On the Exploitation of CDF based Wireless Scheduling
Udi Ben-Porata,∗, Anat Bremler-Barrb , Hanoch Levyc
a Computer
Engineering and Networks Laboratory (TIK), ETH Zurich, Switzerland.
Science Dpt., Interdisciplinary Center, Herzliya, Israel.
c Computer Science Dpt., Tel-Aviv University, Tel-Aviv, Israel.
b Computer
Abstract
Channel-aware scheduling strategies - such as the CDF scheduler (CS) algorithm - provide an effective mechanism for
utilizing the channel data rate for improving throughput performance in wireless data networks by exploiting channel
fluctuations. A highly desired property of such a scheduling strategy is that its algorithm is stable, in the sense that
no user has incentive ”cheating” the algorithm in order to increase his/hers channel share (on the account of others).
Considering a single user we show that no such user can increase his/hers channel share by misreporting the channel
capacity. In contrast, considering a group of users, we present a scheme by which coordination allows them to gain
permanent increase in both their time slots share and in their throughput on the expense of others, by misreporting
their rates. We show that for large populations consisting of regular and coordinated users in equal numbers, the ratio
of allocated time slots between a coordinated and a regular user converges to e − 1 ≈ 1.7. Our scheme targets the
very fundamental principle of CS (as opposed to just attacking implementation aspects), which bases its scheduling
decisions on the Cumulative Distribution Function (CDF) of the channel rates reported by users. Our scheme works
both for the continuous channel spectrum and the discrete channel spectrum versions of the problem. Finally, we
outline a modified CDF scheduler immune to such attacks.
Keywords: Wireless, Cellular, MAC layer, CDF, Scheduling, Fairness, DDoS, Attack, Exploit.
1. Introduction
High-speed wireless networks are becoming increasingly common and along with that the strategy of
scheduling the high-speed data - which is vital to the
performance of moderns wireless systems - has become
the subject of active research. The modern wireless
networks standards such as HSPDA [1] and EV-DO
[2] [3] allow new generation of channel aware schedulers - such as the Proportional Fairness [4] [5] and the
CDF scheduler [6] - which improve throughput performance by exploiting channel fluctuations while maintaining fairness between the users.
The CDF Scheduler (CS) makes scheduling decisions
based on the Cumulative Distribution Function (CDF)
functions of the users in such way that every time slot
the user whose rate is the least probable to become
higher is scheduled for transmission. An important
property of this scheduler is that it statistically allocates
∗ Corresponding Author.
E-mail addresses:
[email protected] (U. Ben-Porat),
[email protected] (A. Bremler-Barr) and
[email protected] (H. Levy).
Preprint submitted to Computer Networks
all users an equal number of slots while smartly utilizing
the knowledge of channel capacity to dynamically select
at every moment the more attractive (higher capacity)
users. A distinctive feature of this algorithm is that it allows to predict the exact throughput for each user based
on his/hers1 CDF alone, regardless of changes in the
channel rate distribution of other users. These features
and its simple notion of fairness (equal time share) make
CS an attractive alternative to the Proportional Fairness
Scheduler (PFS) [4]. Recent studies [7] [8] revealed the
vulnerability of PFS to delays/jitter and loss of throughput caused by malicious users by providing false channel capacity reports. In this paper the vulnerability of
the CDF scheduler to threats of non-conforming opportunistic users as well as malicious users is investigated
for the first time.
One of the main roles of a resource allocation mechanism is to ensure fairness of the allocation under the
assumption that every user aims at increasing his own
allocation. Furthermore, it is highly important that the
1 From now on we use ”he” and ”his” to mean ”she/he” and
”hers/his” for the sake of reading flow.
December 2, 2012
scheduler will be resilient to users who may try to increase the resources allocated to them by not fully conforming with the protocol rules.
The objective of this work is to study this problem.
Namely, whether a user, or a group of users, can mislead the CDF scheduler by providing false channel capacity reports and use it to increase the amount of resources allocated to them. Every modern channel-aware
scheduler must allow a temporary state of unfairness in
order to utilize a temporary exceptionally good channel condition of one of the users. Nevertheless, it is
still expected that in the long run - that is, in the steady
state - fairness is enforced. For example, in [7] the authors presented an attack on PFS in which a starved user
can suddenly report an exceptionally good channel condition and temporarily be granted high priority, which
cause other users to experience jitter. However, in the
long run, the fairness that PFS is meant to ensure, is
kept. In this work, we show that the CDF scheduler can
be attacked by malicious and selfish users who gain a
permanent advantage over users. That is, the time share
fairness that the CDF scheduler is meant to ensure is not
kept even in the steady state. We show that this is a fundamental weak point of the CDF scheduler regardless of
its exact implementation.
To this end we show that the CDF algorithm is resilient against ”attacks” produced by a single user. That
is, a single user can increase neither the number of slots
nor the bandwidth allocated to him by providing misleading information about his channel capacity. We then
show, that nonetheless, a group of coordinated users
which collaborate with each other can increase both the
number of slots and the bandwidth allocated to each of
them. That is, while the scheduler is designed to counter
an independent selfish behavior of a single user, its design does not take into account the possibility of a coordinated group of users. The capacity announcement
strategy used by the coordinated users is very simple
and requires only knowledge of each other’s capacity.
We conduct the analysis of this strategy and derive its
performance gains. The analysis is carried out both for
the the continuous rate distribution model (Section 3)
and the discrete rate distribution model (Section 4). Our
results show that the gain that such non-conforming
users can achieve may be as high as 28% in a typical
system configuration (30 users). Furthermore, the ratio
between the slot allocation of a coordinated user and a
regular user can reach e − 1 ≈ 1.7. We further consider coordinated malicious users. These aim at reducing the performance the regular users, not caring about
their own performance. We show that the channel share
loss that the regular innocent users suffer can be as high
as 48% in a typical system configuration.
The attack algorithm we show exploits the stochastic worst case traffic pattern of multiple users that can
be applied to the system. This type of attack is demonstrated in the Reduction of Quality (RoQ) attacks papers
[9, 10, 11]. RoQ attacks target the adaptation mechanisms by hindering the adaptive component from converging to steady-state. This is done by sending - from
time to time - a very short burst of surge demand imitating many users and thus pushing the system into an
overload condition. Using a similar technique, Kuzmanovic and Knightly [12] presented the Shrew Attack
which is tailored and designed to exploit TCP’s deterministic retransmission timeout mechanism. Another
example of an attack exploiting the stochastic worst case
is given in [13, 14]. There it is shown that Weighted Fair
Queueing (WFQ), a commonly deployed mechanism to
protect traffic from DDoS attacks, is ineffective in an
environment consisting of bursting applications such as
the Web client application. The paper [15] shows attack
on the SSL handshake, by requesting again and again
hard SSL requests.
The rest of the paper is organized as follows: After
model and preliminaries given in Section 2, Section 3
analyzes non-conformist users under the continuous rate
distribution, and Section 4 does it under the discrete rate
distribution. In Section 5 we analyze the loss for regular
users by coordinated and malicious users in the practical
discrete model. Finally, in Section 6 we outline a modified CDF Scheduler immune to selfish or malicious behavior. Note that a short abstract of this work has been
presented at [16].
2. Assumptions, Model and Preliminaries
In the scheduling models discussed in this work, time
is slotted to slots t = 1, 2, ... and the possible channel
rates are arbitrary and non negative. The rate at which
user k can transmit at time slot t is given by Rk (t). Rk (t)
is distributed according to random variable Rk associated with user k, and whose CDF is FRk (r) = Pr[Rk ≤
r]. Rk (t) is a stationary random process assumed to be
independent of Rk (t′ ) for any t , t′ and of R j (t′ ) for any
j , k and any t′ .
At each slot t, each user k announces to the scheduler his actual value Rk (t). The scheduler may compute
the distribution FRk (r) from the past reports of user k.
Note that we demonstrate the vulnerability of CS without targeting a weak point in the inferring mechanism,
therefore throughout the paper we assume the schedular
has the precise CDF functions of the channel rates reported by users. At time t, the scheduler can use both
2
the studied FRk (r), k = 1, ..., K and the current user rates
Rk (t), k = 1, ..., K to decide to which user to transmit at
slot t. The rate at which the server will transmit to the
selected user, say k, is Rk (t).
rate by modifying their laptop’ 3G PC cards, by either
through the accompanying software development kit or
the device firmware. And the providers cannot detect it,
even if they attempt tamper-proof technique [8]. Nevertheless, we prove that under the CDF scheduler, it is impossible for one user to benefit from an additional time
share or throughput by misreporting his channel condition. We show that this result stems from the fundamental characteristics of the CDF scheduler which are
common to both the continuous and the discrete models
(Section 4).
3. The Basic Problem: Dealing with Continuous
Rate Distributions
In this section we assume that all the channel rate distributions are continuous, that is the distribution functions do not contain mass values (i.e. FRk (r) is differentiable and Pr[Rk = x] equals zero for every x). Later, in
Section 4, we will deal with discrete (and mixed) probability functions.
Theorem 1. If a user has no knowledge on the reports
of others, then no strategy can benefit him with long-run
additional time share.
3.1. Scheduling Algorithm
Proof: The CDF function of every continuous random
variable X is distributed uniformly, F X ∼ Uniform(0, 1),
regardless of its distribution. Therefore, since the channel condition reports issued by the users are independent
of each other, the priority value of every user is a random number between zero and one. Hence, every user
has an equal probability to win a time slot. Therefore,
all users receive (in the steady state) the same amount
of time share N1 where N is the number of users in the
system.
Note that the proof for Theorem 1 does not hold for a
user who coordinate with other user(s), because then the
channel reports of the users are no longer independent.
In addition to Theorem 1, under both continuous and
discrete models, there is no misreporting strategy that
allows a user to achieve higher throughput than what
he would get by always reporting his real rate. Due
to its length, the formal proof of this claim (under the
discrete model, which is the model used in practice) is
placed at the Appendix. Nevertheless, we give here an
intuitive explanation for the validity of this claim (under
both continuous and discrete models). A false reports
strategy can involve reporting a fake high rate when the
real rate is lower and vice versa. Reporting a fake high
channel rate might increase the priority values in some
of the time slots in which the real rate is low. However, it makes the high rates reported by the user less
exceptional than they really are and hence decrease the
priority value when the user truly experiences and reports a high rate. Such behavior is not beneficial since
increasing the priority value of some low-rate time slots
on the expense of the priority value of high-rate time
slots, never benefits the user. Reporting a rate lower
than the real rate has also both negative and positive effects. The positive effect is that such behavior makes
other time slots in which the user report the truth about
The basic CDF Scheduler (CS), aiming at dealing
with continuous distributions, was introduced in [6] and
operates as follows. Recall that Rk (t) is the actual channel capacity of user k at time slot (TS) t and let k∗ (t) be
the user selected for data transmission. The scheduler
selects k∗ (t) to be the user for which P[Rk > Rk (t)] is the
smallest among all users. That is, the user whose rate is
the least probable to become higher, namely:
k∗ (t) = argmaxk {FRk (Rk (t))},
where FRk (r) = P[Rk ≤ r]. The original scheduler definition [6] includes the option to assign each
user a special weight wk according to k∗ (t) =
1
argmaxk {FRk (Rk (t)) wk } but for the sake of simplicity
we omit the weight factor and assume the Base Station (BS) serves the users equally. For notational simplicity we define Vk (t) = FRk (Rk (t)) and since k∗ (t) =
argmaxk {Vk (t)} we will refer to Vk (t) as the priority
value assigned to User k at TS t.
The CDF scheduler relies on a well-known property
of CDF functions to ensure time share fairness: The
CDF function of every continuous random variable X is
distributed uniformly, F X ∼ Uniform(0, 1). That is, the
priority value of every user k is distributed uniformly,
Vk ∼ Uniform(0, 1), regardless of the distribution of
Rk . Therefore, all users have equal chance to obtain the
highest priority value and hence time-share fairness is
maintained.
3.2. Misreporting of channel rates cannot benefit a single user
The idea of users reporting fake channel rate to exploit the properties of channel aware scheduler was already introduced in [8]. The users can fake channel
3
his high rate look more exceptional. Hence, the user
will have an increased priority value in these time slots.
The negative effect is that in the time slots in which he
fakes a low rate, the user has a lower priority value than
if he reported the truth. In addition, even if he is assigned for transmission, the transmission rate will fit his
report and will be lower than what his real channel condition can support. In the formal proof we show that
this negative effect shadows the positive effect. Hence,
if to summarize it in one sentence, scarifying some of
the high rate slots to increase the priority value in the
rest never pays off. Finally we can conclude that since
no strategy can benefit the user with either additional
throughput or time share – the best strategy for one user
is to always report his real rate.
3.4. Analysis of the Coordinated Users Share
Let R′c be the R.V. of the reported channel rate by user
c when he follows the coordination strategy. Recall that
Rc (t) is the real channel rate of user c at TS t, therefore
R′c = Rc if the user behaves normally.
Lemma 1.
FR′c (r) = G(FRc (r))
where G(x) =
L−1
L
+
1 L
Lx
(1)
and c ∈ C.
Proof: Let Er be the event where user c ∈ C reports to
the BS channel rate less than r (Rc (t) < r). Let WIN be
the event where user c is the chosen user in C to report
his real channel rate, therefore:
3.3. Coordinated Users Strategy
FR′c (r) = (1 − P[WIN])P[Er |¬WIN] + P[WIN]P[Er |WIN]
We next deal with a group of non-conforming opportunistic users who coordinate their action and reporting
in order to increase their time and throughput shares.
In the previous section we explained that the negative effects of a misreporting strategy exceed its benefit
when one user acts on his own. In this section we describe a cooperation scheme in which a group of users
can gain additional time share and throughput while
avoiding the negative effects that reporting a false channel condition may cause.
Let C be a group of |C| = L coordinated users and
N is the number of additional regular users in the network. Each one of the coordinated users knows if
his rate is the least probable to be higher (and therefore will get the highest scheduling priority) in C before reporting to the BS. Let c∗ (t) be the user with the
highest CDF value in the group in time t. Formally,
c∗ (t) = argmaxc {FRc (Rc (t))} where c ∈ C. The reporting strategy is simple: at time slot t user c∗ will be the
only one acting normal (reporting his real channel rate
Rc∗ (t)) while all others report zero.
The users share their CDF value, so each user knows
if he is c∗ or not. The coordinated users strategy can
be implemented using a low bandwidth medium/sidechannel that allows the users to share this small amount
of information. For example, a big factory using a designated private (low rate and cost) wireless network to
coordinate the access points used by its employees in
order to gain more throughput to its users. Note that
in Section 5 we describe a malicious strategy that does
not require any communication between the users during the attack and causes even a greater damage to the
system than the coordinated strategy described here.
(2)
Every time slot each coordinated user has an equal
probability to be the one reporting his real channel rate,
therefore P[WIN] = L1 . If c is not chosen to report his
real rate, then he reports minimal channel rate, therefore
for every r, P[Er |¬WIN] = 1. Now all is left is compute
P[Er |WIN].
Let R.V. Y be Y(t) = max j {FR j (R j (t))| j ∈ C}, since
FR j is CDF then P[FR j < x] = x and we get P[Y <
y] = yL , this is true regardless of the ID of j for
whom FR j (R j (t)) = Y(t), therefore P[Y < y] = P[Y <
y|WIN] = yL . According to the strategy, if c reports
∧
less than r and he is the chosen user (Event Er WIN)
then his real channel rate – Rc (t) – must be less than r
which means that FRc (Rc (t)) < FRc (r). Given WIN, then
FRc (Rc (t)) = max j {FR j (R j (t))| j ∈ C} = Y(t) and accord∧
ing to what we just showed we get (Er WIN) ⇐⇒
FRc (Rc (t)) < FRc (r) ⇐⇒ (Y(t) < FRc (r)) and we
get P[Er |WIN] = P[Y(t) < FRc (r)] = (FRc (r))L since
P[Y < y|WIN] = yL as we showed earlier. According
to Equation 2 and the conditional results we showed we
get Equation 1.
Recall that Vc (r) = FRc (r) is the priority value of user
c for reporting channel rate r to the BS when he behaves
normally (always reporting his real channel rate). Now
let Vc′ (r) = FR′c (r) be the priority value he gets for r
when following the coordination strategy, then according to Lemma 1 we get that:
Vc′ (r) = G(Vc (r))
(3)
Before we analyze the benefit from coordination, we
first prove that it can never harm (and hence only benefit) the coordinating users.
4
Theorem 2. User following the coordination strategy
will still win every time slot that he would have won
when if he behaved normally. Therefore, his throughput
and time share can only be increased when following
the coordination strategy.
to report a zero channel rate L − 1/L of the time. Therefore, when he finally reports a non-zero rate r > 0, then
FR′c (r) = Prob(R′c < r) > L−1/L. This explains why the
values of the non-solid curves in Fig. 1 are greater than
L−1/L. For example, assume a system with three users,
U1 , U2 and U3 . If U1 , who always report his true rate,
has a CDF value of 0.4, what is the probability that he
will be assigned with the time slot? In the case where U2
and U3 are regular (non-coordinated) users, the probability that both of them have priority value that does
not exceed 0.4 is 0.42 = 16%. However, if U2 and U3
are coordinated, then one of them is going to report his
real rate, which will be given with a CDF value higher
than 0.5 regardless of the rate he reports. Therefore, if
U2 and U3 are coordinated,the probability of U1 to win
the time slot with a CDF value of 0.4 is 0% instead of
16%. To conclude, the above results show how users in
a coordinated group systematically increase their priority values. In the following theorems we show how this
advantage translates into a larger time share and more
throughput.
Proof: Assume user c0 obtains the highest priority
value when all the users in the system behave normally.
Therefore, c0 = k∗ (t) = argmaxk {Vk (Rk (t))}. Since also
c0 = c∗ (t), when following the strategy, c0 will be the
user from C reporting his real rate in this time slot. A
simple function analysis can show that G(x) > x for
x ∈ (0, 1). Therefore, according to Lemma 1, the priority value he gets Vc′0 (r) = G(Vc0 (r)) is greater than
Vc0 (r) which is greater than the priority values of all
other users. Therefore, he still obtains this time slot
when following the strategy.
CDF Value Evaluated by the Scheduler (F
R’c
)
Gain from Coordination
1
0.8
Theorem 3. In a network consisting L + N users of
which L are coordinated, the time share fraction dedicated to the L coordinated users (jointly) depends only
on L and N (regardless of the channel rate distributions
of any of users) and is given by:
(
)N+1
L−1
L
.
(4)
1 −
N+1
L
0.6
0.4
L=5 Coordinated Users
L=2 Coordinated Users
No Coordination
0.2
0
0
0.2
0.4
0.6
Real CDF Value (F )
0.8
Proof: First we make few definitions and short calculations to be used later. Let R.V. W be the maximal priority W(t) = maxc {Vc (Rc (t))}. Since P[Vc < x] = x, we
get P[W < w] = wL . Therefore, the probability density
function (PDF) of W is fW (w) = (P[W < w])′ = L·wL−1 .
Let R.V. B(t) = maxn {Vn (Rn (t))}, where n is one
of the regular users, be the highest priority among the
regular users and R.V. A = maxn {Vn′ (Rn (t))} be the
highest priority among the coordinated users. Then,
from Equation 3 we get that A = maxn {G(Vn (Rn (t)))}.
In addition, since G is monotonically increasing, then
maxn {G(Vn (Rn (t)))} = G(maxn {Vn (Rn (t))}) and we get
A = G(W).
According to that we get:
∫ 1
fW (w) · P[B < A|W = w]dw
P[B < A] =
w=0
∫ 1
L · wL−1 · P[B < G(w)]dw.
=
1
Rc
Figure 1: The Y-axis is the CDF value evaluated by the base station
(FR′c (r)) as a function of the real CDF values that would have been
evaluated without coordinating with other users (FRc (r)).
Fig. 1 depicts the gain from following the coordination scheme based on Eq. 1. For example, let r0 be a rate
with a corresponding CDF value of FRc (r0 ) = 0.4. That
is, in reality, 40% of the time the channel rate of the user
is r0 or lower. For normal users, who always report their
real rates, the scheduler evaluates their real CDF value
FR′c (r) = 0.4 as the solid curve (labeled No Coordination) shows. If the user coordinates with another user,
L = 2, then, as the dotted curve show, the scheduler
evaluates a CDF value of 0.58 instead of 0.4. As seen
in the dashed curve, L = 5, when he cooperates with
four other users, his priority value will be 0.802 instead
of 0.4. As explained in the proof of Lemma 1, when a
user coordinates with L − 1 other users, he is expected
w=0
The probability that all regular users will have priority
less than a is P[B < a] = aN , then P[B < G(w)] =
5
(G(w))N and we get:
P[B < A] =
=
=
and since
∫1
w=0
P[B < A] =
∫
1
)N
(
L−1 1 L
dw
+ w
L
L
w=0
∫ 1
N ( )
∑
N (L − 1)N−i Li
LwL−1 ·
w dw
i
LN
w=0
i=0
∫
N ( )
∑
N (L − 1)N−i 1 (i+1)L−1
w
dw
·
i
LN−1
w=0
i=0
LwL−1
i=0
i LN (i + 1)
.
Hence, we receive that
)N+1
(
L
L−1
P[B < A] =
1
−
N+1
L
(5)
i=0
Additional time share for a coordinating user (%)
N (L − 1)N−i
·
LN
i
1
w=0
w=0
1 −1
F (w)dw.
L Rc
30
Theorem 5. In a network consisting L + N (in the continuous model) users of which L are coordinated, the average throughput (per time slot) of a coordinated user c
is given by:
∫
fW (w) · P[B < A|W = w] ·
Permanent Time−share Benefit − Continuous model
Corollary 4. Let C share and R share be the time share of
the coordinated users and regular users respectively.
When N = L − 1, then limL→∞ C share = 1 − e−1 and
share
limL→∞ R share = e−1 . This means that limL→∞ CRshare =
e − 1 ≈ 171% although this ratio - which equals L/N =
L/(L − 1) under normal conditions - should converge to
100%.
)
1
3.5. Evaluation and Discussion
In Figure 2 we evaluate the relative benefit in time
slots a coordinated user gains from the coordination
1
strategy; this is relatively to what he would get ( N+L
)
if he did not coordinate. The figure depicts this relative benefit as a function of the number of coordinated
users L (given that the total number of users is fixed
N + L = 30). One may observe that the relative benefit is maximized at L = 11, implying that a coalition of
11 coordinated users has only a little incentive adding
more users to the coalition. The relative benefit per user
obtained is 28%.
This result now allows us to evaluate the ”inequality”
in time slot allocation between a coordinated user and a
regular user. This ”inequality” can be evaluated by the
ratio between the slot shares of these users, which as
shown next, can be very high:
N (
∑
∫
Continuing the calculations in the same manner as in
the proof of Theorem 3 until the last equation which
consisting the integral, will give us Equation 6.
w(i+1)L−1 dw = ((i + 1)L)−1 we get:
N ( )
∑
N (L − 1)N−i
only if B > A (this is a time slot which is obtained by
a user from C). In addition, c has to be the user chosen
among the coordinated users to transmit his real channel
rate (happens with probability L1 ). When W = w and c
is the chosen user, then FRc (r) = w therefore his the rate
in this time slot is given by FR−1c (w), therefore we get:
w(i+1)L−1 · FR−1c (w)dw, (6)
25
20
15
10
5
0
where FR−1c (w) is the inverse function of FRc , the CDF
of the real channel rate distribution.
5
10
15
20
25
30
Number of coordinated users (L) (Total users=30)
Figure 2: Y-axis is the additional time share (in percents) that a coordinated user gains when he takes part in a coordinated group of size L
(X-Axis). The results show that when there are 30 users in the system,
participating in a coordinated group of 11 users is the most beneficial
and increases the time share of the user by 28%.
Proof: The proof is very similar to the proof of Theorem
3, we will skip the identical parts in the proof. Assume
A, B and W as defined in the proof of Theorem 3. Let
R.V. D be the rate that user c receives (at some time slot
t). If W = w then user c gets throughput from the BS
When L = N + 1 - which happens approximately at
L = 15 in Figure 2 - the time share of the L users when
6
L
behaving normally is given by 2L+1
and converges to
1
.
Corollary
4
pointed
out
that
when
L = N + 1 the
2
time share obtained by the coordinated users converges
to 1 − e−1 instead of 12 , means a coordinated user benefits from an additional time share of (1 − e−1 )/( 21 ) − 1 =
26.4% which is close to the result at L = 15 which
equals 25.3%. Recall that according to Theorem 3 these
results are valid for every system with 30 users regardless of the channel rate distributions of the users.
the extension of the CS algorithm to the case of discrete
channel rate values which appears in [17]. Again, to
keep the calculations simple, we assume all users have
the same weight and exclude the weight factor.
In the discrete model Rk (t) ∈ {r1 , r2 , ..., r M } where
r1 < r2 < ... < r M . At TS #t user k feeds back
mk (t) ∈ {1, ..., M} the index of his channel rate value.
∑m
Denote qk,m ≡ FRk (rm ) =
i=1 P[Rk = ri ] where
qk,0 is set to 0 for notational convenience. Instead of
simply taking qk,mk (t) to be the priority value of user
k, the CDF scheduler generates for each user a random priority given by a R.V. Uk (t) which is uniformly
distributed in the interval [qk,mk (t)−1 , qk,mk (t) )]. Finally,
the scheduler selects the user with the highest priority k∗ (t) = argmaxk {Uk (t)}. The priority value of the
discrete range algorithm (Uk ) preserves the fundamental characteristic of the priority value of the continuous
range algorithm (Vk ) which is that for every user k we
get P[Uk (t) ≤ x] = P[Vk (t) ≤ x] = x. More precisely,
as in the continuous model, the priority value of every user is distributed uniformly in [0, 1] (regardless of
his channel rate distribution) and hence time share fairness maintained by the scheduler also under the discrete
model.
Maximal time benefit by coordination − Continuous Model
30
Maximal time benefit (%)
25
20
15
10
5
0
10
20
30
40
50
60
70
Total users (N+L)
80
90
100
4.2. Misreporting of channel rates cannot benefit a single user
Section 3.2 explains why a single user cannot benefit
neither additional time share nor throughput by misreporting his channel rate on his own. Both under the discrete and the continuous model, the priority values of
all users are distributed uniformly in [0, 1]. Therefore,
Theorem 1 which proves that one user cannot gain additional time share is valid also under the discrete model.
To complete the proof, we provide at the Appendix a
formal proof under the discrete model for the claim that
no strategy can benefit a single user who acts alone with
additional throughput.
Figure 3: Maximal time share (percents) that one user benefits from
following the coordination strategy as a function of the total population in the system (X-Axis).
In Figure 3 we evaluate this maximal benefit as a
function of the population size (N + L varies). One
may see that this maximal benefit per user (of the coalition) monotonically increases with the population size
and approaches 30% at large populations.
According to Theorem 2 the throughput of the coordinated users can only be increased. The throughput
result for each user can be calculated according to Theorem 5 and depends on the user’s specific distribution of
channel rates and can be different for different users in
the coordinated group. The throughput gain for a coordinated group is given in the evaluation for the discrete
model.
4.3. Coordinated Users Strategy
Assume a coordinated group of users C (|C| = L)
with the same channel rate probability (but independent from each other), means ∀c1 ,c2 ∈C qc1 ,i = qc2 ,i . Let
m∗c (t) = argmaxi {ri |∃c.Rc (t) = ri } where c are users
from the coordinated group. Every time slot, only the
users with channel rate rm∗c (t) will report their real channel rate while all other report the lowest channel rate
possible r1 (they have no chance getting the highest priority).
Let pc,i be the probability that a coordinated user experiences channel rate ri and p′c,i be the probability that
4. CS with discrete channel rates range
4.1. Scheduling Algorithm
The original version of the CS algorithm ([6]) assumed continuous channel rate values even though practical systems use discrete values. We now summarize
7
( )
therefore P[MAX j<L,1 ] = 0. There are Lj possible combination of j users in C and each such combination reports rm∗c (t) = ri , (i≥2) only when their actual channel rate
is ri (with probability (pc,i ) j ) and the channel rate of all
others is ri−1 or less (with probability (qc,i−1 )L− j ).
he reports channel rate ri . Then by following the strategy we get:
Corollary 6. From the point of view of the BS (Base
Station), the channel rate probability of coordinated
user c is given by p’ as follows:
p′c,1
=
1−
M
∑
Lemma 3. Let CWIN be the event where some coordinated user wins a time slot, then
p′c,i
i=2
p′c,i
=
pc,i · (qc,i )
L−1
(q′c,1 )N ·
P[CWIN |MAX j,i ]
=
N ( )
∑
N ′ s ′
j
(p ) (qc,i−1 )N−s ·
s c,i
j+s
s=0
Theorem 7.
P[CWIN ] =
0
P[MAXL,1 ] =
(pc,1 )L
( )
L
(pc,i ) j · (qc,i−1 )L− j
j
M ∑
L
∑
P[MAX j,i ] · P[CWIN |MAX j,i ],
i=1 j=1
where P[MAX j,i ] and P[COR|MAX j,i ] are given in Lemmas 2 and 3.
Lemma 2. Let MAX j, i be the event where rm∗c (t) = ri is
reported by exactly j of the coordinated users.
P[MAX j,1 ] =
(i≥2)
Proof: According to P[Uk (t) ≤ u] = u, the probability for regular users to get a priority value u is uniform
in [0, 1]. When m∗c (t) = i ≥ 2, a coordinated user
can obtain the highest priority value only when all N
users has priority values in [0, q′c,i ]. With probability of
(N )
′ s ′
N−s
exactly s regular users have priority
s (pc,i ) (qc,i−1 )
′
values in [qc,i−1 , q′c,i ] while all the other N − s regular
users have no chance getting the highest priority. Given
that event, the priority values - U s of each of the s regular users and Uc of the coordinated users with ri is uniform in [q′c,i−1 , q′c,i ], therefore the probability for a coorj
where j
dinated user to have the highest U-value is j+s
is the number of the coordinated users with channel rate
ri . The proof for P[CWIN |MAX j,1 ] is similar.
4.4. Analysis of Coordinated Users Share
P[MAX j,i ] =
=
(i≥2)
Then when a coordinated user c reports mc (t) = i,
the scheduler generates a uniform priority value in the
interval [q′c,i , q′c,i−1 ] where q′c,i is the CDF of the reported
∑
channel rates of user c - q′c,i = ij=1 p′c, j .
For example, assume a user c1 in a network with
pc1 ,1 = pc1 ,2 = pc1 ,3 = 13 to have one of the three possible channel rates r1 , r2 , r3 . In a normal situation, if user
c1 reports channel rate r1 , then the CS generates a priority value Uc1 in [0, 13 ], if he reports r2 then the range
is [ 13 , 23 ] and finally if he reports r3 the range will be
[ 23 , 1]. Now assume this user is part of a coordinated
group (where all users share the same channel rate distribution) which follows the coordinated users’ strategy
and we want to find p′c1 ,i which is the probability for
him to actually report rate ri . When he experiences r3
then he will always report r3 because there is no other
coordinated user who will surely have higher. If he coordinates with two more users who have the same rate
probabilities then according to Corollary 6 we get that
when c1 reports r2 the CS will generate Uc1 in the in2
terval [ 14
27 , 3 ] and this increases his expected U value.
Therefore, the expected number of time slots where he
obtains the highest priority.
j
j+N
P[CWIN |MAX j,1 ]
Proof: Immediate result from Bayes rule and the correctness of Lemmas 2 and 3.
(∀ j<L)
Theorem 8. In a network consisting L + N users (in the
discrete model) of which L are coordinated, the average throughput (per time slot) of a coordinated user c is
given by:
(∀i≥2)
Proof: rm∗c (t) = ri means that ri is the highest rate of the
users in C, therefore i = 1 only when all the users in
C have r1 which happens with probability of (pc,1 )L . It
is impossible that j < L coordinated users will report
r1 since it means that at least one user reports higher
channel rate than r1 which contradicts rm∗c (t) = r1 and
N ( )
M L
∑
N 1 ∑∑
P[MAX j,i ] · P[CWIN |MAX j,i ] · ri
·
i
L
i=1 j=1
i=0
(7)
where P[MAX j,i ] and P[COR|MAX j,i ] are given in
Lemmas 2 and 3.
8
Proof: Let c be a coordinated user, the probability that
some coordinated user obtains ri at some time slot is
∑
given by Lj=1 P[MAX j,i ] · P[CWIN |MAX j,i ]. The probability this user was c is L1 and we get the probability he
∑
gets ri is given by Lj=1 P[MAX j,i ] · P[CWIN |MAX j,i ] · L1
and when summing it up over all possible rates we get
Equation 7.
ous model (Figure 2) and for the same reasons that were
already mentioned in section 3.5. A remarkable difference between the models is that the time share benefit
in the continuous model is greater than the benefit in
the discrete model. By investigating the nature of the
strategy effects in each model, we will be able to understand the reason for the differences and the effects of the
strategy in different system configurations.
In both continuous and discrete models, when a coordinated user reports the minimal channel rate instead of
his real channel rate then he widens the gap between the
CDF of the distributions of his real (Fc ) and reported
(Fc′ ) channel rate distributions (Fc′ (r) > Fc (r)). This gap
defines the increase in the priority values the user gets
for different rates. Therefore, an important observation
is that the more the user gets to report a fake channel
rates (according to the strategy conditions) - the more
time slots he gets. In the continuous model, the shared
information between the coordinated users allows them
to identify in each time slot exactly L − 1 users who
have no chance winning while in the discrete model
their number varies from 0 to L − 1 (depending of how
many coordinated users obtained the maximal channel
rate rm∗c (t) ). Therefore, there will always be more fake
channel rate reports in the continuous model and the
time share benefit in the continuous model will always
be better than in the discrete model. As the number of
the possible channel rates (M) grows, the coordinated
users’ behavior in the discrete model will become more
like their behavior in the continuous model where the
probability that two different users will get the same rate
is zero. When M grows the probability that two users
will get the same channel rate decreases. Therefore, less
users obtain rm∗c (t) and more users can report the minimal
channel rate. This means that the benefit from the strategy will grow. Bigger sets of channel rates are expected
in future physical standards for wireless communication
to allow better utilization of channel fluctuations and/or
to cover bigger range of channel condition values, so
while it is expected to allow better system performance,
it will make the system more vulnerable to such coordination strategy as we showed here.
Figure 5 shows the throughput benefit for the same
settings as in Figure 4. In order to compute the throughM
put, channel rate probabilities {pc,i }i=1
were associated
with actual rates in the CDMA2000 1xEV-DO as in
[17]. For different sets of rates, we will get different
results in Figure 5, while Figure 4 stays the same since
M
it depends only on the set of probabilities {pc,i }i=1
regardless of the actual rates associated with them.
The throughput of a coordinated user was computed
according to Theorem 8 and it was compared to the
4.5. Evaluation and Discussion
Additional time share for a coordinating user (%)
Permanent Time−share Benefit − Discrete model
14
12
10
8
6
4
2
0
5
10
15
20
25
30
Number of coordinated users (L) (Total users=30)
Figure 4: Y-axis is the additional time share (in percents) that a coordinated user (experiencing Rayleigh fading channel in CDMA2000
1xEV-DO) gains when he takes part in a coordinated group of size L
(X-Axis). The results show that when there are 30 users in the system,
participating in a coordinated group of 13 users is the most beneficial
and increases the time share of the user by 13%.
While the share of a coordinated user in the continuous model depends only on the size of the coordinated
group (L) and the number of regular users (N), the users’
share in the discrete model depends also on the number of the possible channel rates (M) and their probaM
bilities among the coordinated users {pc,i }i=1
(while still
independent from the channel rate distributions of the
M
in the system
regular users). The values of {pc,i }i=1
configuration considered in figure 4 were set according
to Rayleigh distribution on the 11 channel rates of the
CDMA2000 1xEV-DO system in the same way which
is already described in [17] (where the CDF scheduler
for discrete channel rates was presented).
As in Figure 2, Figure 4 shows that the scheduler’s
notion of fairness is violated, we can see how the additional time share (Y-axis) for one coordinated user
changes according to the number of users in the coordinated group (L) in the same manner as for the continu9
higher interest (than the continuous model) to system
designers.
In section 5.1 we present a new strategy, the malicious strategy which allows malicious users to cause
time share loss to the innocent users significantly higher
than the loss caused by the coordination strategy (in the
discrete model, Section 4). In fact, we prove that the
damage caused by the malicious strategy under the discrete model is identical to the damage caused by the
coordination strategy under the continuous model.
Permanent Throughput Benefit − Discrete model
Additional throughput for a coordinated user (%)
12
10
8
6
4
5.1. The Malicious Strategy
Malicious users intend to harm rather than increase
their own throughput as other users in a coordinated
group do. Hence, as we explain now, a malicious group
has two advantages over a coordinated group of selfish
users: 1. They gain a larger time share; 2. They need
only to synchronize before starting the attack rather than
exchanging information before every time slot as a selfish coordinated group does.
A coordinated user, aiming at increasing his own
throughput, never reports a channel condition better
than what he really experiences (if he does, it will decrease his expected throughput). Therefore, there may
be some time slots where all the users in a coordinated
group have exceptionally poor channel conditions and
even the user (among them) with the best chances to
be scheduled with the next time slot - has a very slim
chance to get it. However, a malicious user, for whom
his expected throughput is irrelevant, can report a channel condition independent of his real channel rate. This
allows a malicious group to present in every time slot a
user with an exceptionally good channel condition. For
the same reason (irrelevancy of their throughput), the
malicious users do not need to share any information on
their real channel condition before every time slot and
hence synchronizing once at the beginning of the attack
is suffice, as demonstrated in the following description
of the malicious strategy.
Assume a group of malicious users MAL =
{1, 2, .., S } (for simplicity we assume their indices are
1, 2, ..., S ). The basic idea followed by the malicious
users is to take turns, in a round-robin fashion, in trying
to obtain time slots. This means that at TS t, malicious
user number (t mod S) will attempt to obtain the time
slot. Consider a malicious user s: In all times slots that
he tries to obtain he always reports the same channel
rate - which we denote by rhs (h ≥ 2), while in all other
slots he reports other rates which are all lower than rhs .
Each user s chooses his rhs value independently of other
users. This flexibility in choosing channel rates makes
the malicious pattern very hard to detect.
2
0
5
10
15
20
25
30
Number of coordinating users (L) (Total users=30)
Figure 5: Y-axis is the additional throughput (in percents) that a coordinated user (in the same settings as in Figure 4) gains when he takes
part in a coordinated group of size L (X-Axis). Like for time share,
the results show that participating in a coordinated group of 13 users is
the most beneficial, it increases the throughput of each user by 11.6%.
throughput that he gets under normal behavior which
is given in [17]. Unsurprisingly, the throughput benefit
demonstrates similar behavior to (as a function of L) the
time share benefit.
5. System Loss by Malicious Strategy (Discrete
Model)
In the previous section we focused on non-conformist
opportunistic coordinated users whose objective is to increase their own share of the network resources. This
increase was, of course, accompanied by performance
degradation to the regular innocent users. This degradation can be easily computed from our results in Sections
3.5 and 4.5.
Our interest in this section is in malicious users
whose objective is only to damage the other regular
users, disregarding their own performance. So the malicious users are willing to degrade their own performance if it helps degrading that of the innocent users.
Of course – the malicious users can damage the innocent users at least as much as opportunistic coordinated
users can do. So the major question addressed in this
section is whether they can inflict greater damage and
how much.
Our focus in this analysis will be on the discrete
distribution model which, due to its practicality, is of
10
5.2. Analysis of the Malicious Strategy
System Loss, Discrete model
50
Theorem 9. In a network consisting S + N users of
which S are malicious which use the malicious strategy, the time share fraction dedicated to the S malicious
users (jointly) depends only on S and N and equals
Time− share loss of others (%)
(
)N+1
S −1
S
.
1 −
N+1
S
45
(8)
Proof: Consider a malicious user s with chosen maximal channel rate rhs . Since rhs is the highest channel
rate he reports, then q s,hs = 1. Since in all other time
slots - which are S S−1 of the time - he reports rhs −1 or
lower, then we get q s,hs −1 = S S−1 . Therefore, in every
time slot t there will be exactly one malicious user, say
s, with priority value U s ∼ Uni f orm( S S−1 , 1).
Assume there are N regular users in the network.
As stated in [17], the discrete scheduler preserves the
fundamental character of the continuous model Un ∼
Uni f orm(0, 1) for every (regular) user n.
Let Zi be the event where exactly i users get priority
values in the range( S S−1 , 1). Given Zi , the probability
that the malicious user will be the one to get the highest
1
value in this range is i+1
since, given Zi , the priority
values of the malicious user and the regular users are
uniformly distributed in ( S S−1 , 1). Unconditional on Zi
we get that the probability that a time slot is obtained by
a malicious user is given by
N
∑
i=0
P[Zi ] ·
1
.
i+1
35
30
25
20
15
10
5
0
5
10
15
20
25
Number of malicious/coordinated users (L)
Figure 6: Time Slot loss of innocent users: Malicious vs. Coordination strategy. The network’s population is 30 users.
5.3. Evaluation and Discussion
The effect of the malicious strategy is depicted in Figure 6. We consider a system consisting of 30 users in
total and evaluate the (relative, percent-wise) time share
loss experienced by each of the innocent users (compared to what he would get – 1/30 – in a normal system)
as a function of the number of malicious users (x-Axis).
This is done for both the coordinated user strategy (dotted line) and the malicious strategy (solid line). Both
are evaluated for the discrete model. The channel distribution used is the Rayleigh distribution in CDMA2000
as in Figure 4. As one can observe, the loss caused
by malicious users is significantly higher (by approximately a factor of 2) than that inflicted by the coordinated user strategy (for the discrete model). Note that
according to Remark 1 we can use Corollary 4 to get an
estimation for the time share loss of regular users. When
S = N − 1 the time share of the regular users converges
to e−1 instead of 0.5 means the loss of the regular users
converges to 26% which is not far from the loss when
S = N = 15 which equals 25% according to Figure 6.
Note that all the results in our work regarding malicious and coordinated users are independent of the
channel rate distributions of regular users. While the
throughput loss of of a regular user depends on his distribution, the case where some regular user experiences
constant channel rate shows that the throughput loss can
be high as the time share loss.
(9)
Now, P[Zi ] is the probability that exactly N − i users
get priority value less than S S−1 , so according to P[Un <
( )
u] = u we get P[Zi ] = Ni ( S S−1 )N−i ( S1 )i . Thus, the probability that a malicious user wins a TS is
)N−i ( )i
N ( )(
∑
N S −1
1
1
.
·
i
S
S
i+1
i=0
40
Malicious users
Coordinated users
(10)
Noting that Equation 10 is identical to Equation 5
(substitute S for L) we can use the analysis of Lemma 3
to obtain Equation 8.
Remark 1. It is easy to see that the damage inflicted by
this strategy on the innocent users (under the discrete
model) is identical to the damage inflicted by coordinated users strategy under the continuous model.
11
6. Solution Outline
users focused on degrading the system performance. We
showed that for large populations consisting of regular
and coordinated users in equal numbers, the ratio of allocated time slots between a coordinated and a regular
user converges to e − 1 ≈ 1.7. After researches proved
the vulnerability of the Proportional Fairness scheduler,
our work demonstrates the vulnerability of its alternative – the CDF scheduler. We recommend that this vulnerability, together with the solution we outlined should
be taken into consideration by system designers when
choosing and deploying a scheduler for modern wireless networks.
The CDF scheduler is a unique scheduler. Almost
magically, it maintains time share fairness without keeping track of past scheduling decisions. Unfortunately,
while elegant, the CDF scheduler algorithm is too fragile. As we show in this work, the CDF scheduler fails to
maintain fairness in the presence of selfish or malicious
users. Hence, it has to be modified to take past scheduling decisions into account when making scheduling decisions. Such scheduler should record, for every user,
the expected time share he should have got since he
joined the system. For example, if a user has spent so
far 200 time slots in the system with N = 10 users, it
is expected that he should have received 1/N = 10% of
the time slots so far (20 time slots). The proportion between the expected time share so far of user k, denoted
with S ke (t), and the time share a user received in reality so far, denoted with S kr (t), can be used to construct
a weight that will influence his priority value positively
or negatively - depends if the user is below or above his
expected share. A simple example for such a modified
scheduler can be as follows: Every user is assigned with
a priority value as usual. Then, the priority value of
every user k is multiplied with wk (t) = (S ke (t)/S kr (t))α ,
where α > 1 is constant decided by the system designer. It defines the balance between strict fairness
enforcement and the overall throughput of the system.
For example, when α is extremely high, then wk (t) is
very close to zero if the user received more than he deserved S kr (t) > S ke (t). In the same manner, wk (t) is very
high for users who received less than they were expected
(S kr (t) < S ke (t)). Observe that as the number of users in
the system (N) increases, the expected fluctuation range
of S ke (t)/S kr (t) increases. Hence, a further refinement
of such modified scheduler would be to use different
α values for different values of N. That is, replace α
with α(N). Note that the above is a very rough solution
mainly meant to outline a possible solution. In our future work we aim at designing an optimal modified CDF
scheduler which is immune to such attacks while maintaining an overall throughput in the system as close as
possible to the original vulnerable CDF scheduler.
Appendix A. Misreporting of channel rates cannot
benefit a single user
As promised, we provide a formal proof for this claim
under the discrete model. Note that a similar proof can
be constructed under the continuous model. Such proof
will mainly differ in the throughput expressions and will
use rates-ranges where single rates are used in the proof
under the discrete model.
Lemma 4. Let D1 and D2 be the following expressions
D1
=
D2
=
(a − b)X + (b − c)Y N
(a − cN )
a−c
X(aN − bN ) + Y(bN − cN )
where a > b > c ≥ 0 and N ≥ 1 is a natural number.
Then, there exists a constant d > 0 such that D1 − D2 =
d(X − Y).
Lemma 4 can be easily proved using the identity AN −
∑N N−i i−1
A B . The full proof is provided
B = (A − B) i=1
in a technical report [18].
N
Theorem 10. Under the discrete model, a user with no
knowledge of the rates of other users cannot benefit from
reporting fake channel rates.
Proof: Both under the discrete and the continuous
model, the priority values of all users are distributed
uniformly in [0, 1]. Therefore, Theorem 1 is valid also
under the discrete model. In order to complete the proof
of the claim, we now prove that a user also cannot gain
additional throughput by following a misreporting strategy. A user following a false-reports strategy sometimes
report a certain channel rate which is different than his
real channel rate. Let pi, j be the probability that in a random time slot the user reports ri although his real rate is
∑M ∑M
r j . That is, i=1
j=1 pi, j = 1. In order to evaluate the
throughput a user gains when following a false-reports
7. Conclusion
In this paper, based on scheme which targets the very
fundamental principle of the CDF scheduler, we showed
that non-conforming opportunistic users have the motivation to misreport their channel rates and destabilize the scheduler’s notion of fairness. In addition we
studied the loss for regular users inflicted by malicious
12
channel rate distribution) to achieve an expected
throughput T high higher than what he would achieve by
always reporting his real rate. Let strategy S T f ake ∈
min st {DM(st, k)|T st = T high } be a strategy with the minimal deviation among the strategies that achieve throughput T high . We now prove that if S T f ake involves reporting a fake channel condition (DM( f ake, k) > 0),
there exists an alternative strategy S T alt such that 1.
T alt = T high ; 2. DM(S T alt , k) < DM(S T f ake , k). This
contradicts the definition of S T f ake and the assumption
that throughput of T high cannot be achieved by simply
reporting the real channel condition. Let { p̄i, j |i, j ∈
[1, M]} be the reporting probabilities of S T f ake . Since
DM(S T f ake , k) > 0, at least one of the following claims
has to be true: 1. There are i > j such that p̄i, j > 0; 2.
there are i < j such that p̄i, j > 0. We first prove the existence of S T alt , as described above, assuming claim 1.
Let w = mini {∃ j < i. p̄i, j > 0} and let z = min j { p̄w, j > 0}
(observe that j < w). Define an alternative strategy
S T alt as follows: S T alt is identical to S T f ake with only
one difference: At time slots in which S T f ake would instruct the user to report rw instead of rz , S T alt instructs
the user to report rw−1 instead. Note that by its definition, w ≥ 2, hence rw−1 exists. Let { p̃i, j |i, j ∈ [1, M]} be
the reporting probabilities when the user follows S T alt .
Then,
strategy, we first examine the outcome of winning a time
slot with a fake report. When the user wins a time slot
for which he reported to have a channel rate of ri , the
system tries to send him data at the rate he reported. If
ri > r j , it means the real channel condition of the user
can support data transfer only up to r j . We assume, in
favor2 of false-reports strategies, that in such case the
user receives r j of the ri the system sends him. If ri ≤ r j ,
that is, the real channel rate of the user is good enough
for the rate in which the system transmits (ri ). Formally,
the expected rate received by a user if he wins a time slot
for which he reported a channel condition of ri while his
real channel condition is r j is given by hi, j = min{r j , ri }.
Note that since we always discuss the same user k, for
the sake of notational simplicity when we use qi instead
of qk,i until the end of the proof. The probability that a
∑
user reports ri is qi − qi−1 = M
j=1 pi, j . Therefore, given
that the user won a time slot at which he reported ri , the
expected rate he receives is
Hi =
M
∑
hi, j pi, j /(qi − qi−1 ).
(A.1)
j=1
Note that Eq. A.1 is valid only if qi − qi−1 > 0. If
qi − qi−1 = 0 it means that the user never reports rate ri .
Hence, for the sake of completeness, we trivially define
that Hi = 0 in this case. As explained earlier, in discrete
CDF scheduling, when the user reports ri he is assigned
with a random number in [qi−1 , qi ]. In [17] the authors
N
)/N (where N is the total number
proved that (qiN − qi−1
of users in the system) is the probability for a random
slot to be: 1. A slot in which the user reports ri and 2.
a slot at which the user was assigned for transmission.
Therefore, the expected throughput of a user is given by
T=
M
∑
N
Hi (qiN − qi−1
)/N.
i = w, j = z
p̃i, j =
i = w − 1, j = z,
o/w
0
p̄w−1,z + p̄w,z
p̄i, j
(A.3)
Therefore, DM(S T f ake , k) > DM(S T alt , k). What is
left to prove is that T alt ≥ T f ake . Let H̄i (H̃i ) and q̄i (q̃i )
be the expected received rates and the CDF values of
S T f ake (S T alt ), Respectively. In S alt the user sometimes
reports rw−1 instead of rw . Therefore:
(A.2)
i=1
i = w − 1
q̃i =
o/w
Observe that Hi = ri for a user who always report his
real channel condition.
We now define a Deviation Measurement (DM)
which evaluates (for a given strategy and user) how far
from the truth are the reports of the user when he follows the strategy. The measure is given as follows:
∑M ∑M
DM(strategy, user) = i=1
j=1 pi, j |i − j|. Observe that
if the user never fake his reports then DM = 0.
Assume by contradiction there exists some falsereports strategy that allows some user k (with some
q̄w−1 + p̄w,z
q̄w
(A.4)
We now want to prove that T alt − T f ake ≥ 0. From Eq.
A.2 we get that
T alt − T f ake =
M
∑
N
N
[H̃i (q̃iN − q̃i−1
) − H̄i (q̄iN − q̄i−1
)] (A.5)
i=1
Both strategies are similar when it comes to reports
of rates different than rw and rw−1 . Therefore, ∀i ,
w, w − 1.H̃i = H̄i (Formally, that can be concluded from
equations A.1, A.3 and A.4). Considering also Eq. A.4,
2 The user might receive less than r since the transmission moduj
lation might not be the optimal one for his real channel condition.
13
we can contract Eq. A.5 to:
If H̃w = 0 we immediately get that T alt − T f ake ≥ 0.
Otherwise, we use Lemma 4 to prove this claim. This
time, in the context of Lemma 4, we define a = qw ,
b = qw−1 + pw,z , c = qw−1 , X = H̃w and Y = rz . Note that
b > c since pw,z > 0 and a > b since H̃w > 0.
Observe that in the context of Lemma 4 we can write
equation A.9as follows:
T alt − T f ake =
(A.6)
N
N
N
N
H̃w (q̃w − q̃w−1 ) − H̄w (q̄w − q̄w−1 ) +
N
N
N
N
H̃w−1 (q̃w−1
− q̃w−2
) − H̄w−1 (q̄w−1
− q̄w−2
)
Using equations A.3, A.4 and A.1 Eq. A.6 can be
writtenas follows3 :
T alt − T f ake = H̃w (q̄wN − (q̄w−1 + p̄w,z )N )
T alt − T f ake ≥ D2 − D1
H̃w (q̄w − (q̄w−1 + p̄w,z )) + rz p̄w,z N
N
) (A.7)
(q̄w − q̄w−1
q̄w − q̄w−1
H̄w−1 (q̄w−1 − q̄w−2 ) + rz p̄w,z
N
+
((q̄w−1 + p̄w,z )N − q̄w−2
)
q̄w−1 + p̄w,z − q̄w−2
−
N
N
−H̄w−1 (q̄w−1
− q̄w−2
)
Note that since p̄w,z > 0 the denominators in Eq. A.7
must be greater than zero. In addition, note that is it
possible that both or one of H̃w and H̄w−1 is zero. We
now examine Eq. A.7 and prove that:
H̄w−1 (q̄w−1 − q̄w−2 ) + rz p̄w,z
((q̄w−1 + p̄w,z )N − (q̄w−2 )N )
q̄w−1 + p̄w,z − q̄w−2
−H̄w−1 ((q̄w−1 )N − (q̄w−2 )N )
N
(A.8)
N
≥ rz ((q̄w−1 + p̄w,z ) − (q̄w−1 ) )
If H̄w−1 = 0 (and therefore q̄w−1 = q̄w−2 ) then Eq. A.8
is true. If H̄w−1 > 0, then Eq. A.8 is a result of Lemma 4
as follows. Let a = q̄w−1 + p̄w,z , b = q̄w−1 and c = q̄w−2 .
Note that p̄w,z > 0 hence a > b. In addition, b > c
since H̄w−1 > 0. Define X = rz and Y = H̄w−1 . Recall
that rw is the lowest channel rate the user reports (in
S T f ake ) while his real channel rate is lower. Therefore,
when the user reports rw−1 in S T f ake , his real rate has to
be equal or higher than rw−1 . Therefore, ∀ j. p̄w−1, j ,
0 → hw−1, j = rw−1 and we get that Y = H̄w−1 = rw−1 . In
addition, recall that z < w and hence, Y = rw−1 ≥ rz =
X.
Therefore, in the context of Lemma 4 we get that
(aN − cN ) − Y(bN −
D1 ≥ D2 and therefore (a−b)X+(b−c)Y
a−c
N
N
N
c ) ≥ X(a − b ), which is identical to Eq. A.8 if replacing a, b, c, X and Y with the values with which they
were defined.
From equations A.8 and A.7 we get that
T alt − T f ake ≥
[1] H. Holma, A. Toskala, HSDPA/HSUPA for UMTS: High Speed
Radio Access for Mobile Communications, John Wiley & Sons,
2006.
[2] T. I. Association, CDMA2000: High Rate Packet Data Air Interface Specification (TIA-856-A).
[3] V. Vanghi, A. Damnjanovic, B. Vojcic, The CDMA2000 System
for Mobile Communications: 3G Wireless Evolution, Prentice
Hall PTR, Upper Saddle River, NJ, USA, 2004.
[4] R. P. A. Jalali, R. Pankaj, Data Throughput of CDMA-HDR: A
High Efficiency High Data Rate Personal Communication Wireless System, in: Proceedings of the IEEE Vehicular Technology
Conference.
[5] S. Borst, User-Level Performance of Channel-Aware Scheduling Algorithms in Wireless Data Networks, IEEE/ACM Trans.
Netw. 13 (2005) 636–647.
(A.9)
H̃w (qw − (qw−1 + pw,z )) + rz pw,z
((qw )N − (qw−1 )N )
qw − qw−1
+rz ((qw−1 + pw,z )N − (qw−1 )N )
3A
Recall the way z was chosen. In strategy S T f ake , rz is the
lowest possible rate the user experiences if he reports
rw . Therefore, in strategy S T alt , the lowest real rate of
the user when he reports rw cannot be lower than rz+1 .
Therefore, X = H̃w > rz = Y and we get that D2 −D1 > 0
and hence proved that T alt ≥ T f ake .
Recall that we explained that since DM(S T f ake , k) >
0, at least one of the following claims has to be true: 1.
There are i > j such that p̄i, j > 0; 2. there are i < j
such that p̄i, j > 0. We have just proved that if claim 1 is
true then there is a strategy S T alt such that T alt ≥ T f ake
and DM(S T f ake , k) > DM(S T alt , k) which contradicts
the definition of S T f ake . Now all is left to prove is that
if claim 2 is true, there exists strategy S T alt2 such that
T alt2 ≥ T f ake and DM(S T f ake , k) > DM(S T alt2 , k). Let
w′ = maxi {∃ j > i. p̄i, j > 0} and let z′ = max j { p̄w′ , j > 0}
(observe that j > w′ ). Define an alternative strategy
S T alt2 as follows: S T alt2 is identical to S T f ake with only
one difference: At time slots in which S T f ake would
instruct the user to report rw′ instead of rz′ j , S T alt2 instructs the user to report rw′ +1 instead. (Note that by its
definition, w′ ≤ M − 1, hence rw′ +1 exists.). The strategy S T alt2 and the proofs for the above claims are completely symmetrical to S T alt and the proofs of its properties. Hence, due to luck of space we exclude from this
article the complete proof. It can be found in a technical
report [18].
References
H̃w ((qw )N − (qw−1 + pw,z )N )
−
(A.10)
detailed explanation can be found in the technical report [18].
14
[6] D. Park, H. Seo, H. Kwon, B. G. Lee, Wireless Packet Scheduling Based on the Cumulative Distribution Function of User
Transmission Rates, IEEE Transactions on Communications 53
(2005) 1919–1929.
[7] S. Bali, S. Machiraju, H. Zang, V. Frost, A Measurement Study
of Scheduler-Based Attacks in 3G Wireless Networks, in: PAM,
pp. 105–114.
[8] R. Racic, D. Ma, H. Chen, X. Liu, Exploiting Opportunistic
Scheduling in Cellular Data Networks, in: Proceedings of the
15th Annual Network and Distributed System Security Symposium (NDSS 2008), San Diego, CA.
[9] M. Guirguis, A. Bestavros, I. Matta, Exploiting the Transients of
Adaptation for RoQ Attacks on Internet Resources, in: in Proceedings of the 12th IEEE International Conference on Network
Protocols (ICNP04).
[10] M. Guirguis, A. Bestavros, I. Matta, Y. Zhang, Reduction of
Quality (RoQ) Attacks on Internet End-Systems, in: in Proceedings of Infocom05: The IEEE International Conference on
Computer Communication, pp. 1362–1372.
[11] R. Smith, C. Estan, S. Jha, Backtracking Algorithmic Complexity Attacks Against a NIDS, in: ACSAC.
[12] A. Kuzmanovic, E. W. Knightly, Low-Rate TCP-Targeted Denial of Service Attacks (The Shrew VS. the Mice and Elephants), in: ACM SIGCOMM Conference on Applications.
[13] A. Bremler-Barr, H. Levy, N. Halachmi, Aggressiveness Protective Fair Queueing for Bursty Applications, in: IWQoS.
[14] E. Doron, A. Wool, Wda: A Web Farm Distributed Denial of
Service Attack Attenuator, Comput. Netw. 55 (2011) 1037–
1051.
[15] C. Castelluccia, E. Mykletun, G. Tsudik, Improving Secure
Server Performance by Re-balancing SSL/TLS Handshakes, in:
USENIX.
[16] U. Ben-Porat, A. Bremler-Barr, H. Levy, On the Exploitation
of CDF Based Wireless Scheduling, in: INFOCOM, pp. 2821–
2825.
[17] D. Park, B. G. Lee, Qos Support by Using CDF-Based Wireless
Packet Scheduling in Fading Channels, IEEE Transactions on
Communications 54 (2006) 955.
[18] U. Ben-Porat, A. Bremler-Barr, H. Levy, On the Exploitation of CDF Based Wireless Scheduling, 2012.
Http://www.faculty.idc.ac.il/bremler/.
15