Skip to main content

Path-Quality Monitoring in the Presence of Adversaries: The Secure Sketch Protocols

Author(s): Goldberg, Sharon; Xiao, David; Tromer, Eran; Barak, Boaz; Rexford, Jennifer

Download
To refer to this page use: http://arks.princeton.edu/ark:/88435/pr1fz7q
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGoldberg, Sharon-
dc.contributor.authorXiao, David-
dc.contributor.authorTromer, Eran-
dc.contributor.authorBarak, Boaz-
dc.contributor.authorRexford, Jennifer-
dc.date.accessioned2021-10-08T19:49:43Z-
dc.date.available2021-10-08T19:49:43Z-
dc.date.issued2014en_US
dc.identifier.citationGoldberg, Sharon, David Xiao, Eran Tromer, Boaz Barak, and Jennifer Rexford. "Path-quality monitoring in the presence of adversaries: The secure sketch protocols." IEEE/ACM Transactions on Networking 23, no. 6 (2014): 1729-1741. doi:10.1109/TNET.2014.2339853en_US
dc.identifier.issn1063-6692-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/pr1fz7q-
dc.description.abstractEdge networks connected to the Internet need effective monitoring techniques to inform routing decisions and detect violations of Service Level Agreements (SLAs). However, existing measurement tools, like ping, traceroute, and trajectory sampling, are vulnerable to attacks that can make a path look better than it really is. Here, we design and analyze a lightweight path-quality monitoring protocol that reliably raises an alarm when the packet-loss rate exceed a threshold, even when an adversary tries to bias monitoring results by selectively delaying, dropping, modifying, injecting, or preferentially treating packets. Our protocol is based on sublinear algorithms for sketching the second moment of stream of items and can monitor billions of packets using only 250-600 B of storage and the periodic transmission of a comparably sized IP packet. We also show how this protocol can be used to construct a more sophisticated protocol that allows the sender to localize the link responsible for the dropped packets. We prove that our protocols satisfy a precise definition of security, analyze their performance using numerical experiments, and derive analytic expressions for the tradeoff between statistical accuracy and system overhead. This paper contains a deeper treatment of results from earlier conference papers and several new results.en_US
dc.format.extent1729 - 1741en_US
dc.language.isoen_USen_US
dc.relation.ispartofIEEE/ACM Transactions on Networkingen_US
dc.rightsAuthor's manuscripten_US
dc.titlePath-Quality Monitoring in the Presence of Adversaries: The Secure Sketch Protocolsen_US
dc.typeJournal Articleen_US
dc.identifier.doi10.1109/TNET.2014.2339853-
dc.identifier.doihttps://www.cs.princeton.edu/~jrex/papers/pqm-journal.pdf-
dc.identifier.eissn1558-2566-
pu.type.symplectichttp://www.symplectic.co.uk/publications/atom-terms/1.0/journal-articleen_US

Files in This Item:
File Description SizeFormat 
PathQualityMonitoring.pdf511.14 kBAdobe PDFView/Download


Items in OAR@Princeton are protected by copyright, with all rights reserved, unless otherwise indicated.