The Effect of Unwanted Internet Traffic on Cellular Phone Energy

The Effect of Unwanted Internet Traffic on Cellular Phone Energy
Consumption
Ismo Puustinen
Nokia Research Center
Helsinki, Finland
[email protected]
Abstract—Unwanted Internet background traffic (often called
―Internet background radiation‖) is received to every public IPv4
address. This is a problem for cellular phones with an always-online
GPRS connection, because receiving the unwanted sporadic data
traffic will cause the cellular radio to be used, which in turn drains
the device battery. We present measurements of the effect of
unwanted Internet traffic to cellular phone energy consumption, and
simulate different 3G fast dormancy timeout values to find out a way
to reduce the time the radio is active. The simulations demonstrate
that the use of a well-chosen static fast dormancy timeout value
enables large power savings without causing too much extra 3G state
transition signalling between the cellular phone and the 3G base
station.
Index Terms—energy consumption, power saving, cellular
networks, unwanted traffic
1. INTRODUCTION
As the data connection capabilities of mobile phones
improve they increasingly resemble other Internet connected
devices. Like personal computers, cellular phones can use
services, such as voice over IP or instant messaging, which
require an always-online Internet presence. Continuous
connectivity also improves the user experience by reducing
the latency of server access, e.g. for web page downloads.
While continuous Internet connectivity provides phone
users with access to new solutions and developers with new
innovation opportunities, it also has its drawbacks.
Unsolicited traffic resulting e.g. from worms, denial of service
attacks, or misconfigured devices is steadily increasing in the
Internet [1]. If cellular phones are working like regular
Internet hosts they will also experience such unwanted traffic.
This causes a number of problems for the user. First, since
part of the unwanted traffic is malicious, it may try to exploit
possible vulnerabilities in the mobile phone. Second, the
traffic may cause monetary costs especially if the user does
not have an unlimited data plan. Finally, incoming data
packets require the activation of the radio connection between
the mobile phone and the base station, which is expensive in
terms of energy consumption. In 3G, connection activation
and, especially, deactivation are slow and power hungry
operations. Even if the amount of transferred data was small,
each separate communication event would still require
considerable amount of energy.
Jukka K. Nurminen
Nokia Research Center Helsinki, Finland
Dept. of Computer Science and Engineering
Aalto University School of Science and Technology,
Finland
[email protected]
In this paper we study the last problem to understand how
harmful the unwanted traffic is to the energy consumption of
the mobile phone and look for ways to improve the situation.
Our key contributions are that
 We present measurement results of the effect of the
unwanted traffic on the cellular phone battery life
(section 3). The results show that phones are likely to
experience significant energy drain from the unwanted
traffic.
 We analyse how faster deactivation of radio connections
would influence the energy consumption of unwanted
traffic. For this we simulate the energy cost of captured
traffic traces with different timeout values (section 4).
 We discuss the practical implementation of faster
connection deactivation with existing proprietary
solutions and upcoming 3GPP fast dormancy standard.
Furthermore, we briefly review alternative solutions to
reduce the energy consumption of unwanted traffic, such
as the use of a firewall in either the device or within the
cellular operator network (section 5).
2. CELLULAR PHONE ENERGY CONSUMPTION
The energy needed to handle a data transfer event consists
of three components: head energy for connection activation,
transfer energy for actual data transfer, and tail energy for
connection deactivation. In 3G, the phone spends a
considerable amount of time and energy in high-power states
after the data transfer has been completed making tail energy
the dominant energy consumer when the amount of
transferred data is small. E.g. when the transferring 50 kB of
data, an amount that is much higher than in a typical unwanted
traffic event, the share of tail energy can be 60%, while the
remaining 40% is roughly equally split between head and
transfer energies [2].
The network activity of the 3G cellular modem is governed
by a set of states that the Radio Resource Controller manages
[3]. An idle phone is typically in a low power PCH state.
When the need for data transfer arises, the phone is usually
transferred to DCH state for the transmission of the data. After
the data has been sent the cellular network starts a timer (T1).
When this timer expires, the cellular network transfers the
phone to FACH state and a second timer (T2) is started. When
T2 expires, the phone is transferred back PCH state.
Figure 1 illustrates how the amount of power consumed by
the 3G cellular data communication depends on the cellular
state that the device is in. The figure clearly shows how the
arrival of a very small data packet (the magnified green spike)
forces the phone to shift from PCH to DCH state and how
long it takes after the data transfer to return back to PCH via
FACH state. The figure also clearly shows that power
consumption increases dramatically when the phone is in
DCH state. When moving to FACH state from DCH, the
power consumption drops to half but is still much higher than
in PCH.
public internet-routable IPv4 address where the operator does
not block any ports.
The measurements were done with a Nokia N900 mobile
phone. The device model or type should not influence the
unwanted traffic experienced by the mobile as long as the
phone supports "always online" -type GPRS IPv4 connections.
By default, all ports on N900 (software release PR1.2) are
closed on non-loopback network interfaces, meaning that the
phone does not provide any services to Internet.
N900 uses a proprietary fast dormancy mechanism for
reducing the tail energy. Since this mechanism is proprietary
and does not conform to 3GPP specifications, we disabled it
for the measurement.
We did the measurements by capturing all network traffic
on the GPRS network interface using 'tcpdump' tool [4]. At
the same time we used Nokia Energy Profiler [5] to capture
power consumption and data traffic statistics. We postprocessed the collected traces to remove network traffic
originating from the phone, such as automatic checking for
software updates.
We collected data from several weekdays and weekends at
weeks 38/2010 and 39/2010. We performed detailed energy
consumption analysis for a 16-hour measurement from
October 6, 2010. For traffic analysis we aggregated all
network traffic we captured totalling 133 hours of data.
3.2. Energy Measurement Results
Table 1 shows a summary of the energy measurements. Idle
row shows how much energy N900 consumes in the test
period in the absence of unwanted traffic. We measured this
by filtering out the communication event related energy
consumption from the trace. Data Transfer means how much
energy the actual data transfer of the unwanted traffic required
and Head & Tail indicates the sum of head and tail energies
caused by the unwanted traffic.
TABLE I
ENERGY CONSUMPTION OF UNWANTED TRAFFIC IN A
16H MEASUREMENT INTERVAL
Measured energy (J)
Idle
Data
Transfer
Head &
Tail
Total
Figure 1: The arrival of a single ICMP ECHO packet over 3G cellular data
connection, measurement with Nokia Energy Profiler on N900
3. THE EFFECT OF UNWANTED TRAFFIC ON ENERGY
CONSUMPTION
3.1. Measurement Setup
The measurements were done in the network of Finnish
cellular operator Elisa using a standard 3G subscription with
voice and unlimited data capped to 1 Mb/s download speed.
Elisa offers by default (via access point name ―internet‖) a
Energy in 24h (J)
Share
6303
62
9504
92
78.77%
0.77%
1637
2468
20.46%
8002
12065
100.00%
It is clearly evident that unwanted traffic is an important
consumer of energy. As expected, the actual data transfer is
only in a minor role because unwanted traffic consists of very
small messages. However, head and tail energies related to
separate communication events are major consumers of
energy. In fact, the energy to receive the unwanted traffic and
to respond is less than 4% of the total communication energy.
It is important to note that the absolute numbers of energy
consumption are location and operator dependent. First, if the
cellular radio field strength is good, cellular modem data
transfer may require only one third of the power compared to
a phone with a bad cellular reception [6]. In our case we
measured 0.51 W for FACH state and 0.95 W for DCH state.
We also measured that an idle N900 consumes 0.11 W when
running tcpdump and Nokia Energy Profiler.
Second, different operators are free to choose different
values for the timers. In our case we measured the timers to be
T1=8s and T2=6s. For the tail energy our measurements gave
10.6 J. The average latency from idle to the start of the data
transfer was 2.25 seconds resulting in 1.8 J head energy. In
comparison to measurements in US [2] our head energies are
slightly higher and our tail energies slightly smaller, but as
said there are context and operator specific differences in the
absolute values.
3.3. Traffic Analysis Results
During our complete trace of 133 hours we recorded 4268
unsolicited incoming packets. Around half of their interarrival
times, shown in Figure 2, were less than four secondsError!
Reference source not found.. The other half of the
interarrival times was rather evenly distributed with the
longest interval of 3701 seconds.
25%
20%
15%
10%
5%
0%
0
0.5
1
1.5
2
2.5
3
3.5
4
Figure 2: Incoming packet interval distribution (seconds)
As Figure 2 shows, there are two main clusters of
interarrival times. A detailed analysis of the data shows that
some attackers send a burst of packets in quick succession,
which explains the cluster in 0.1 seconds. The other wider
cluster around 0.7 seconds is likely to be a result of the
attacker trying again after receiving a reply (TCP RST or
ICMP ―Destination unreachable‖) from the mobile. We
suspect the Gaussian shape of the interarrival times around 0.7
seconds could be a result of the roundtrip time variance
between the mobile and the attacker and the processing time
of the attacker.
The incoming packets were sent from 189 unique IP
addresses. The protocols used were TCP (79%), UDP (16%),
and ICMP (5%). The traffic mixture corresponds roughly to
the results of Wustrow et al. in their large-scale Internet
background radiation study [1] confirming the expectation
that mobile devices are similar to regular devices.
There were a few interesting anomalies in the data. Some
certain ports were the targets of a large amount of connection
attempts. The amount and content of the spurious Internet
traffic is known to vary a lot based on the IP address and time
due to the implementation details of several Internet worms.
4. REDUCING THE EFFECT OF TAIL ENERGY
Because the tail energy is in such a dominant role the
obvious solution is to try to deactivate the radio connection
faster. However, if this is done too fast the connection may
need to be reactivated again. Unnecessary reactivation (PCH>DCH state transfer) causes extra signalling burden for the
cellular operator and — as the head energy — additional
energy consumption for the mobile phone.
To study these contradicting goals we created a model of
the 3G radio states and their energy consumptions. We
implemented the model in a simulator, which allows us to
experiment with different rules and timeouts to move between
radio states. The simulator uses the traces we collected with
tcpdump as the input and gives an estimate of the overall
energy cost of the traffic as the output.
Initially, we used the values of T1, T2, head and tail
energies that we measured (see section 3.2) to calibrate the
simulator. The simulator results calibrated in this way
deviated only 1.4% of the measured energy consumption. The
simulation software used as the download speed value 80 kB/s
and as the upload speed value 60 kB/s. However, since the
traffic consists mostly of small packets (such as SYN cookies,
ICMP ECHO packets etc.), the timer values proved to have
more effect on the overall energy consumption than the actual
data transfers. We got also the power costs for the simulation
from the Nokia Energy Profiler measurements. We only
simulated the increase of power that data traffic causes, so we
set the idle power at 0 W. Therefore, the power used for data
transfer in DCH state was 0.84 W. The amount of energy used
for PCH->DCH state transition was 1.55 J, and the amount of
energy used for FACH->DCH state transition was 1 J. All
other state transitions were considered to be free in energy
terms.
We did the baseline simulation with the actual Elisa T1 and
T2 timer values to confirm that the simulation is in line with
the measured results. The simulation result was that the
amount of energy data the unsolicited traffic consumes during
this 133-hour period was 19574 J. Of this energy, 13% was
spent on network signalling during the PCH->DCH state
transfers, and the rest of the energy was spent on the data
transmission itself and during the timer periods after the data
traffic. There were 1695 PCH->DCH state transfers due to the
unwanted traffic.
We then analysed the effect of deactivating the connections
faster. We examined a model where the data channel was
released after a static timeout whenever a packet transfer was
completed. If more packets were received during the timeout
period, the timer was started from the beginning. The energy
costs and the number of PCH->DCH transitions associated
with different timeout values are presented in Figure 3. The
results indicate that a static timeout value of 800 milliseconds
gives approximately 73% reduction in cellular energy costs
with only 22% increase in PCH->DCH transitions. This result
has a strong correlation with the packet arrival distribution
cluster around 0.7 seconds in Figure 2.
If minimizing the number of unnecessary PCH->DCH
transitions is important for the cellular network operator the
timeout value of 3.5 seconds would still allow around 50%
energy savings for the phone user with less than 10% extra
PCH->DCH transitions.
100%
80%
60%
40%
20%
0%
Transfer + tail energy
Saving
Head energy
Extra PCH->DCH transfers
Figure 3: Required energy and extra signalling with different cellular timeouts
(milliseconds)
5. RELATED WORK
The energy consumption of unwanted traffic is a challenge
if we want cellular phones to be always online and able to
offer full Internet access to present and future services. So far
most of the research of unwanted traffic on cellular networks
has focused on explicit attacks to either bring down the mobile
device [7,8] or to harm the operation of the cellular network
[9]. Our work provides a complementary perspective by
investigating how ―normal‖ Internet traffic, sometimes called
background radiation, harms the user by increasing the phone
energy consumption.
Studies (e.g. [1]) that measure the background radiation
show that it varies over time but on a longer perspective is on
the increase. Because mobile devices — unless they are
behind firewalls — are regular Internet hosts, there should be
no major difference between the traffic seen by the mobile
devices and by other connected devices.
A number of papers have investigated the problem of tail
energy consumption. As observed in [10], sporadic
communication can be a significant drain on mobile devices
because the tail energy cost is incurred after every
communication episode. The effect of unwanted traffic is thus
two-fold. In the first place the unwanted traffic causes extra
communication and processing by the mobile device.
Secondly, unwanted traffic causes a lot of communication
episodes with their tail energies.
One solution, used by [2] and [11], is to try to do as much
useful work as possible when the radio connection has been
activated. In case of unwanted traffic this approach is difficult
because most of the unwanted traffic happens when the phone
is idle and does not have any pending communication
activities.
5.1. Fast dormancy
Fast dormancy is one way to implement the deactivation of
a radio connection prior to timer expiration. Currently
different phone vendors have proprietary solutions but the
feature has been standardized in the 3GPP Release 8 standard.
Most of the proprietary fast dormancy mechanisms
implemented by cell phone manufacturers have the cellular
phone send a message to operator simulating failure in cellular
connection [3]. This causes the cellular operator to move the
phone to the IDLE state without waiting for the T1 and T2
timers to expire, resulting in tail energy savings. There are two
main drawbacks using this approach.
First, the signalling overhead for the state transition from
IDLE to DCH state is big, meaning more resource usage for
the cellular operator and energy costs for the cellular phone.
Thus the fast dormancy is beneficent only if it doesn't cause
too many extra IDLE->DCH state transitions but still succeeds
in reducing the time spent in the DCH state. The background
radiation traffic proved to be very sporadic with long intervals
between packet bursts, suggesting that fast dormancy might be
useful.
Second, normally after T2 timer expires, the cellular
network transfers the phone to the PCH state. This is
conceptually close to the IDLE state, and consumes a very
low amount of energy. However, the PCH->DCH transition
requires much less signalling than IDLE->DCH transition, and
therefore is faster and consumes less energy.
3GPP Release 8 introduces a fast dormancy specification,
where the cellular phone can tell the cellular network that the
data transfer is over without indicating a real error case. This
means that the cellular phone can, in fact, request connection
release, and be transferred back to the PCH state. In our
simulation model, we used the PCH->DCH transition times
for the fast dormancy, implying the use of 3GPP Release 8
capable equipment in both the cellular phone and the cellular
operator.
A further challenge in using the fast dormancy approach is
to be able to detect when the phone is idle and when it is
performing some background task. A general mechanism to
detect the difference between unwanted traffic and useful
incoming packets is a topic for further investigation.
5.2. Firewalls
The network operator could run a firewall or NAT service,
which would filter out unwanted traffic headed to the mobile
phone. The benefit of this scheme is that no unwanted traffic
reaches the mobile phone. The drawback is that also no
wanted traffic is let through either, which can be a problem for
new innovative ideas. However, IETF has studied how to
allow operator firewall and NAT configuration by cellular
phones [12].
Another alternative is to run a firewall at the mobile device
where it would be easily controllable by the user. However,
this approach is much less efficient than the operator firewall
since the incoming messages would still require the energyhungry radio connection activation and deactivation. The
benefit gained by reduced processing at the phone and the
savings in outgoing traffic are likely to have negligible
influence on the energy consumption. However, this might
also have a secondary benefit of reducing the incoming traffic
if attackers focus their attempts to targets that give some form
of replies to their messages.
Finally, the energy consumption of PC computers that wake
up on LAN events has been previously studied (e.g. [13,14]).
Exiting the low-power ACPI sleep mode for LAN packet
processing causes extra energy costs to PCs. The problem has
some similar characteristics to the firewall question, since PCs
especially in enterprise domain need to listen to the network
traffic to be able to offer services, such as the capability to be
remotely administrated.
A network connectivity proxy is one solution to reduce the
energy consumption of PCs. The idea is that the proxy
analyzes the incoming traffic and reacts in one of the three
ways: discards the request, replies to it, or activates the PC
and forwards the request to it [14]. For discarded traffic the
operation is similar to a firewall, but because the proxy might
reply to some of the requests, the PC will not need to wake up
for every processed packet. This method can provide new
possibilities also for the cellular domain.
6. CONCLUSION
The amount of unwanted Internet traffic presents a problem
to those modern mobile phones whose 3G Internet connection
is always online. Based on our measurements, the energy
consumed by receiving and handling the traffic can be so high
that it alone is enough to drain a mobile phone battery in a few
days. The biggest reason for this is not the amount of data in
the unwanted traffic, but instead the energy costs associated
with activating the data connection and waiting before
deactivating the connection after the data transfer.
Solving the problem with unwanted data using a firewall
within the cellular operator network might not be an optimal
solution, if a requirement is to also retain the possibility for
running complex services on the mobile phone. Instead, we
focused on finding a suitable value for the 3G timeout before
deactivating the connection. We simulated the effect of
different timeout values on the energy consumption using the
previously collected unwanted Internet traffic data. The
simulations indicate that using a short static timeout might
decrease the wasted energy by 73% and only cause 22%
increase in the amount of signalling needed to make the
cellular state transitions from PCH to DCH state. The fast
dormancy mechanism introduced in 3GPP Release 8 is a
suitable technique for implementing the timeout, since it
allows the cellular phone to gracefully indicate to the cellular
operator that the data transfer is over.
REFERENCES
[1] Wustrow, E., Karir, M., Bailey, M., Jahanian, F., and Houston, G.
Internet Background Radiation Revisited. Technical Report CSE-TR-
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
564-10, University of Michigan, Ann Arbor, MI, USA, June 2010. (To
appear in 2010 Internet Measurement Conference.)
Balasubramanian, N., Balasubramanian, A., and Venkataramani, A.
Energy consumption in mobile phones: a measurement study and
implications for network applications. In Proceedings of the 9th ACM
SIGCOMM Conference on Internet Measurement, pp. 280-293,
Chicago, Illinois, USA, 2009.
Holma, H. and Toskala, A. WCDMA for UMTS-HSPA Evolution and
LTE, John Wiley & Sons, New York, USA, 5th edition, 2010.
Tcpdump. http://www.tcpdump.org/
Bosch, G. and Kuulusa, M. Optimizing mobile software with built-in
power profiling. In Mobile Phone Programming and Its Application to
Wireless Networking, pp. 449–462, Springer, 2007.
Miettinen, A.P. and Nurminen, J.K. Analysis of the Energy
Consumption of JavaScript Based Mobile Web Applications, 2nd
International Conference on Mobile Lightweight Wireless Systems
(MOBILIGHT 2010), Barcelona, Spain, May 2010.
Radmilo, R., Denys, M., and Chen, H. Exploiting MMS Vulnerabilities
to Stealthily Exhaust Mobile Phone's Battery, Securecomm and
Workshops, 2006, pp. 1-10, August/September 2006.
Pascual Trigos, M., Analysing and modelling battery drain of 3G
terminals due to port scan attacks, MSc thesis, Universitat Politecnica
de Catalunya.
Ricciato, F., Coluccia, A., and D'Alconzo, A. 2010. Review: A review
of DoS attack models for 3G cellular networks from a system-design
perspective. Comput. Commun. 33, 5, pp. 551-558, March 2010.
Schulman, A., Navda, V., Ramjee, R., Spring, N., Deshpande, P.,
Grunewald, C., Padmanabhan, V.N., and Jain, K.. Bartendr: A Practical
Approach to Energy-aware Cellular Data Scheduling. In Proceedings
of ACM MobiCom, 2010.
Sharma, A., Navda, V., Ramjee, R., Padmanabhan V., and Belding, E.
Cool-Tether: Energy efficient on-the-fly WiFi hot-spots using mobile
phones. In ACM CoNext, 2009.
Bajko, G. Requirements for Firewall Configuration Protocol, NSIS
Working Group, IETF Internet Draft, version 08, October, 2007.
Nedevschi, S., Chandrashekar, J., Liu, J., Nordman, B., Ratnasamy, S.,
and Taft, N. Skilled in the art of being idle: reducing energy waste in
networked systems, Proceedings of the 6th USENIX symposium on
Networked systems design and implementation, pp. 381-394, Boston,
Massachusetts, April 2009.
Nordman B. and Christensen, K. Greener PCs for the Enterprise, IEEE
IT Professional, Vol. 11, No. 4, pp. 28-37, July/August 2009.