A study on false channel condition reporting attacks in wireless networks

Dongho Kim, Yih-Chun Hu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Wireless networking protocols are increasingly being designed to exploit a user's measured channel condition; we call such protocols channel-aware. Each user reports its measured channel condition to a manager of wireless resources and a channel-aware protocol uses these reports to determine how resources are allocated to users. In a channel-aware protocol, each user's reported channel condition affects the performance of every other user. A possible attack against channel-aware protocols is false feedback of channel condition. The deployment of channel-aware protocols increases the risks posed by false feedback. In this paper, we study the potential impact of an attacker that falsely reports its channel condition and propose a defense mechanism to securely estimate channel condition. We analyze our mechanism and evaluate the system performance deploying our mechanism through simulation. Our evaluation shows that our mechanism effectively thwarts channel condition misreporting attack.

Original languageEnglish (US)
Title of host publicationSecurity and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings
Pages107-124
Number of pages18
DOIs
StatePublished - Dec 1 2010
Event6th International Conference on Security and Privacy in Communication Networks, SecureComm 2010 - Singapore, Singapore
Duration: Sep 7 2010Sep 9 2010

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Volume50 LNICST
ISSN (Print)1867-8211

Other

Other6th International Conference on Security and Privacy in Communication Networks, SecureComm 2010
CountrySingapore
CitySingapore
Period9/7/109/9/10

Keywords

  • Cooperative relay
  • Opportunistic scheduler
  • Wireless network

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'A study on false channel condition reporting attacks in wireless networks'. Together they form a unique fingerprint.

  • Cite this

    Kim, D., & Hu, Y-C. (2010). A study on false channel condition reporting attacks in wireless networks. In Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Proceedings (pp. 107-124). (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; Vol. 50 LNICST). https://doi.org/10.1007/978-3-642-16161-2_7