On the security of bottleneck bandwidth estimation techniques

Ghassan Karame, David Gubler, Srdjan Capkun

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    Several wide-area services are increasingly relying on bottleneck bandwidth estimation tools to enhance their network performance. Selfish hosts have, therefore, considerable incentives to fake their band-widths in order to increase their benefit in the network. In this paper, we address this problem and we investigate the vulnerabilities of current bottleneck bandwidth estimation techniques in adversarial settings. We show that finding "full-fledged" solutions for the multitude of attacks on the end-to-end bandwidth estimation process might not be feasible in the absence of trusted network components; we discuss solutions that make use of such trusted components. Nevertheless, we discuss other possible solutions that alleviate these threats without requiring trusted infrastructure support and we evaluate the effectiveness of our proposals on PlanetLab nodes.

    Original languageEnglish
    Title of host publicationSecurity and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Revised Selected Papers
    Pages121-141
    Number of pages21
    Volume19 LNICST
    DOIs
    Publication statusPublished - 2009
    Event5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009 - Athens, Greece
    Duration: 14 Sept 200918 Sept 2009

    Publication series

    NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
    Volume19 LNICST
    ISSN (Print)1867-8211

    Other

    Other5th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2009
    Country/TerritoryGreece
    CityAthens
    Period14/09/0918/09/09

    Keywords

    • Bandwidth estimation
    • Bandwidth shapers
    • Security

    Fingerprint

    Dive into the research topics of 'On the security of bottleneck bandwidth estimation techniques'. Together they form a unique fingerprint.

    Cite this