Research Article
On the Security of Bottleneck Bandwidth Estimation Techniques
@INPROCEEDINGS{10.1007/978-3-642-05284-2_8, author={Ghassan Karame and David Gubler and Srdjan Čapkun}, title={On the Security of Bottleneck Bandwidth Estimation Techniques}, proceedings={Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, proceedings_a={SECURECOMM}, year={2012}, month={5}, keywords={Security Bandwidth Estimation Bandwidth Shapers}, doi={10.1007/978-3-642-05284-2_8} }
- Ghassan Karame
David Gubler
Srdjan Čapkun
Year: 2012
On the Security of Bottleneck Bandwidth Estimation Techniques
SECURECOMM
Springer
DOI: 10.1007/978-3-642-05284-2_8
Abstract
Several wide-area services are increasingly relying on bottleneck bandwidth estimation tools to enhance their network performance. Selfish hosts have, therefore, considerable incentives to fake their bandwidths in order to increase their benefit in the network. In this paper, we address this problem and we investigate the vulnerabilities of current bottleneck bandwidth estimation techniques in adversarial settings. We show that finding “full-fledged” solutions for the multitude of attacks on the end-to-end bandwidth estimation process might not be feasible in the absence of trusted network components; we discuss solutions that make use of such trusted components. Nevertheless, we discuss other possible solutions that alleviate these threats without requiring trusted infrastructure support and we evaluate the effectiveness of our proposals on PlanetLab nodes.