TY - CHAP
T1 - The benefits of deceit
T2 - 25th IEEE International Symposium on Local and Metropolitan Area Networks, LANMAN 2019
AU - Quinlan, Jason J.
AU - Roedig, Utz
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/7
Y1 - 2019/7
N2 - As we advance towards smart cities, autonomous vehicles and the avalanche of IoT devices proposed for the future, we need to give careful consideration to how easily compromised devices can impact network state. Current proposals for devices typically use cellular networks as the backhaul or final hop. These devices will leverage existing trust-based client-side channel metrics, such as Channel Quality Indicator (CQI), when the base-station determines scheduling decisions. In this paper, we investigate the scheduling impact of a malicious device when it changes its channel metrics, so as to improve its download rate or even to negate the download rate of others. We utilise real-time 4K ultra-high definition video delivery as an example of high throughput demand application and compare the delivery rates of multiple devices in an open-source 5G simulated NS-3 network. Our results illustrate that when a malicious client deceives the scheduler, the other clients in the network have a noticeable decrease in both viewable quality and underlying delivery rate (25% decrease in the average video quality across the non malicious clients).
AB - As we advance towards smart cities, autonomous vehicles and the avalanche of IoT devices proposed for the future, we need to give careful consideration to how easily compromised devices can impact network state. Current proposals for devices typically use cellular networks as the backhaul or final hop. These devices will leverage existing trust-based client-side channel metrics, such as Channel Quality Indicator (CQI), when the base-station determines scheduling decisions. In this paper, we investigate the scheduling impact of a malicious device when it changes its channel metrics, so as to improve its download rate or even to negate the download rate of others. We utilise real-time 4K ultra-high definition video delivery as an example of high throughput demand application and compare the delivery rates of multiple devices in an open-source 5G simulated NS-3 network. Our results illustrate that when a malicious client deceives the scheduler, the other clients in the network have a noticeable decrease in both viewable quality and underlying delivery rate (25% decrease in the average video quality across the non malicious clients).
UR - https://www.scopus.com/pages/publications/85073165521
U2 - 10.1109/LANMAN.2019.8847162
DO - 10.1109/LANMAN.2019.8847162
M3 - Chapter
AN - SCOPUS:85073165521
T3 - IEEE Workshop on Local and Metropolitan Area Networks
BT - 25th IEEE International Symposium on Local and Metropolitan Area Networks, LANMAN 2019
PB - IEEE Computer Society
Y2 - 1 July 2019 through 3 July 2019
ER -