Packet-dropping adversary identification for data plane security

  • Authors:
  • Xin Zhang;Abhishek Jain;Adrian Perrig

  • Affiliations:
  • Carnegie Mellon University;UCLA;Carnegie Mellon University

  • Venue:
  • CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly elusive. In this paper, we propose a secure and practical packet-dropping adversary localization scheme that is robust and achieves a high detection rate and low communication and storage overhead -- the three key performance metrics for such protocols in realistic settings. Other recent work just optimizes either the detection rate or the communication overhead. In this paper, we systematically explore the design space of acknowledgment-based protocols to identify a packet dropping adversary on a forwarding path. In particular, we investigate a set of basic protocols, each exemplifying a design dimension, and examine the underlying tradeoff between the performance metrics. For each basic protocol, we present both upper and lower performance bounds via theoretical analysis, and average-case results via simulations. We conclude that the proposed PAAI-1 protocol outperforms other related schemes.