Issue No. 05 - May (2014 vol. 13)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TMC.2013.104
Dongho Kim , HP Labs., Palo Alto, CA, USA
Yih-Chun Hu , Dept. of Comput. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
Wireless networking protocols are increasingly being designed to exploit a user's measured channel condition; we call such protocols channel-aware. Each user reports the measured channel condition to a manager of wireless resources and a channel-aware protocol uses these reports to determine how resources are allocated to users. In a channel-aware protocol, each user's reported channel condition affects the performance of every other user. The deployment of channel-aware protocols increases the risks posed by false channel-condition feedback. In this paper, we study what happens in the presence of an attacker that falsely reports its channel condition. We perform case studies on channel-aware network protocols to understand how an attack can use false feedback and how much the attack can affect network performance. The results of the case studies show that we need a secure channel condition estimation algorithm to fundamentally defend against the channel-condition misreporting attack. We design such an algorithm and evaluate our algorithm through analysis and simulation. Our evaluation quantifies the effect of our algorithm on system performance as well as the security and the performance of our algorithm.
routing protocols, channel estimation, cooperative communication,channel-condition misreporting attack, false channel condition, wireless networking protocols, wireless resources, channel-aware network protocols, channel condition estimation algorithm,Routing protocols, Measurement, Peer-to-peer computing, Throughput, Relays, Topology,Wireless communication, Network-level security and protection,wireless communication, Network-level security and protection
Dongho Kim, Yih-Chun Hu, "A Study on False Channel Condition Reporting Attacks in Wireless Networks", IEEE Transactions on Mobile Computing, vol. 13, no. , pp. 935-947, May 2014, doi:10.1109/TMC.2013.104