Result: Revisiting security of proportional fair scheduler in wireless cellular networks
Department of Electrical Engineering, KAIST, Daejeon, Korea, Republic of
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
Operational research. Management
Telecommunications and information theory
Further Information
Proportional fair scheduling (PFS) and its variants have been widely deployed in 3G/4G systems, where base stations (BSs) use channel quality indicator (CQI) from users as a channel feedback. Series of recent papers have shown that PFS may not perform as expected, when these client-side feedbacks such as CQI or NACK are fabricated. These results, however, were obtained without considering all relevant components in practice that are designed to handle various comer cases. In this paper, we revisit the impact of CQI and NACK fabrications, and also the fabrication of ACK (which has been largely ignored in prior work), by jointly considering all known components such as adaptive modulation and coding (AMC), hybrid automatic repeat request (HARQ), outer loop link adaptation (OLLA) and PFS as a whole. To consider many practical fabrication scenarios, we study both cases when only a single feedback and a smart combinations of multi-feedbacks are exploited for selfish and/or malicious purposes. From these studies, we draw in-depth findings with large practical implications, most of which are in sharp contrast to those in prior work on the security of PFS.