skip to main content
10.1145/3212480.3212485acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard

Authors Info & Claims
Published:18 June 2018Publication History

ABSTRACT

In this paper, we consider the fair coexistence between LTE and Wi-Fi systems in unlicensed bands. We focus on the misbehavior opportunities that stem from the heterogeneity of the coexisting systems and the lack of explicit coordination mechanisms. We show that a selfishly behaving LTE can gain an unfair share of the spectrum resources through the manipulation of the parameters defined in the LAA-LTE standard, including the manipulation of the backoff mechanism of LAA, the traffic class, the clear channel assignment threshold and others. We develop a detection mechanism for the Wi-Fi system that can identify a misbehaving LTE system. Our mechanism advances the state of the art by providing an accurate monitoring method of the LTE behavior under various topological scenarios, without explicit cross-system coordination. Deviations from the expected behavior are determined by computing the statistical distance between the protocol-specified and estimated distributions of the LAA-LTE protocol parameters. We analytically characterize the detection and false alarm probabilities and show that our detector yields high detection accuracy at very low false alarm rate, for a wise choice of statistical parameters.

References

  1. FCC, "Second memorandum opinion and order: In the matter of unlicensed operation in the tv broadcast band and additional spectrum for unlicensed devices below 900 mhz in the 3 ghz band," https://apps.fcc.gov/edocs_public/attachmatch/FCC-08-260A1.pdf, 2010.Google ScholarGoogle Scholar
  2. A. B. Flores, R. E. Guerra, E. W. Knightly, P. Ecclesine, and S. Pandey, "Ieee 802.11af: a standard for tv white space spectrum sharing," IEEE Communications Magazine, vol. 51, no. 10, pp. 92--100, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  3. Qualcomm, "Qualcomm whitepaper: Extending lte advanced to unlicensed spectrum," https://www.qualcomm.com/media/documents/files/white-paper-extending-lte-advanced-to-unlicensed-spectrum.pdf, 2013.Google ScholarGoogle Scholar
  4. 3GPP, "Tr 36.889: Feasibility study on licensed-assisted access to unlicensed spectrum," https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2579, 2015.Google ScholarGoogle Scholar
  5. FCC, "Fcc 16-89: Use of spectrum bands above 24 ghz for mobile radio services, et al." https://apps.fcc.gov/edocs_public/attachmatch/FCC-16-89A1_Rcd.pdf, 2016.Google ScholarGoogle Scholar
  6. H. He, H. Shan, A. Huang, L. X. Cai, and T. Quek, "Proportional fairness-based resource allocation for LTE-U, coexisting with Wi-Fi," IEEE Access, 2016.Google ScholarGoogle Scholar
  7. Y. Li, F. Baccelli, J. G. Andrews, T. D. Novlan, and J. C. Zhang, "Modeling and analyzing the coexistence of Wi-Fi and LTE in unlicensed spectrum," arXiv preprint arXiv:1510.01392, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Z. Guan and T. Melodia, "Cu-lte: Spectrally-efficient and fair coexistence between LTE and Wi-Fi in unlicensed bands," Networks, vol. 4, p. 9, 2016.Google ScholarGoogle Scholar
  9. S. Sagari, S. Baysting, D. Saha, I. Seskar, W. Trappe, and D. Raychaudhuri, "Coordinated dynamic spectrum management of LTE-U and Wi-Fi networks," in Proceedings of the Dynamic Spectrum Access Networks Symposium. IEEE, 2015, pp. 209--220.Google ScholarGoogle Scholar
  10. A. Mukherjee, J.-F. Cheng, S. Falahati, L. Falconetti, A. Furuskär, B. Godana, H. Koorapaty, D. Larsson, Y. Yang et al., "System architecture and coexistence evaluation of licensed-assisted access LTE with IEEE 802.11," in Proceedings of the IEEE International Conference on Communication Workshop (ICCW). IEEE, 2015, pp. 2350--2355.Google ScholarGoogle Scholar
  11. J. Xiao and J. Zheng, "An adaptive channel access mechanism for LTE-U and WiFi coexistence in an unlicensed spectrum," in Proceedings of the ICC Conference. IEEE, 2016, pp. 1--6.Google ScholarGoogle Scholar
  12. Q. Chen, G. Yu, and Z. Ding, "Optimizing unlicensed spectrum sharing for LTE-U and WiFi network coexistence," IEEE Journal on Selected Areas in Communications, vol. 34, no. 10, pp. 2562--2574, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. F. Cai, Y. Gao, L. Cheng, L. Sang, and D. Yang, "Spectrum sharing for LTE and WiFi coexistence using decision tree and game theory," in Proceedings of the IEEE Wireless Communications and Networking Conference, 2016, pp. 1--6.Google ScholarGoogle Scholar
  14. S. Zinno, G. Di Stasi, S. Avallone, and G. Ventre, "On a fair coexistence of lte and wi-fi in the unlicensed spectrum: A survey," Computer Communications, 2017.Google ScholarGoogle Scholar
  15. S. Sagari, I. Seskar, and D. Raychaudhuri, "Modeling the coexistence of lte and wifi heterogeneous networks in dense deployment scenarios," in Communication Workshop (ICCW), 2015 IEEE International Conference on. IEEE, 2015, pp. 2301--2306.Google ScholarGoogle Scholar
  16. R. Ratasuk, M. A. Uusitalo, N. Mangalvedhe, A. Sorri, S. Iraji, C. Wijting, and A. Ghosh, "License-exempt lte deployment in heterogeneous network," in Wireless Communication Systems (ISWCS), 2012 International Symposium on. IEEE, 2012, pp. 246--250.Google ScholarGoogle Scholar
  17. Qualcomm, "Lte in unlicensed spectrum: Harmonious coexistence with wi-fi," 2014.Google ScholarGoogle Scholar
  18. 3GPP TS 36.213 version 14.2.0 Release 14, "Lte; evolved universal terrestrial radio access (e-utra); physical layer procedures," 2013.Google ScholarGoogle Scholar
  19. S. Choi and S. Park, "Co-existence analysis of duty cycle method with wi-fi in unlicensed bands," in Information and Communication Technology Convergence (ICTC), 2015 International Conference on. IEEE, 2015, pp. 894--897.Google ScholarGoogle Scholar
  20. C. Cano and D. J. Leith, "Coexistence of wifi and lte in unlicensed bands: A proportional fair allocation scheme," in Communication Workshop (ICCW), 2015 IEEE International Conference on. IEEE, 2015, pp. 2288--2293.Google ScholarGoogle Scholar
  21. J. Jeon, H. Niu, Q. Li, A. Papathanassiou, and G. Wu, "Lte with listen-before-talk in unlicensed spectrum," in Communication Workshop (ICCW), 2015 IEEE International Conference on. IEEE, 2015, pp. 2320--2324.Google ScholarGoogle Scholar
  22. T. Tao, F. Han, and Y. Liu, "Enhanced lbt algorithm for lte-laa in unlicensed band," in Personal, Indoor, and Mobile Radio Communications (PIMRC), 2015 IEEE 26th Annual International Symposium on. IEEE, 2015, pp. 1907--1911.Google ScholarGoogle Scholar
  23. R. Yin, G. Yu, A. Maaref, and G. Y. Li, "Lbt-based adaptive channel access for lte-u systems," IEEE Transactions on Wireless Communications, vol. 15, no. 10, pp. 6585--6597, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. X. Ying, R. Poovendran, and S. Roy, "Detecting lte-u duty cycling misbehavior for fair sharing with wi-fi in shared bands," arXiv preprint arXiv:1710.01705, 2017.Google ScholarGoogle Scholar
  25. P. Kyasanur and N. H. Vaidya, "Selfish mac layer misbehavior in wireless networks," IEEE transactions on mobile computing, vol. 4, no. 5, pp. 502--516, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. G. Fragkiadakis, E. Z. Tragos, and I. G. Askoxylakis, "A survey on security threats and detection techniques in cognitive radio networks," IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 428--445, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  27. J. Tang, Y. Cheng, and W. Zhuang, "Real-time misbehavior detection in ieee 802.11-based wireless networks: An analytical approach," IEEE Transactions on Mobile Computing, vol. 13, no. 1, pp. 146--158, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Li, S. Salinas, P. Li, J. Sun, and X. Huang, "Mac-layer selfish misbehavior in ieee 802.11 ad hoc networks: Detection and defense," IEEE Transactions on Mobile Computing, vol. 14, no. 6, pp. 1203--1217, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  29. Y. Zhang and L. Lazos, "Vulnerabilities of cognitive radio MAC protocols and countermeasures," IEEE Network, vol. 27, no. 3, pp. 40--45, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  30. J. Lin, "Divergence measures based on the shannon entropy," IEEE Transactions on Information theory, vol. 37, no. 1, pp. 145--151, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. M. Hirzallah, W. Afifi, and M. Krunz, "Full-duplex spectrum sensing and fairness mechanisms for wi-fi/lte-u coexistence," in Global Communications Conference (GLOBECOM), 2016 IEEE. IEEE, 2016, pp. 1--6.Google ScholarGoogle Scholar
  32. A. L. Toledo and X. Wang, "Robust detection of selfish misbehavior in wireless networks," IEEE journal on selected areas in communications, vol. 25, no. 6, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Y. Zhang and L. Lazos, "Countering selfish misbehavior in multi-channel mac protocols," in INFOCOM, 2013 Proceedings IEEE. IEEE, 2013, pp. 2787--2795.Google ScholarGoogle ScholarCross RefCross Ref
  34. S. Gollakota and D. Katabi, Zigzag decoding: combating hidden terminals in wireless networks. ACM, 2008, vol. 38, no. 4. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. LTE Misbehavior Detection in Wi-Fi/LTE Coexistence Under the LAA-LTE Standard

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WiSec '18: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks
        June 2018
        317 pages
        ISBN:9781450357319
        DOI:10.1145/3212480

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 June 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate98of338submissions,29%

        Upcoming Conference

        WiSec '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader