Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message...

109
Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David R. Cheriton School of Computer Science University of Waterloo September 15, 2008 Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Transcript of Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message...

Page 1: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

Outline

Exploiting the Short Message Service as a ControlChannel in Challenged Network Environments

Earl Oliver

David R. Cheriton School of Computer ScienceUniversity of Waterloo

September 15, 2008

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 2: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

Outline

Outline

1 IntroductionMotivationObjectives

2 Understanding SMSCharacteristicsTestbedAnalysis

3 DesignProtocolArchitectureImplementation

4 Conclusions

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 3: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

Outline

Outline

1 IntroductionMotivationObjectives

2 Understanding SMSCharacteristicsTestbedAnalysis

3 DesignProtocolArchitectureImplementation

4 Conclusions

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 4: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

Outline

Outline

1 IntroductionMotivationObjectives

2 Understanding SMSCharacteristicsTestbedAnalysis

3 DesignProtocolArchitectureImplementation

4 Conclusions

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 5: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

Outline

Outline

1 IntroductionMotivationObjectives

2 Understanding SMSCharacteristicsTestbedAnalysis

3 DesignProtocolArchitectureImplementation

4 Conclusions

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 6: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

Take home points

Cellular network is highly erratic under bursty workloads.

Characterized properties of the SMS network using burstyworkloads using a variety of commondity hardware.

Designed and built a robust data channel on top of SMS.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 7: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

Take home points

Cellular network is highly erratic under bursty workloads.

Characterized properties of the SMS network using burstyworkloads using a variety of commondity hardware.

Designed and built a robust data channel on top of SMS.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 8: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

Take home points

Cellular network is highly erratic under bursty workloads.

Characterized properties of the SMS network using burstyworkloads using a variety of commondity hardware.

Designed and built a robust data channel on top of SMS.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 9: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Motivation

Growth of SMS

Cellular networks are ubiquitous.

Over 1 trillion SMS message sent in 2005.

Projected to be 3.7 trillion SMS messages per year by 2012.

Competition between carriers, growth of MMS, and dataservices are driving down prices∗.

(India) smsjunction.com : Rs. 0.09 ($0.002 USD) / message(India) znisms.com : Rs. 0.28 ($0.006 USD) / message(US) AT&T : unlimited SMS messages for $5 USD / month

* Except in Canada: no unlimited plans and charges for incoming messages.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 10: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Applications of SMS

Existing applications

Messaging, e-voting/surveys, Internet search, e-commerce,system monitoring, notifications, etc.

Nearly always constrained to a single SMS message.

Can SMS be used to transport much larger quantities of data?

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 11: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Applications of SMS

Existing applications

Messaging, e-voting/surveys, Internet search, e-commerce,system monitoring, notifications, etc.

Nearly always constrained to a single SMS message.

Can SMS be used to transport much larger quantities of data?

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 12: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Applications of SMS

Existing applications

Messaging, e-voting/surveys, Internet search, e-commerce,system monitoring, notifications, etc.

Nearly always constrained to a single SMS message.

Can SMS be used to transport much larger quantities of data?

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 13: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Existing solutions

Enhanced Message Service (EMS)

Application layer extension to SMS.Device support is poor.

Cellular data services (GPRS/EDGE, EVDO)

Greatly superior as a data service.Often two orders of magnitude cheaper.Sparsely deployed in developing regions.Mobile end-points often not reachable.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 14: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Existing solutions

Enhanced Message Service (EMS)

Application layer extension to SMS.Device support is poor.

Cellular data services (GPRS/EDGE, EVDO)

Greatly superior as a data service.Often two orders of magnitude cheaper.Sparsely deployed in developing regions.Mobile end-points often not reachable.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 15: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Existing solutions

Enhanced Message Service (EMS)

Application layer extension to SMS.Device support is poor.

Cellular data services (GPRS/EDGE, EVDO)

Greatly superior as a data service.Often two orders of magnitude cheaper.Sparsely deployed in developing regions.Mobile end-points often not reachable.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 16: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Existing solutions

Enhanced Message Service (EMS)

Application layer extension to SMS.Device support is poor.

Cellular data services (GPRS/EDGE, EVDO)

Greatly superior as a data service.Often two orders of magnitude cheaper.Sparsely deployed in developing regions.Mobile end-points often not reachable.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 17: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Existing solutions

Enhanced Message Service (EMS)

Application layer extension to SMS.Device support is poor.

Cellular data services (GPRS/EDGE, EVDO)

Greatly superior as a data service.Often two orders of magnitude cheaper.Sparsely deployed in developing regions.Mobile end-points often not reachable.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 18: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Claim: there are many practical applications for SMS.

Such as:

Exchanging cryptographic keys.

DTN routing table updates.

Synchronous user creation at rural kiosks.

And many more ...

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 19: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Claim: there are many practical applications for SMS.

Such as:

Exchanging cryptographic keys.

DTN routing table updates.

Synchronous user creation at rural kiosks.

And many more ...

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 20: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Claim: there are many practical applications for SMS.

Such as:

Exchanging cryptographic keys.

DTN routing table updates.

Synchronous user creation at rural kiosks.

And many more ...

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 21: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Claim: there are many practical applications for SMS.

Such as:

Exchanging cryptographic keys.

DTN routing table updates.

Synchronous user creation at rural kiosks.

And many more ...

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 22: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Claim: there are many practical applications for SMS.

Such as:

Exchanging cryptographic keys.

DTN routing table updates.

Synchronous user creation at rural kiosks.

And many more ...

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 23: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Goal

To build a general purposed data channel on top of SMS.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 24: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Objectives

Fully utilize the capacity of the SMS network.

Minimize monetary cost by reducing redundant messages.

Reliable and robust to errors in hardware and the network.

Must run on (or work with) a wide range of devices.

From current smartphones to previous generation/recycled cellphones.

Compact and integrate seamlessly with existing mobilesystems.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 25: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Objectives

Fully utilize the capacity of the SMS network.

Minimize monetary cost by reducing redundant messages.

Reliable and robust to errors in hardware and the network.

Must run on (or work with) a wide range of devices.

From current smartphones to previous generation/recycled cellphones.

Compact and integrate seamlessly with existing mobilesystems.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 26: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Objectives

Fully utilize the capacity of the SMS network.

Minimize monetary cost by reducing redundant messages.

Reliable and robust to errors in hardware and the network.

Must run on (or work with) a wide range of devices.

From current smartphones to previous generation/recycled cellphones.

Compact and integrate seamlessly with existing mobilesystems.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 27: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Objectives

Fully utilize the capacity of the SMS network.

Minimize monetary cost by reducing redundant messages.

Reliable and robust to errors in hardware and the network.

Must run on (or work with) a wide range of devices.

From current smartphones to previous generation/recycled cellphones.

Compact and integrate seamlessly with existing mobilesystems.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 28: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

MotivationObjectives

Objectives

Fully utilize the capacity of the SMS network.

Minimize monetary cost by reducing redundant messages.

Reliable and robust to errors in hardware and the network.

Must run on (or work with) a wide range of devices.

From current smartphones to previous generation/recycled cellphones.

Compact and integrate seamlessly with existing mobilesystems.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 29: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

How does the SMS network behave?

Previous work

Examined traces of 59 million messages exchanged in Indiaover a 3 week period. (Zerfos et al.)

Trace covered approximately 10% of India’s mobile subscribers(at the time).

Examines SMS from a macro perspective.

Does not examine mass message senders as an isolated group.

We need to examine the SMS network from a microperspective.

Focus on traffic patterns that differ significantly from normalhuman generated traffic.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 30: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

How does the SMS network behave?

Previous work

Examined traces of 59 million messages exchanged in Indiaover a 3 week period. (Zerfos et al.)

Trace covered approximately 10% of India’s mobile subscribers(at the time).

Examines SMS from a macro perspective.

Does not examine mass message senders as an isolated group.

We need to examine the SMS network from a microperspective.

Focus on traffic patterns that differ significantly from normalhuman generated traffic.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 31: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

How does the SMS network behave?

Previous work

Examined traces of 59 million messages exchanged in Indiaover a 3 week period. (Zerfos et al.)

Trace covered approximately 10% of India’s mobile subscribers(at the time).

Examines SMS from a macro perspective.

Does not examine mass message senders as an isolated group.

We need to examine the SMS network from a microperspective.

Focus on traffic patterns that differ significantly from normalhuman generated traffic.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 32: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

How does the SMS network behave?

Previous work

Examined traces of 59 million messages exchanged in Indiaover a 3 week period. (Zerfos et al.)

Trace covered approximately 10% of India’s mobile subscribers(at the time).

Examines SMS from a macro perspective.

Does not examine mass message senders as an isolated group.

We need to examine the SMS network from a microperspective.

Focus on traffic patterns that differ significantly from normalhuman generated traffic.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 33: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

How does the SMS network behave?

Previous work

Examined traces of 59 million messages exchanged in Indiaover a 3 week period. (Zerfos et al.)

Trace covered approximately 10% of India’s mobile subscribers(at the time).

Examines SMS from a macro perspective.

Does not examine mass message senders as an isolated group.

We need to examine the SMS network from a microperspective.

Focus on traffic patterns that differ significantly from normalhuman generated traffic.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 34: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

How does the SMS network behave?

Previous work

Examined traces of 59 million messages exchanged in Indiaover a 3 week period. (Zerfos et al.)

Trace covered approximately 10% of India’s mobile subscribers(at the time).

Examines SMS from a macro perspective.

Does not examine mass message senders as an isolated group.

We need to examine the SMS network from a microperspective.

Focus on traffic patterns that differ significantly from normalhuman generated traffic.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 35: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Understanding the characteristics of SMS

Transmission rate

Signal strengthMedium contentionCommunication latency with the device circuitry.

Delay

Propagation delayQueuing delays throughout the networkTransmission delayNetwork may throttle or artificially delay messages.

Loss rate

Transmission failureNetwork congestionData corruptionMessage may also expire if the receiver is not available.

Other properties: transmission failure rate and reorderingEarl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 36: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Understanding the characteristics of SMS

Transmission rate

Signal strengthMedium contentionCommunication latency with the device circuitry.

Delay

Propagation delayQueuing delays throughout the networkTransmission delayNetwork may throttle or artificially delay messages.

Loss rate

Transmission failureNetwork congestionData corruptionMessage may also expire if the receiver is not available.

Other properties: transmission failure rate and reorderingEarl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 37: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Understanding the characteristics of SMS

Transmission rate

Signal strengthMedium contentionCommunication latency with the device circuitry.

Delay

Propagation delayQueuing delays throughout the networkTransmission delayNetwork may throttle or artificially delay messages.

Loss rate

Transmission failureNetwork congestionData corruptionMessage may also expire if the receiver is not available.

Other properties: transmission failure rate and reorderingEarl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 38: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Understanding the characteristics of SMS

Transmission rate

Signal strengthMedium contentionCommunication latency with the device circuitry.

Delay

Propagation delayQueuing delays throughout the networkTransmission delayNetwork may throttle or artificially delay messages.

Loss rate

Transmission failureNetwork congestionData corruptionMessage may also expire if the receiver is not available.

Other properties: transmission failure rate and reorderingEarl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 39: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Properties could be affected by:

Day of week (ex. Saturday night more congested thanTuesday morning).

Time of day.

Number of successive messages sent.

Device used.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 40: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Properties could be affected by:

Day of week (ex. Saturday night more congested thanTuesday morning).

Time of day.

Number of successive messages sent.

Device used.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 41: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Properties could be affected by:

Day of week (ex. Saturday night more congested thanTuesday morning).

Time of day.

Number of successive messages sent.

Device used.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 42: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Properties could be affected by:

Day of week (ex. Saturday night more congested thanTuesday morning).

Time of day.

Number of successive messages sent.

Device used.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 43: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Characterizing SMS

Testbed

Two testbed configurations that represent common usagescenarios:

Messages exchanged between cell phones tethered tocommodity PCs.Messages exchanged between smartphones.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 44: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Tethered cell phones

Recycled Nokia cell phones connected over USB.

Gammu used to communicate with Nokia phones over FBUSprotocol.

Tests controlled over LAN control channel.

Time synchronized to the university’s NTP server.

Test consists of exchanging bursts of 10 messages per hour,24 hours per day, over a 7 day period.

Hourly success/failure notifications sent via email.

Transmission failures and losses were verified manually.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 45: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Tethered cell phones

Recycled Nokia cell phones connected over USB.

Gammu used to communicate with Nokia phones over FBUSprotocol.

Tests controlled over LAN control channel.

Time synchronized to the university’s NTP server.

Test consists of exchanging bursts of 10 messages per hour,24 hours per day, over a 7 day period.

Hourly success/failure notifications sent via email.

Transmission failures and losses were verified manually.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 46: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Tethered cell phones

Recycled Nokia cell phones connected over USB.

Gammu used to communicate with Nokia phones over FBUSprotocol.

Tests controlled over LAN control channel.

Time synchronized to the university’s NTP server.

Test consists of exchanging bursts of 10 messages per hour,24 hours per day, over a 7 day period.

Hourly success/failure notifications sent via email.

Transmission failures and losses were verified manually.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 47: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Tethered cell phones

Recycled Nokia cell phones connected over USB.

Gammu used to communicate with Nokia phones over FBUSprotocol.

Tests controlled over LAN control channel.

Time synchronized to the university’s NTP server.

Test consists of exchanging bursts of 10 messages per hour,24 hours per day, over a 7 day period.

Hourly success/failure notifications sent via email.

Transmission failures and losses were verified manually.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 48: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Tethered cell phones

Recycled Nokia cell phones connected over USB.

Gammu used to communicate with Nokia phones over FBUSprotocol.

Tests controlled over LAN control channel.

Time synchronized to the university’s NTP server.

Test consists of exchanging bursts of 10 messages per hour,24 hours per day, over a 7 day period.

Hourly success/failure notifications sent via email.

Transmission failures and losses were verified manually.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 49: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Tethered cell phones

Recycled Nokia cell phones connected over USB.

Gammu used to communicate with Nokia phones over FBUSprotocol.

Tests controlled over LAN control channel.

Time synchronized to the university’s NTP server.

Test consists of exchanging bursts of 10 messages per hour,24 hours per day, over a 7 day period.

Hourly success/failure notifications sent via email.

Transmission failures and losses were verified manually.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 50: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 51: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Drawbacks of using tethered cell phones

Polling delays

Sending: messages copied to phone’s “outbox”, Gammu pollsto verify that message is sent.Receiving: Gammu polls phone’s “inbox” to retrieve messages.

Unstable hardware

Communication with phone frequently broken.Software resets required.

Cell phone is a black box.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 52: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Drawbacks of using tethered cell phones

Polling delays

Sending: messages copied to phone’s “outbox”, Gammu pollsto verify that message is sent.Receiving: Gammu polls phone’s “inbox” to retrieve messages.

Unstable hardware

Communication with phone frequently broken.Software resets required.

Cell phone is a black box.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 53: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Drawbacks of using tethered cell phones

Polling delays

Sending: messages copied to phone’s “outbox”, Gammu pollsto verify that message is sent.Receiving: Gammu polls phone’s “inbox” to retrieve messages.

Unstable hardware

Communication with phone frequently broken.Software resets required.

Cell phone is a black box.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 54: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Drawbacks of using tethered cell phones

Polling delays

Sending: messages copied to phone’s “outbox”, Gammu pollsto verify that message is sent.Receiving: Gammu polls phone’s “inbox” to retrieve messages.

Unstable hardware

Communication with phone frequently broken.Software resets required.

Cell phone is a black box.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 55: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Drawbacks of using tethered cell phones

Polling delays

Sending: messages copied to phone’s “outbox”, Gammu pollsto verify that message is sent.Receiving: Gammu polls phone’s “inbox” to retrieve messages.

Unstable hardware

Communication with phone frequently broken.Software resets required.

Cell phone is a black box.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 56: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Smartphones

Embedded environment createdtighter integration between testdriver and radio.

Remove polling delays by usingevent driven APIs.

Correlate signal strength, basestation hopping with SMSmeasurements.

Stable and reliable testbed (nohardware crashes, resets, etc.)

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 57: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Smartphones

Embedded environment createdtighter integration between testdriver and radio.

Remove polling delays by usingevent driven APIs.

Correlate signal strength, basestation hopping with SMSmeasurements.

Stable and reliable testbed (nohardware crashes, resets, etc.)

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 58: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Smartphones

Embedded environment createdtighter integration between testdriver and radio.

Remove polling delays by usingevent driven APIs.

Correlate signal strength, basestation hopping with SMSmeasurements.

Stable and reliable testbed (nohardware crashes, resets, etc.)

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 59: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Testbed

Smartphones

Embedded environment createdtighter integration between testdriver and radio.

Remove polling delays by usingevent driven APIs.

Correlate signal strength, basestation hopping with SMSmeasurements.

Stable and reliable testbed (nohardware crashes, resets, etc.)

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 60: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Test setup

Unidirectional and bidirectional transmission.

Devices time synchronized to the GSM cellular network.

Exchanges bursts of 10,20,40,80 messages between devices.

Experiments conducted during throughout early Fridaythrough to Monday evening.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 61: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Test setup

Unidirectional and bidirectional transmission.

Devices time synchronized to the GSM cellular network.

Exchanges bursts of 10,20,40,80 messages between devices.

Experiments conducted during throughout early Fridaythrough to Monday evening.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 62: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Test setup

Unidirectional and bidirectional transmission.

Devices time synchronized to the GSM cellular network.

Exchanges bursts of 10,20,40,80 messages between devices.

Experiments conducted during throughout early Fridaythrough to Monday evening.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 63: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Test setup

Unidirectional and bidirectional transmission.

Devices time synchronized to the GSM cellular network.

Exchanges bursts of 10,20,40,80 messages between devices.

Experiments conducted during throughout early Fridaythrough to Monday evening.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 64: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis

Summary

Exchanged over 2400 SMS messages between devices.

98.5% transmission success rate.

Contrary to expectations, the day of the week, time of theday, and burst size had no effect on results.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 65: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Transmission rate

Highly consistent for unidirectional traffic.

Mean: 4.03 sec (smartphone), 5.59 sec (cell phone)

Bidirectional traffic has a significant effect.

Mean: 9.59 sec (smartphone)ALOHA delays on shared random access channel.

Configuration Mean Minimum Maximum Median Std. dev.

Tethered cell phone 5.59 4.19 29.23 5.63 0.76

Smartphone 4.03 2.98 39.36 3.34 3.81

Smartphone (bidirectional) 9.59 2.24 67.90 3.41 14.10

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 66: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Transmission rate

Highly consistent for unidirectional traffic.

Mean: 4.03 sec (smartphone), 5.59 sec (cell phone)

Bidirectional traffic has a significant effect.

Mean: 9.59 sec (smartphone)ALOHA delays on shared random access channel.

Configuration Mean Minimum Maximum Median Std. dev.

Tethered cell phone 5.59 4.19 29.23 5.63 0.76

Smartphone 4.03 2.98 39.36 3.34 3.81

Smartphone (bidirectional) 9.59 2.24 67.90 3.41 14.10

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 67: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Transmission time CDF

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 68: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Loss

Loss rate was consistently less than 4%.

Message duplicationCell phone: 3.1%

Duplicates caused by communication failures with phone.FBUS protocol frequently enters an inconsistent state.

Smartphone: 0.8%

Message duplication almost always the result of a drop insignal and cell tower change.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 69: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Loss

Loss rate was consistently less than 4%.

Message duplicationCell phone: 3.1%

Duplicates caused by communication failures with phone.FBUS protocol frequently enters an inconsistent state.

Smartphone: 0.8%

Message duplication almost always the result of a drop insignal and cell tower change.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 70: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Loss

Loss rate was consistently less than 4%.

Message duplicationCell phone: 3.1%

Duplicates caused by communication failures with phone.FBUS protocol frequently enters an inconsistent state.

Smartphone: 0.8%

Message duplication almost always the result of a drop insignal and cell tower change.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 71: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Reordering

Reordering is highly dependent on device.

Cell phone: 2.53%Unidirectional smartphone: 31.72%Bidirectional smartphone: 41.95%

Message reordering almost always the result of a cell towerchange.

(BlackBerry is unusually sensitive to decreased signal strength)

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 72: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Reordering

Reordering is highly dependent on device.

Cell phone: 2.53%Unidirectional smartphone: 31.72%Bidirectional smartphone: 41.95%

Message reordering almost always the result of a cell towerchange.

(BlackBerry is unusually sensitive to decreased signal strength)

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 73: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Reordering

Reordering is highly dependent on device.

Cell phone: 2.53%Unidirectional smartphone: 31.72%Bidirectional smartphone: 41.95%

Message reordering almost always the result of a cell towerchange.

(BlackBerry is unusually sensitive to decreased signal strength)

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 74: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Delay

Highly variable (high standard deviation).

Dependent on the hardware used.

Bidirectional traffic had a significant impact on delay.

Channel contention at the edges of the network.

Configuration Mean Minimum Maximum Median Std. dev.

Tethered cell phone 289.31 3.19 14534.32 14.00 1247.83

Smartphone 52.22 0.616 388.87 9.66 72.25

Smartphone (bidirectional) 203.02 1.98 645.56 173.44 174.19

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 75: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Delay

Highly variable (high standard deviation).

Dependent on the hardware used.

Bidirectional traffic had a significant impact on delay.

Channel contention at the edges of the network.

Configuration Mean Minimum Maximum Median Std. dev.

Tethered cell phone 289.31 3.19 14534.32 14.00 1247.83

Smartphone 52.22 0.616 388.87 9.66 72.25

Smartphone (bidirectional) 203.02 1.98 645.56 173.44 174.19

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 76: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Delay

Highly variable (high standard deviation).

Dependent on the hardware used.

Bidirectional traffic had a significant impact on delay.

Channel contention at the edges of the network.

Configuration Mean Minimum Maximum Median Std. dev.

Tethered cell phone 289.31 3.19 14534.32 14.00 1247.83

Smartphone 52.22 0.616 388.87 9.66 72.25

Smartphone (bidirectional) 203.02 1.98 645.56 173.44 174.19

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 77: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Delay

Highly variable (high standard deviation).

Dependent on the hardware used.

Bidirectional traffic had a significant impact on delay.

Channel contention at the edges of the network.

Configuration Mean Minimum Maximum Median Std. dev.

Tethered cell phone 289.31 3.19 14534.32 14.00 1247.83

Smartphone 52.22 0.616 388.87 9.66 72.25

Smartphone (bidirectional) 203.02 1.98 645.56 173.44 174.19

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 78: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

Message delay CDF

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 79: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Analysis (continued)

The effect of delay

Given a relatively consistent transmission time (with no delaybetween message transmissions), message have a highinter-arrival time.

Configuration Mean Minimum Maximum Median Std. dev.

Tethered cell phone 67.32 0.0 14511.02 1.68 591.84

Smartphone 8.51 0.28 92.90 3.51 16.91

Smartphone (bidirectional) 28.14 2.90 274.08 5.59 39.97

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 80: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Example message flow

Unidirectional, 20 messages

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 81: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Example message flow

Unidirectional, 40 messages

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 82: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

CharacteristicsTestbedAnalysis

Example message flow

Bidirectional, 10 messages

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 83: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Design

Motivating criteria

NIC dependency - the choice of hardware impacts thebehaviour of SMS.

Bidirectional traffic - significantly increases transmission time,delay, and reordering.

Low loss rate - messages are rarely lost.

Variable inter-message arrival times.

Burst size has no effect - we can send as fast as possible.

Messages remain intact.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 84: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Design

Motivating criteria

NIC dependency - the choice of hardware impacts thebehaviour of SMS.

Bidirectional traffic - significantly increases transmission time,delay, and reordering.

Low loss rate - messages are rarely lost.

Variable inter-message arrival times.

Burst size has no effect - we can send as fast as possible.

Messages remain intact.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 85: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Design

Motivating criteria

NIC dependency - the choice of hardware impacts thebehaviour of SMS.

Bidirectional traffic - significantly increases transmission time,delay, and reordering.

Low loss rate - messages are rarely lost.

Variable inter-message arrival times.

Burst size has no effect - we can send as fast as possible.

Messages remain intact.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 86: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Design

Motivating criteria

NIC dependency - the choice of hardware impacts thebehaviour of SMS.

Bidirectional traffic - significantly increases transmission time,delay, and reordering.

Low loss rate - messages are rarely lost.

Variable inter-message arrival times.

Burst size has no effect - we can send as fast as possible.

Messages remain intact.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 87: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Design

Motivating criteria

NIC dependency - the choice of hardware impacts thebehaviour of SMS.

Bidirectional traffic - significantly increases transmission time,delay, and reordering.

Low loss rate - messages are rarely lost.

Variable inter-message arrival times.

Burst size has no effect - we can send as fast as possible.

Messages remain intact.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 88: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Design

Motivating criteria

NIC dependency - the choice of hardware impacts thebehaviour of SMS.

Bidirectional traffic - significantly increases transmission time,delay, and reordering.

Low loss rate - messages are rarely lost.

Variable inter-message arrival times.

Burst size has no effect - we can send as fast as possible.

Messages remain intact.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 89: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Protocol

Message format

Message headers range from 2 -3 bytes in length.

Maximize the fixed 140 bytemessage payload.Details are in the paper.

Base 64 mode to support

Reduces effective payload to120 bytes.Supports communication witha wide range of devices (thatonly accept printable ASCIIcharacters).

Details are in the paper.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 90: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Protocol

Message format

Message headers range from 2 -3 bytes in length.

Maximize the fixed 140 bytemessage payload.Details are in the paper.

Base 64 mode to support

Reduces effective payload to120 bytes.Supports communication witha wide range of devices (thatonly accept printable ASCIIcharacters).

Details are in the paper.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 91: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Protocol (continued)

Flow control and error control

Experimented with SMART and sliding window flow control.

NETBLT

Advantages of NETBLT

Sender may transmit a continuous series of messages sinceburst size has no effect on transmission rate, delay, or loss.

Bidirectional traffic is minimized through the use of acumulative ack.

Cumulative selective ack is tolerant to message reordering,random losses, and variable inter-arrival times.

Low SMS loss rate requires few acks to be sent.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 92: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Protocol (continued)

Flow control and error control

Experimented with SMART and sliding window flow control.

NETBLT

Advantages of NETBLT

Sender may transmit a continuous series of messages sinceburst size has no effect on transmission rate, delay, or loss.

Bidirectional traffic is minimized through the use of acumulative ack.

Cumulative selective ack is tolerant to message reordering,random losses, and variable inter-arrival times.

Low SMS loss rate requires few acks to be sent.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 93: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Protocol (continued)

Flow control and error control

Experimented with SMART and sliding window flow control.

NETBLT

Advantages of NETBLT

Sender may transmit a continuous series of messages sinceburst size has no effect on transmission rate, delay, or loss.

Bidirectional traffic is minimized through the use of acumulative ack.

Cumulative selective ack is tolerant to message reordering,random losses, and variable inter-arrival times.

Low SMS loss rate requires few acks to be sent.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 94: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Protocol (continued)

Flow control and error control

Experimented with SMART and sliding window flow control.

NETBLT

Advantages of NETBLT

Sender may transmit a continuous series of messages sinceburst size has no effect on transmission rate, delay, or loss.

Bidirectional traffic is minimized through the use of acumulative ack.

Cumulative selective ack is tolerant to message reordering,random losses, and variable inter-arrival times.

Low SMS loss rate requires few acks to be sent.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 95: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Protocol (continued)

Flow control and error control

Experimented with SMART and sliding window flow control.

NETBLT

Advantages of NETBLT

Sender may transmit a continuous series of messages sinceburst size has no effect on transmission rate, delay, or loss.

Bidirectional traffic is minimized through the use of acumulative ack.

Cumulative selective ack is tolerant to message reordering,random losses, and variable inter-arrival times.

Low SMS loss rate requires few acks to be sent.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 96: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Protocol (continued)

Flow control and error control

Experimented with SMART and sliding window flow control.

NETBLT

Advantages of NETBLT

Sender may transmit a continuous series of messages sinceburst size has no effect on transmission rate, delay, or loss.

Bidirectional traffic is minimized through the use of acumulative ack.

Cumulative selective ack is tolerant to message reordering,random losses, and variable inter-arrival times.

Low SMS loss rate requires few acks to be sent.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 97: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Architecture

Extensiblearchitecture thatallows forintegration intoexisting mobilesystems.

Device plug-inssupported providedthrough SMSHandler API.

Detailedarchitecturaldescription in thepaper.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 98: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Architecture

Extensiblearchitecture thatallows forintegration intoexisting mobilesystems.

Device plug-inssupported providedthrough SMSHandler API.

Detailedarchitecturaldescription in thepaper.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 99: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Architecture

Extensiblearchitecture thatallows forintegration intoexisting mobilesystems.

Device plug-inssupported providedthrough SMSHandler API.

Detailedarchitecturaldescription in thepaper.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 100: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Implementation and evaluation

Summary

The SMS-NIC is implemented in Java Micro Edition.

CLDC compliant.

Runs on WIDE range of existing mobile cell phones andsmartphones.

Sample workloads

GPS position (1 msg) 2 KB RSA key (16 msgs) 4 KB BLOB (31 msgs)

SMS-NIC 37.32 sec 97.23 sec 212.11 sec

Implementation details are in the paper.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 101: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Implementation and evaluation

Summary

The SMS-NIC is implemented in Java Micro Edition.

CLDC compliant.

Runs on WIDE range of existing mobile cell phones andsmartphones.

Sample workloads

GPS position (1 msg) 2 KB RSA key (16 msgs) 4 KB BLOB (31 msgs)

SMS-NIC 37.32 sec 97.23 sec 212.11 sec

Implementation details are in the paper.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 102: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Implementation and evaluation

Summary

The SMS-NIC is implemented in Java Micro Edition.

CLDC compliant.

Runs on WIDE range of existing mobile cell phones andsmartphones.

Sample workloads

GPS position (1 msg) 2 KB RSA key (16 msgs) 4 KB BLOB (31 msgs)

SMS-NIC 37.32 sec 97.23 sec 212.11 sec

Implementation details are in the paper.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 103: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

ProtocolArchitectureImplementation

Implementation and evaluation

Summary

The SMS-NIC is implemented in Java Micro Edition.

CLDC compliant.

Runs on WIDE range of existing mobile cell phones andsmartphones.

Sample workloads

GPS position (1 msg) 2 KB RSA key (16 msgs) 4 KB BLOB (31 msgs)

SMS-NIC 37.32 sec 97.23 sec 212.11 sec

Implementation details are in the paper.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 104: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

Summary of work

Characterized the behaviour of SMS under continuous, burstyworkloads.

Designed and implemented a reliable and robust data channelbuilt on top of SMS.

Through an extensible architecture the SMS-NIC runs on orworks with a wide range of mobile devices.

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 105: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

Using the SMS-NIC

Available for download

SMS-NIC source code and measurement scripts available at:http://blizzard.cs.uwaterloo.ca/eaoliver/sms/

Includes plug-ins for CLDC enabled devices and Gammu.

Apache open source license.

Current user

KioskNethttp://blizzard.cs.uwaterloo.ca/kiosknet/

Nearby Friendhttp://crysp.uwaterloo.ca/software/nearbyfriend/

PaperSpecklehttp://cater.cs.nyu.edu/wiki/index.php/PaperSpeckle

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 106: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

Using the SMS-NIC

Available for download

SMS-NIC source code and measurement scripts available at:http://blizzard.cs.uwaterloo.ca/eaoliver/sms/

Includes plug-ins for CLDC enabled devices and Gammu.

Apache open source license.

Current user

KioskNethttp://blizzard.cs.uwaterloo.ca/kiosknet/

Nearby Friendhttp://crysp.uwaterloo.ca/software/nearbyfriend/

PaperSpecklehttp://cater.cs.nyu.edu/wiki/index.php/PaperSpeckle

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 107: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

Using the SMS-NIC

Available for download

SMS-NIC source code and measurement scripts available at:http://blizzard.cs.uwaterloo.ca/eaoliver/sms/

Includes plug-ins for CLDC enabled devices and Gammu.

Apache open source license.

Current user

KioskNethttp://blizzard.cs.uwaterloo.ca/kiosknet/

Nearby Friendhttp://crysp.uwaterloo.ca/software/nearbyfriend/

PaperSpecklehttp://cater.cs.nyu.edu/wiki/index.php/PaperSpeckle

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 108: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

Using the SMS-NIC

Available for download

SMS-NIC source code and measurement scripts available at:http://blizzard.cs.uwaterloo.ca/eaoliver/sms/

Includes plug-ins for CLDC enabled devices and Gammu.

Apache open source license.

Current user

KioskNethttp://blizzard.cs.uwaterloo.ca/kiosknet/

Nearby Friendhttp://crysp.uwaterloo.ca/software/nearbyfriend/

PaperSpecklehttp://cater.cs.nyu.edu/wiki/index.php/PaperSpeckle

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks

Page 109: Exploiting the Short Message Service as a Control Channel ...Outline Exploiting the Short Message Service as a Control Channel in Challenged Network Environments Earl Oliver David

IntroductionUnderstanding SMS

DesignConclusions

Questions?

Questions?

Earl Oliver, University of Waterloo Mobicom 2008, Workshop on Challenged Networks