On the vulnerability of the proportional fairness scheduler to retransmission attacks.
Udi Ben-PoratAnat Bremler-BarrHanoch LevyBernhard PlattnerPublished in: INFOCOM (2011)
Keyphrases
- buffer overflow
- security risks
- denial of service
- security vulnerabilities
- countermeasures
- dos attacks
- inversely proportional
- scheduling algorithm
- malicious attacks
- denial of service attacks
- game theory
- data transmission
- traffic analysis
- chosen plaintext
- attack graphs
- security threats
- watermarking scheme
- cooperative
- terrorist attacks
- electric vehicles
- resource utilization
- data corruption
- compressed video
- lightweight