Proceedings of the 14th Workshop on Mobile Computing Systems and Applications 2013
DOI: 10.1145/2444776.2444779
|View full text |Cite
|
Sign up to set email alerts
|

Towards accurate accounting of cellular data for TCP retransmission

Abstract: The current architecture supporting data services to mobile devices is built below the network layer (IP) and users receive the payload at the application layer. Between them is the transport layer that can cause data consumption inflation due to the retransmission mechanism that provides reliable delivery. In this paper, we examine the accounting policies of five large cellular ISPs in the U.S. and South Korea. We look at their policies regarding the transport layer reliability mechanism with TCP's retransmis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
15
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 13 publications
1
15
0
Order By: Relevance
“…Go et al highlighted that flawed accounting policies in the cellular ISP's in USA and South Korea can result in subscribers being wrongly charged for retransmitted TCP packets [5], and this vulnerability in the ISP's accounting mechanism can be exploited by adversaries to inflate the subscriber's bill by sending unnecessary retransmissions. Similarly, Kang et al discussed how an attacker with a cellular device can spoof the IP address of another subscriber in the same local network and send request packets to Internet servers [9].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Go et al highlighted that flawed accounting policies in the cellular ISP's in USA and South Korea can result in subscribers being wrongly charged for retransmitted TCP packets [5], and this vulnerability in the ISP's accounting mechanism can be exploited by adversaries to inflate the subscriber's bill by sending unnecessary retransmissions. Similarly, Kang et al discussed how an attacker with a cellular device can spoof the IP address of another subscriber in the same local network and send request packets to Internet servers [9].…”
Section: Related Workmentioning
confidence: 99%
“…They will be counted towards the subscriber's data quota. Go et al briefly mentioned the possibility of such an attack when they examined how subscribers can be overcharged by TCP retransmissions [5]. Because of the billing structure of mobile ISPs, an attacker can simply flood the victim with random packets at a very high rate, and the victim will have to pay for all the packets, even if they do not eventually reach the victim's device.…”
Section: Quota Drainmentioning
confidence: 99%
See 1 more Smart Citation
“…WiFi networks may have data loss rate up to 4-5 % in dynamically moving environment. Mobile data networks has less data loss rates, but still high enough to introduce decrease of live video stream QoS [8], [9].…”
Section: A Experimental Setupmentioning
confidence: 99%
“…To prevent unauthorized access, cellular operators also deploy firewalls and network address translators (NATs) to shield mobile devices from the traffic types of no interest. While recent studies [21,22,27,28,36] have reported various cases on accounting volume inaccuracy, the two aspects of authentication and authorization still look bullet-proof. They seem almost impossible to go wrong.…”
Section: [Authorization]mentioning
confidence: 99%