TY - GEN
T1 - A performance vs. trust perspective in the design of end-point congestion control protocols
AU - Kuzmanovic, Aleksandar
AU - Knightly, Edward W.
N1 - Funding Information:
Edward W. Knightly is a professor of Electrical and Computer Engineering at Rice University. He received his B.S. degree from Auburn University in 1991 and the M.S. and Ph.D. degrees from the University of California at Berkeley in 1992 and 1996, respectively. He is an associate editor of IEEE/ACM Transactions on Networking. He served as technical co-chair of IEEE IWQoS 1998 and IEEE INFOCOM 2005 and served on the program committee for numerous networking conferences including ICNP, INFOCOM, IWQoS, MobiCom, and SIGMETRICS. He received the National Science Foundation CAREER Award in 1997 and the Sloan Fellowship in 2001. His research interests are in the areas of mobile and wireless networks and high-performance and denial-of-service resilient protocol design.
Copyright:
Copyright 2012 Elsevier B.V., All rights reserved.
PY - 2004
Y1 - 2004
N2 - Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency and throughput in diverse scenarios ranging from wireless access links to wireline and wireless web browsing. Unfortunately, in contrast to today's sender-driven protocols, receiver-driven congestion control introduces an incentive for misbehavior. Namely, the primary beneficiary of a flow (the receiver of data) has both the means and incentive to manipulate the congestion control algorithm in order to obtain higher throughput or reduced latency. In this paper, we study the deployability of receiver-driven TCP in environments with untrusted receivers which may tamper with the congestion control algorithm for their own benefit. Using analytical modeling and extensive simulation experiments, we show that deployment of receiver-driven TCP must strike a balance between enforcement mechanisms, which can limit performance, and complete trust of endpoints, which results in vulnerability to cheaters and even DoS attackers.
AB - Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency and throughput in diverse scenarios ranging from wireless access links to wireline and wireless web browsing. Unfortunately, in contrast to today's sender-driven protocols, receiver-driven congestion control introduces an incentive for misbehavior. Namely, the primary beneficiary of a flow (the receiver of data) has both the means and incentive to manipulate the congestion control algorithm in order to obtain higher throughput or reduced latency. In this paper, we study the deployability of receiver-driven TCP in environments with untrusted receivers which may tamper with the congestion control algorithm for their own benefit. Using analytical modeling and extensive simulation experiments, we show that deployment of receiver-driven TCP must strike a balance between enforcement mechanisms, which can limit performance, and complete trust of endpoints, which results in vulnerability to cheaters and even DoS attackers.
UR - http://www.scopus.com/inward/record.url?scp=17744386331&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=17744386331&partnerID=8YFLogxK
U2 - 10.1109/ICNP.2004.1348094
DO - 10.1109/ICNP.2004.1348094
M3 - Conference contribution
AN - SCOPUS:17744386331
SN - 0769521614
T3 - Proceedings - International Conference on Network Protocols, ICNP
SP - 96
EP - 107
BT - Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004
T2 - Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004
Y2 - 5 October 2004 through 8 October 2004
ER -