Revisiting security of proportional fair scheduler in wireless cellular networks

نویسندگان

  • Hanjin Park
  • Yung Yi
  • Yongdae Kim
چکیده

http://dx.doi.org/10.1016/j.comnet.2014.09.009 1389-1286/ 2014 Elsevier B.V. All rights reserved. ⇑ Corresponding author. Tel.: +82 42 350 3486. E-mail addresses: [email protected] (H. Park), yiyung@kaist. edu (Y. Yi), [email protected] (Y. Kim). 1 Being malicious or selfish just follows a fabricator’s inte cheating. However, it is possible that a selfish user’s behavio indirectly malicious because her selfish action can negatively imp normal users. In this paper, we assume that selfish users’ main in the increase of its own (long-term average) throughput whereas m users have interests of blocking other normal users as long as po Hanjin Park , Yung Yi b,⇑, Yongdae Kim

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Context-Aware Resource Allocation for Cellular Wireless Networks

Current cellular networks are often overloaded by Smartphone traffic, while the users’ Quality of Service (QoS) demands are not met. To cope with this problem, we demonstrate a new radio resource management approach. With Context-Aware Resource Allocation, the base station’s scheduler (i) observes Context Information (CI) from the user’s environment and (ii) utilizes this knowledge for an effic...

متن کامل

An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks

The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...

متن کامل

Incentive Mechanism Design for Selfish Hybrid Wireless Relay Networks

Non-cooperative behaviors in communication networks can significantly adversely affect the entire network. Recently, researchers have begun to study such non-cooperative communication systems within a game theory framework and strive to engineer the system to prevent performance degradation under non-cooperative behaviors. The WWAN/WLAN two-hop-relay system described in [1] integrates two types...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks

Abstract. Though high-speed (3G) wide-area wireless networks have been rapidly proliferating, little is known about the robustness and security properties of these networks. In this paper, we make initial steps towards understanding these properties by studying Proportional Fair (PF), the scheduling algorithm used on the downlinks of these networks. We find that the fairness-ensuring mechanism ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 75  شماره 

صفحات  -

تاریخ انتشار 2014