Revisiting security of proportional fair scheduler in wireless cellular networks
نویسندگان
چکیده
http://dx.doi.org/10.1016/j.comnet.2014.09.009 1389-1286/ 2014 Elsevier B.V. All rights reserved. ⇑ Corresponding author. Tel.: +82 42 350 3486. E-mail addresses: [email protected] (H. Park), yiyung@kaist. edu (Y. Yi), [email protected] (Y. Kim). 1 Being malicious or selfish just follows a fabricator’s inte cheating. However, it is possible that a selfish user’s behavio indirectly malicious because her selfish action can negatively imp normal users. In this paper, we assume that selfish users’ main in the increase of its own (long-term average) throughput whereas m users have interests of blocking other normal users as long as po Hanjin Park , Yung Yi b,⇑, Yongdae Kim
منابع مشابه
Context-Aware Resource Allocation for Cellular Wireless Networks
Current cellular networks are often overloaded by Smartphone traffic, while the users’ Quality of Service (QoS) demands are not met. To cope with this problem, we demonstrate a new radio resource management approach. With Context-Aware Resource Allocation, the base station’s scheduler (i) observes Context Information (CI) from the user’s environment and (ii) utilizes this knowledge for an effic...
متن کاملAn efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks
The wireless communication with delivering variety of services to users is growing rapidly in recent years. The third generation of cellular networks (3G), and local wireless networks (WLAN) are the two widely used technologies in wireless networks. 3G networks have the capability of covering a vast area; while, WLAN networks provide higher transmission rates with less coverage. Since the two n...
متن کاملIncentive Mechanism Design for Selfish Hybrid Wireless Relay Networks
Non-cooperative behaviors in communication networks can significantly adversely affect the entire network. Recently, researchers have begun to study such non-cooperative communication systems within a game theory framework and strive to engineer the system to prevent performance degradation under non-cooperative behaviors. The WWAN/WLAN two-hop-relay system described in [1] integrates two types...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملA Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks
Abstract. Though high-speed (3G) wide-area wireless networks have been rapidly proliferating, little is known about the robustness and security properties of these networks. In this paper, we make initial steps towards understanding these properties by studying Proportional Fair (PF), the scheduling algorithm used on the downlinks of these networks. We find that the fairness-ensuring mechanism ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 75 شماره
صفحات -
تاریخ انتشار 2014