Energy Efficiency and Privacy Protection in Cellular Networks
2014
Abstract
and Computer Engineering Smartphones have become an essential part of our society. The benefits of having an always present, highly capable device cannot be overstated. As more aspects of our life depend on our smartphones, it is more important than ever to ensure the availability of those devices. However, their big advantages also come with big risks. The fact that we have our smartphones with us all the time means that it is easier than ever to collect our information, sometimes without our consent. In this dissertation, we study the two pressing concerns in cellular communications: energy efficiency and privacy protection. We focus on LTE networks, the current most advanced global standard for cellular communications. In the first part of the dissertation, we study the energy efficiency problem from both device and network perspectives. From the device point of view, we introduce a new angle to address the battery life concern. We recognize that the value of battery for the users is not always the same, and that it depends on the user usage. We also identify, and show in real network, diversity of usage, the phenomenon that at any instant, there is a diverse distribution of smartphone usage among cellular users. We propose "Battery Deposit Service" (BDS), a cooperative system which makes use of device-to-device (D2D) communications underlaying cellular networks to provide energy sharing in the form of load sharing. We design BDS to take advantage of diversity of usage to maximize the utility of smartphone battery. We show that our system increases battery life of cellular users, at almost no cost to the rest of the network. BDS is designed to be compatible to LTE architecture. From the network point of view, we design an energy efficient D2D relay system underlaying LTE networks. We minimize transmission power of smartphones by considering relay selection, resource allocation and power control. The overall problem is prohibited due to its exponential search space. We develop a divideand-conquer strategy which splits the overall problem into small sub-problems. We relate these sub-problems to well-studied graph theoretic problems, and take advantage of existing fast algorithms. We show that our algorithms meet the runtime requirement of real-time LTE operations. In the second part of the dissertation, we address a privacy concern in LTE networks. In particular, we show that user location can be leaked in current LTE paging architecture. We propose a mechanism based on signal processing to remedy this vulnerability. Our method makes use of physical layer identification, which are low-power tags embedded on the wireless waveform, to signal paging messages to user devices. We show that our method is stealthy and robust, and that it mitigates the aforementioned privacy issue.
References (61)
- cpl, ] IBM CPLEX Optimizer. www.ibm.com/software/commerce/ optimization/cplex-optimizer/.
- lem, ] Library for Efficient Modeling and Optimization in Networks. http:// lemon.cs.elte.hu/trac/lemon.
- 3GPP, 1998] 3GPP (1998). Selection procedures for the choice of radio transmission technologies of the UMTS.
- 3GPP, 2010] 3GPP (2010). Evolved Universal Terrestrial Radio Access (E-UTRA); Further advancements for E-UTRA physical layer aspects (v9.0.0).
- 3GPP, 2011a] 3GPP (2011a). Evolved Universal Terrestrial Radio Access (E- UTRA);
- Medium Access Control (MAC) protocol specification (version 10.4.0).
- 3GPP, 2011b] 3GPP (2011b). Evolved Universal Terrestrial Radio Access (E- UTRA); Physical channels and modulation (version 10.4.0).
- 3GPP, 2011c] 3GPP (2011c). Evolved Universal Terrestrial Radio Access (E- UTRA); Physical layer procedures (version 10.4.0).
- 3GPP, 2011d] 3GPP (2011d). Evolved Universal Terrestrial Radio Access (E- UTRA);
- Radio Resource Control (RRC); Protocol specification (v10.4.0).
- 3GPP, 2012] 3GPP (2012). LTE Radio Access Network (RAN) enhancements for diverse data applications.
- 3GPP, 2013] 3GPP (2013). Technical Specification Group Services and System Aspects; Feasibility study for Proximity Services (ProSe) (version 12.1.0).
- 3GPP, 2014a] 3GPP (2014a). Draft Report of 3GPP TSG RAN WG1 #78 v0.2.0. [3GPP, 2014b] 3GPP (2014b). R1-143442, WF on T-RPT Patterns for SA and Data. [3GPP, 2014c] 3GPP (2014c). Study on LTE Device to Device Proximity Services; Radio Aspects (v12.0.1).
- Ananthanarayanan et al., 2007] Ananthanarayanan, G., Padmanabhan, V. N., Ravindranath, L., and Thekkath, C. A. (2007). Combine: leveraging the power of wireless peers through collaborative downloading. In Proceedings of the 5th inter- national conference on Mobile systems, applications and services, pages 286-298. ACM. [Anderegg and Eidenbenz, 2003] Anderegg, L. and Eidenbenz, S. (2003). Ad hoc- vcg: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of the 9th annual international conference on Mobile computing and networking, MobiCom '03, pages 245-259, New York, NY, USA. ACM. [Arthur, 2011] Arthur, C. (2011). How the smartphone is killing the PC. http: //www.guardian.co.uk/technology/2011/jun/05/smartphones-killing-pc.
- Badic et al., 2009] Badic, B., O'Farrrell, T., Loskot, P., and He, J. (2009). Energy efficient radio access architectures for green radio: Large versus small cell size deployment. In Vehicular Technology Conference Fall (VTC 2009-Fall), 2009 IEEE 70th, pages 1-5.
- Baker, 2011] Baker, M. (2011). Uplink Transmission Procedures, chapter 18, pages 449-462. John Wiley & Sons, Ltd.
- Baker and Moulsley, 2011] Baker, M. and Moulsley, T. (2011). Downlink Physical Data and Control Channels, chapter 9, pages 189-214. John Wiley & Sons, Ltd. [Berl et al., 2010] Berl, A., Gelenbe, E., di Girolamo, M., Giuliani, G., de Meer, H., Dang, M. Q., and Pentikousis, K. (2010). Energy-Efficient Cloud Computing. The Computer Journal, 53:1045-1051.
- Bonta et al., 2007] Bonta, J., Calcev, G., Fonseca, B., Mangalvedhe, N., and Smith, N. (2007). Ad Hoc Relay Mode for Mobile Coverage Extension and Peer- to-Peer Communications.
- Bremaud, 1999] Bremaud, P. (1999). Markov Chains, Gibbs Fields, Monte Carlo Simulations, and Queues. Springer.
- Brenner and Smith, 2013] Brenner, J. and Smith, A. (2013). 72% of online adults are social networking site users. Pew Research Center, Washington, D.C. Ac- cessed: July 14, 2014.
- Burke et al., 2006] Burke, J. A., Estrin, D., Hansen, M., Parker, A., Ramanathan, N., Reddy, S., and Srivastava, M. B. (2006). Participatory sensing. Center for Embedded Network Sensing.
- Buttyan and Hubaux, 2001] Buttyan, L. and Hubaux, J.-P. (2001). Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical report.
- Chang et al., 2003] Chang, R.-S., Chen, W.-Y., and Wen, Y.-F. (2003). Hy- brid wireless network protocols. IEEE Transactions on Vehicular Technology, 52(4):1099 -1109.
- Chen and Chan, 2010] Chen, B. B. and Chan, M. C. (2010). Mobicent: a credit- based incentive system for disruption tolerant network. In INFOCOM, 2010 Pro- ceedings IEEE, pages 1 -9.
- Chon et al., 2013] Chon, Y., Ryu, W., and Cha, H. (2013). Predicting smartphone battery usage using cell tower id monitoring. Pervasive and Mobile Computing, (0):-.
- Cisco, 2014] Cisco (2014). Global Mobile Data Traffic Forecast Update, 2013-2018. [Duan et al., 2012] Duan, L., Kubo, T., Sugiyama, K., Huang, J., Hasegawa, T., and Walrand, J. (2012). Incentive mechanisms for smartphone collaboration in data acquisition and distributed computing. In INFOCOM, 2012 Proceedings IEEE, pages 1701 -1709.
- Edfors et al., 1998] Edfors, O., Sandell, M., van de Beek, J.-J., Wilson, S., and Borjesson, P. (1998). OFDM channel estimation by singular value decomposition. IEEE Trans. on Communications, 46(7):931 -939.
- Elkotby et al., 2012] Elkotby, H., Elsayed, K., and Ismail, M. (2012). Exploiting interference alignment for sum rate enhancement in d2d-enabled cellular networks. In Proceedings of IEEE WCNC 2012.
- F-Secure, 2011] F-Secure (2011). 440,783 "Silent SMS" Used to Track German Sus- pects in 2010. http://www.f-secure.com/weblog/archives/00002294.html. [Falaki et al., 2010] Falaki, H., Mahajan, R., Kandula, S., Lymberopoulos, D., Govindan, R., and Estrin, D. (2010). Diversity in smartphone usage. In Pro- ceedings of the 8th international conference on Mobile systems, applications, and services, MobiSys '10, pages 179-194, New York, NY, USA. ACM. [Garnica et al., 2013] Garnica, J., Chinga, R., and Lin, J. (2013). Wireless power transmission: From far field to near field. Proceedings of the IEEE, 101(6):1321- 1331.
- Gelenbe, 2012] Gelenbe, E. (2012). Energy packet networks: Adaptive energy man- agement for the cloud. In Proceedings of the 2Nd International Workshop on Cloud Computing Platforms, CloudCP '12, pages 1:1-1:5, New York, NY, USA. ACM. [Janis et al., 2009] Janis, P., Yu, C.-H., Doppler, K., Ribeiro, C., Wijting, C., and Hugl, K. (2009). Device-to-device communication underlaying cellular communi- cations systems. International Journal of Communications, Network and System Sciences.
- Jeronimo, 2014] Jeronimo, F. (2014). Top 10 Smartphone Purchase Drivers. https://twitter.com/fjeronimo/status/465896917298577409.
- Jiang et al., 2013] Jiang, Y., Jaiantilal, A., Pan, X., Al-Mutawa, M. A., Mishra, S., and Shi, L. (2013). Personalized energy consumption modeling on smartphones. In Mobile Computing, Applications, and Services, pages 343-354. Springer. [Kansal et al., 2007] Kansal, A., Hsu, J., Zahedi, S., and Srivastava, M. B. (2007). Power management in energy harvesting sensor networks. ACM Transactions on Embedded Computing Systems, 6(4).
- Király and Kovács, 2012] Király, Z. and Kovács, P. (2012). Efficient implementa- tions of minimum-cost flow algorithms. CoRR, abs/1207.6381. [Kone et al., 2010] Kone, V., Yang, L., Yang, X., Zhao, B. Y., and Zheng, H. (2010). On the feasibility of effective opportunistic spectrum access. In Proceedings of the 10th annual conference on Internet measurement, IMC '10, pages 151-164, New York, NY, USA. ACM.
- Kuhn, 1955] Kuhn, H. W. (1955). The Hungarian method for the assignment prob- lem. Naval Research Logistics, 2:83-97.
- Kune et al., 2012] Kune, D. F., Koelndorfer, J., Hopper, N., and Kim, Y. (2012). Location leaks over the GSM air interface. In Proc. 19th Annual Network and Distributed System Security Symposium.
- Kyosti et al., 2007] Kyosti, P., Meinila, J., Jamsa, T., Zhao, X., Hentila, L., Yli- talo, J., and Alatossava, M. (2007). WINNER II Channel Models. [Laurila et al., 2012] Laurila, J. K., Gatica-Perez, D., Aad, I., Bornet, O., Do, T.- M.-T., Dousse, O., Eberle, J., Miettinen, M., et al. (2012). The mobile data challenge: Big data for mobile computing research. In Pervasive Computing, number EPFL-CONF-192489.
- Lopez-Perez et al., 2014] Lopez-Perez, D., Chu, X., Vasilakos, A., and Claussen, H. (2014). Power minimization based resource allocation for interference mitigation in ofdma femtocell networks. IEEE Journal on Selected Areas in Communications, 32(2):333-344.
- Meshkati et al., 2009] Meshkati, F., Poor, H., Schwartz, S., and Balan, R. (2009). Energy-efficient resource allocation in wireless networks with quality-of-service constraints. IEEE Transactions on Communications, 57(11):3406-3414.
- Miao et al., 2010] Miao, G., Himayat, N., and Li, G. (2010). Energy-efficient link adaptation in frequency-selective channels. IEEE Transactions on Communica- tions, 58(2):545-554.
- Michael et al., 2000] Michael, L., Kikuchi, S., Adachi, T., and Nakagawa, M. (2000). Combined cellular/direct method of inter-vehicle communication. In Proceedings of the IEEE Intelligent Vehicles Symposium, pages 534 -539.
- Morstatter et al., 2013] Morstatter, F., Pfeffer, J., Liu, H., and Carley, K. M. (2013). Is the sample good enough? comparing data from twitter's streaming api with twitter's firehose. In ICWSM.
- Nakamoto, 2009] Nakamoto, S. (2009). Bitcoin: A Peer-to-Peer Electronic Cash System.
- Ng and Yu, 2007] Ng, T. and Yu, W. (2007). Joint optimization of relay strate- gies and resource allocations in cooperative cellular networks. IEEE Journal on Selected Areas in Communications, 25(2):328-339.
- Nisan et al., 2007] Nisan, N., Roughgarden, T., Tardos, E., and Vazirani, V. V. (2007). Algorithmic Game Theory. Cambridge University Press, New York, NY, USA. [NIST, 2014] NIST (2014). Incomplete beta functions. http://dlmf.nist.gov/8. 17. [Nohl and Munaut, 2010] Nohl, K. and Munaut, S. (2010). GSM Sniff- ing. http://events.ccc.de/congress/2010/Fahrplan/attachments/1783_ 101228.27C3.GSM-Sniffing.Nohl_Munaut.pdf.
- Nokia Corporation, 2012] Nokia Corporation (2012). Further results on network signalling load and UE power consumption (R2-120367).
- Oliver and Keshav, 2011] Oliver, E. A. and Keshav, S. (2011). An empirical ap- proach to smartphone energy level prediction. In Proceedings of the 13th inter- national conference on Ubiquitous computing, UbiComp '11, pages 345-354, New York, NY, USA. ACM.
- Osmocombb, ] Osmocombb. Open source GSM baseband software implementation. http://bb.osmocom.org/trac/. Accessed: August 3, 2014.
- PRC, 2014] PRC (2014). Cell phone and smartphone ownership demographics. Pew Research Center, Washington, D.C. Accessed: July 14, 2014. [Raghothaman et al., 2013] Raghothaman, B., Deng, E., Pragada, R., Sternberg, G., Deng, T., and Vanganuru, K. (2013). Architecture and protocols for LTE- based device to device communication. In 2013 International Conference on Com- puting, Networking and Communications (ICNC), pages 895-899.
- Rahmati et al., 2007] Rahmati, A., Qian, A., and Zhong, L. (2007). Understand- ing human-battery interaction on mobile phones. In Proceedings of the 9th in- ternational conference on Human computer interaction with mobile devices and services, pages 265-272. ACM.
- Renesas Mobile Europe Ltd., 2012] Renesas Mobile Europe Ltd. (2012). Impact of DRX to always-on background traffic (R2-120578).
- Sadek et al., 2006] Sadek, A. K., Han, Z., and Liu, K. R. (2006). An efficient coop- eration protocol to extend coverage area in cellular networks. In Wireless Com- munications and Networking Conference, 2006. WCNC 2006. IEEE, volume 3, pages 1687-1692. IEEE.
- Soyez, 2012] Soyez, F. (2012). Getting the message? Police track phones with silent SMS. http://owni.eu/2012/01/27/ silent-sms-germany-france-surveillance-deveryware/.
- Ta, T. Battery deposit service simulator. https://github.com/tuan-ta/ bds. [Ta and Baras, 2012] Ta, T. and Baras, J. S. (2012). Enhancing Privacy in LTE Paging System using Physical Layer Identification. In Proc. 7th International Workshop on Data Privacy Management.
- Ta et al., 2014] Ta, T., Baras, J. S., and Zhu, C. (2014). Improving Smartphone Battery Life Utilizing Device-to-device Cooperative Relays Underlaying LTE Net- works. In IEEE International Conference on Communications. [Tesseract, ] Tesseract. Tesseract OCR. https://code.google.com/p/ tesseract-ocr/. Accessed: July 14, 2014.
- Tweepy, ] Tweepy. Tweepy. http://www.tweepy.org/. Accessed: July 14, 2014. [Twitter, ] Twitter. Twitter Streaming API. https://dev.twitter.com/docs/ api/streaming. Accessed: July 14, 2014.
- Wei et al., 2006] Wei, K., Smith, A., Chen, Y.-F., and Vo, B. (2006). Whopay: A scalable and anonymous payment system for peer-to-peer environments. In Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on, pages 13-13.
- Xu and van der Schaar, 2013] Xu, J. and van der Schaar, M. (2013). Token system design for autonomic wireless relay networks. IEEE Transactions on Communi- cations, 61(7):2924-2935.
- Yang et al., 2013] Yang, M. J., Lim, S. Y., Park, H. J., and Park, N. H. (2013). Solving the data overload: Device-to-device bearer control architecture for cellular data offloading. IEEE Vehicular Technology Magazine, 8(1):31-39.
- Yu et al., 2011] Yu, C.-H., Doppler, K., Ribeiro, C., and Tirkkonen, O. (2011). Resource sharing optimization for device-to-device communication underlaying cellular networks. IEEE Transactions on Wireless Communications, 10(8):2752 -2763.
- Yu et al., 2008a] Yu, P., Baras, J., and Sadler, B. (2008a). Multicarrier authenti- cation at the physical layer. In International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2008. WoWMoM 2008., pages 1 -6.
- Yu et al., 2008b] Yu, P., Baras, J., and Sadler, B. (2008b). Physical-layer authen- tication. IEEE Transactions on Information Forensics and Security, 3(1):38-51.