A performance vs. trust perspective in the design of end-point congestion control protocols

Aleksandar Kuzmanovic*, Edward W. Knightly

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Abstract

Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency and throughput in diverse scenarios ranging from wireless access links to wireline and wireless web browsing. Unfortunately, in contrast to today's sender-driven protocols, receiver-driven congestion control introduces an incentive for misbehavior. Namely, the primary beneficiary of a flow (the receiver of data) has both the means and incentive to manipulate the congestion control algorithm in order to obtain higher throughput or reduced latency. In this paper, we study the deployability of receiver-driven TCP in environments with untrusted receivers which may tamper with the congestion control algorithm for their own benefit. Using analytical modeling and extensive simulation experiments, we show that deployment of receiver-driven TCP must strike a balance between enforcement mechanisms, which can limit performance, and complete trust of endpoints, which results in vulnerability to cheaters and even DoS attackers.

Original languageEnglish (US)
Title of host publicationProceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004
Pages96-107
Number of pages12
DOIs
StatePublished - Dec 1 2004
EventProceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004 - Berlin, Germany
Duration: Oct 5 2004Oct 8 2004

Publication series

NameProceedings - International Conference on Network Protocols, ICNP
ISSN (Print)1092-1648

Other

OtherProceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004
CountryGermany
CityBerlin
Period10/5/0410/8/04

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'A performance vs. trust perspective in the design of end-point congestion control protocols'. Together they form a unique fingerprint.

  • Cite this

    Kuzmanovic, A., & Knightly, E. W. (2004). A performance vs. trust perspective in the design of end-point congestion control protocols. In Proceedings of the 12th IEEE International Conference on Network Protocols, ICNP 2004 (pp. 96-107). (Proceedings - International Conference on Network Protocols, ICNP). https://doi.org/10.1109/ICNP.2004.1348094