attacks in 3G wireless networks. In: Uhlig, S., Papagiannaki, K., Bonaventure, O. (eds.) PAM 2007. LNCS, vol. 4427, pp. 105–114. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Kim, D., Hu, YC. (2010). A Study on False Channel Condition Reporting Attacks in Wireless Networks. In: Jajodia, S., Zhou, J. (eds) Security and Privacy in Communication Networks. SecureComm 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 50. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16161-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16161-2_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16160-5

  • Online ISBN: 978-3-642-16161-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics