3G and 3.5G wireless network performance measured from moving cars and high-speed trains
Proceedings of the 1st ACM workshop on Mobile internet through cellular networks
Measurement analysis of mobile data networks
PAM'07 Proceedings of the 8th international conference on Passive and active network measurement
A first look at mobile hand-held device traffic
PAM'10 Proceedings of the 11th international conference on Passive and active measurement
A comparative study of handheld and non-handheld traffic in campus Wi-Fi networks
PAM'11 Proceedings of the 12th international conference on Passive and active measurement
Over the top video: the gorilla in cellular networks
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Web caching on smartphones: ideal vs. reality
Proceedings of the 10th international conference on Mobile systems, applications, and services
Can we pay for what we get in 3G data access?
Proceedings of the 18th annual international conference on Mobile computing and networking
Mobile data charging: new attacks and countermeasures
Proceedings of the 2012 ACM conference on Computer and communications security
The 14th international workshop on mobile computing systems and applications (ACM HotMobile 2013)
ACM SIGMOBILE Mobile Computing and Communications Review
Unveiling the hidden dangers of public IP addresses in 4G/LTE cellular data networks
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications
Hi-index | 0.00 |
The current architecture supporting data services to mobile devices is built below the network layer (IP) and users receive the payload at the application layer. Between them is the transport layer that can cause data consumption inflation due to the retransmission mechanism that provides reliable delivery. In this paper, we examine the accounting policies of five large cellular ISPs in the U.S. and South Korea. We look at their policies regarding the transport layer reliability mechanism with TCP's retransmission and show that the current implementation of accounting policies either fails to meet the billing fairness or is vulnerable to charge evasions. Three of the ISPs surveyed charge for all IP packets regardless of retransmission, allowing attackers to inflate a victim's bill by intentionally retransmitting packets. The other two ISPs deduct the retransmitted amount from the user's bill thus allowing tunneling through TCP retransmissions. We show that a "free-riding" attack is viable with these ISPs and discuss some of the mitigation techniques.