Skip to main content
eScholarship
Open Access Publications from the University of California

UCLA

UCLA Electronic Theses and Dissertations bannerUCLA

Cellular Network for Mobile Devices and Applications: Infrastructure Limitations and Solutions

Abstract

In recent years, we have seen tremendous growth of mobile devices and applications. The global shipments for smartphones and tablets reached 722M, and 128M, respectively, in 2012. They are predicted to reach 1.52B and 352M by 2017. In the meantime, mobile application downloads in Apple Store and Google Play have already exceeded 50B and 25B, respectively. In order to support such mobile data devices and applications, 3G/4G cellular network infrastructures play a critical role. Indeed, the mobile data traffic carried by the cellular networks are estimated to grow seven times within the next four years, from 1.6 Terabyte (TB) in 2013 to 11.2TB in 2017.

In this dissertation, we study how to improve the 3G/4G network infrastructure to better support mobile devices and applications. Specifically, we focus on two topics: one is how to reduce the operational cost by improving energy efficiency of cellular network infrastructure, and the other is to reexamine the architecture and policy practice on data accounting in 3G/4G infrastructures from both robustness and security perspectives. Both topics complement each other, covering two parts of cellular network infrastructures -- radio access network (i.e., base stations) and core network. Given each topic, our methodology is as follows. We identify key problems, use real measurements and traces collected from the operational networks or the mobile devices (if needed) to quantify the impact of the identified issues, analyze their root causes, propose corresponding solutions, and evaluate their effectiveness. Finally, we share the gained insights and learned lessons.

The first topic seeks to design a green network infrastructure for 3G networks within the 3G standards framework. Our work is motivated by the fact that the 3G cellular infrastructure, particularly the base station (BS) networks, consumes about 80% of overall energy in today's operational networks. Such base station networks incur large energy waste in that their energy consumption is not in proportion to their carried traffic loads. Our study further shows two root causes. On one hand, the traffic volume is not constant over time; In fact, it exhibits high fluctuations both in time and over space. On the other hand, each base station consumes a large portion of energy even at zero traffic, due to its supporting system (e.g., cooling) and idle communication overhead.

In this work, we propose GreenBSN, a traffic-driven design to green BS infrastructure. We profile BS traffic, and approximate network-wide energy proportionality using non-load-adaptive BSes. The instrument is to leverage the inherent temporal-spatial traffic dynamics and node deployment heterogeneity, and power off under-utilized BSes under light traffic. We further show that, our solution can be implemented within the current 3G standards. Our evaluation on four regional 3G networks shows that our standard-compliant, practical solution yields up to 53% energy savings in dense large cities and 23% in sparsely deployed regions. The key insight is that, traffic dynamics is pervasive both in time and over space in operational 3G/4G networks, and such diversity opens a new venue for energy savings in large-scale cellular networks.

In the second topic, we examine the data accounting architecture and practice, which has migrated its design from the circuit-switched voice service to the packet-switched data. Our work is driven by the fact that, data-plan subscribers are charged based on the used traffic volume in 3G/4G cellular networks. Though this usage-based charging system seems to receive general success in operation, no effort has been used to investigate it from the user perspective. Therefore, we conduct experiments to critically assess both this usage-based accounting architecture and application-specific charging policies by operators. Our evaluation compares the network-recorded volume with the delivered traffic at the end device. We have found that, both generally work in common scenarios but may go wrong in the extreme cases: We are charged for what we never get, and we can get what we want for free. In one extreme case, we are charged for at least three hours and 450MB or more data despite receiving no single bit. In another extreme case, we are able to transfer 200MB or any amount we specify for free. The direct root causes lie in lack of both coordination between the charging system and the end device, and prudent policy enforcement by certain operators. The more fundamental problem is that, solutions (e.g., data accounting) that work for circuit-switched, telecom networks may not be directly applicable to the packet-switched IP-based networks. The open-loop data accounting fails to record consistent data volume along the packet-switched path, thus it suffers from various problems in certain worst-case scenarios. We propose remedies that mitigate the negative impacts.

We further study the data accounting problem from the security perspective. We have identified loopholes in both the metered accounting architecture and application-specific charging policies, and discovered two effective attacks exploiting the loopholes. The ``toll-free-data-access-attack'' enables the attacker to access any data service for free. The ``stealth-spam-attack'' incurs any large traffic volume to the victim, while the victim may not be even aware of such spam traffic. We also show that, current security mechanisms in cellular networks, such as hardware-based authentication and authorization, and firewalls, cannot defend from such attacks. Our experiments mainly on two operational 3G networks have confirmed the feasibility and simplicity of such attacks. We further propose defense remedies. The main learned lessons are (1) the telecom-based solutions may be inappropriate for mobile data since the virtual circuit does not exist any more. Core network operations should adapt to the underlying PS technology; (2) IP data forwarding uses a push model, causing the data delivery to the mobile victim without its prior consent; Current cellular networks are unable to verify the authenticity of the malicious sender at the network layer.

Main Content
For improved accessibility of PDF content, download the file to your device.
Current View