Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1993806.1993855acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
research-article

Conflict on a communication channel

Published: 06 June 2011 Publication History
  • Get Citation Alerts
  • Abstract

    Imagine that Alice wants to send a message m to Bob, and that Carol wants to prevent this. Assume there is a communication channel between Alice and Bob, but that Carol is capable of blocking this channel. Furthermore, there is a cost of S dollars to send on the channel, L dollars to listen on the channel and J to block the channel. How much will Alice and Bob need to spend in order to guarantee transmission of m?
    This problem abstracts many types of conflict in information networks including: jamming attacks in wireless networks and distributed denial-of-service (DDoS) attacks on the Internet, where the costs to Alice, Bob and Carol represent an expenditure of energy or network resources. The problem allows us to quantitatively analyze the economics of information exchange in an adversarial setting and ask: Is communication cheaper than censorship?
    We answer this question in the affirmative by showing that it is significantly more costly for Carol to block communication of m than for Alice to communicate it to Bob. Specifically, if S, L and J are fixed constants, and Carol spends a total of B dollars trying to block m, then Alice and Bob must spend only O(Bφ - 1 + 1)=O(B.62+1) dollars in expectation to transmit m, where φ = (1 + √5)/2 is the golden ratio. Surprisingly, this result holds even if (1) B is unknown to both Alice and Bob; (2) Carol knows the algorithms of Alice and Bob, but not their random bits; and (3) Carol has total knowledge of past actions of both players.
    Finally, we apply our work to two problems: (1) DoS attacks in wireless sensor networks and (2) application-level DDoS attacks in a wired client-server scenario. Our applications show how our results can provide an additional tool in mitigating such attacks.

    References

    [1]
    E. Addley and J. Halliday. WikiLeaks Supporters Disrupt Visa and MasterCard Sites in 'Operation Payback'. www.guardian.co.uk/world/2010/dec/08/wikileaks-visa-mastercard-operation-pay%back, 2010.
    [2]
    D. Alistarh, S. Gilbert, R. Guerraoui, Z. Milosevic, and C. Newport. Securing Your Every Bit: Reliable Broadcast in Byzantine Wireless Networks. In Proceedings of the Symposium on Parallelism in Algorithms and Architectures (SPAA), pages 50--59, 2010.
    [3]
    B. Awerbuch, A. Richa, and C. Scheideler. A Jamming - Resistant MAC Protocol for Single-Hop Wireless Networks. In Proceedings of the 27th ACM Symposium on Principles of Distributed Computing (PODC), pages 45--54, 2008.
    [4]
    M. Bertier, A.-M. Kermarrec, and G. Tan. Message-Efficient Byzantine Fault-Tolerant Broadcast in a Multi-Hop Wireless Sensor Network. In Proceedings of the International Conference on Distributed Computing Systems (ICDCS), pages 408--417, 2010.
    [5]
    V. Bhandari and N. H. Vaidya. On Reliable Broadcast in a Radio Network. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pages 138--147, 2005.
    [6]
    V. Bhandari and N. H. Vaidya. On Reliable Broadcast in a Radio Network: A Simplified Characterization. Technical report, CSL, UIUC, May 2005.
    [7]
    V. Bhandari and N. H. Vaidya. Reliable Broadcast in Wireless Networks with Probabilistic Failures. In INFOCOM, pages 715--723, 2007.
    [8]
    V. Bhandhari, J. Katz, C.-Y. Koo, and N. Vaidya. Reliable Broadcast in Radio Networks: The Bounded Collision Case. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pages 258 -- 264, 2006.
    [9]
    S. Dolev, S. Gilbert, R. Guerraoui, F. Kuhn, and C. Newport. The Wireless Synchronization Problem. In Proceedings of the 28th ACM Symposium on Principles of Distributed Computing (PODC), pages 190--199, 2009.
    [10]
    S. Dolev, S. Gilbert, R. Guerraoui, and C. Newport. Gossiping in a Multi-channel Radio Network: An Oblivious Approach to Coping with Malicious Interference. In Proceedings of the International Symposium on Distributed Computing (DISC), pages 208--222, 2007.
    [11]
    S. Dolev, S. Gilbert, R. Guerraoui, and C. Newport. Secure communication over radio channels. In Proceedings of the Symposium on Principles of Distributed Computing (PODC), pages 105--114, 2008.
    [12]
    T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel. A Survey of Lightweight-Cryptography Implementations. IEEE Design & Test of Computers, 24:522--533, 2007.
    [13]
    J. Franklin, V. Paxson, A. Perrig, and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In 14th ACM Conference on Computer and Communications Security, pages 375--388, 2007.
    [14]
    S. Gilbert, R. Guerraoui, D. Kowalski, and C. Newport. Interference-resilient information exchange. In INFOCOM, pages 2249--2257, 2009.
    [15]
    S. Gilbert, R. Guerraoui, and C. C. Newport. Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks. In International Conference On Principles Of Distributed Systems (OPODIS), pages 215--229, 2006.
    [16]
    W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-Efficient Communication Protocol for Wireless Microsensor Networks. In HICSS, pages 3005--3014, 2000.
    [17]
    D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 137--146. ACM, 2003.
    [18]
    V. King, C. Phillips, J. Saia, and M. Young. Sleeping on the Job: Energy-Efficient and Robust Broadcast for Radio Networks. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pages 243--252, 2008.
    [19]
    C.-Y. Koo. Broadcast in Radio Networks Tolerating Byzantine Adversarial Behavior. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pages 275--282, 2004.
    [20]
    Y. Li, W. Ye, and J. Heidemann. Energy and Latency Control in Low Duty Cycle MAC Protocols. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pages 676--682, 2005.
    [21]
    M. H. Manshaei, Q. Zhu, T. Alpcan, T. Bcasar, and J.-P. Hubaux. Game Theory Meets Network Security and Privacy. Technical report, Ecole Polytechnique Fédérale de Lausanne (EPFL), September 2010.
    [22]
    D. Meier, Y. A. Pignolet, S. Schmid, and R. Wattenhofer. Speed Dating Despite Jammers. In Proceedings of the International Conference on Distributed Computing in Sensor Systems (DCOSS), pages 1--14, 2009.
    [23]
    D. Niculescu. Interference Map for 802.11 Networks. In Proceedings of the Internet Measurement Conference (IMC), pages 339--350, 2007.
    [24]
    A. Pelc and D. Peleg. Broadcasting with Locally Bounded Byzantine Faults. Information Processing Letters, 93(3):109--115, 2005.
    [25]
    A. Pelc and D. Peleg. Feasibility and Complexity of Broadcasting with Random Transmission Failures. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pages 334--341, 2005.
    [26]
    J. Polastre, R. Szewczyk, and D. Culler. Telos: Enabling Ultra-Low Power Wireless Research. In IPSN, 2005.
    [27]
    I. Ramachandran and S. Roy. Clear Channel Assessment in Energy-Constrained Wideband Wireless Networks. IEEE Wireless Communications, 14(3):70--78, 2007.
    [28]
    A. Richa, C. Scheideler, S. Schmid, and J. Zhang. A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks. In Proceedings of the International Symposium on Distributed Computing (DISC), pages 179--193, 2010.
    [29]
    V. Sekar and J. V. D. Merwe. LADS: Large-Scale Automated DDoS Detection System. In Proceedings of the USENIX ATC, pages 171--184, 2006.
    [30]
    Valerie King and Cynthia Phillips and Jared Saia and Maxwell Young. Sleeping on the Job: Energy-Efficient and Robust Broadcast for Radio Networks. Accepted to Algorithmica, 2010.
    [31]
    M. Walfish, M. Vutukuru, H. Balakrishnan, D. Karger, and S. Shenker. DDoS Defense by Offense. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM), pages 303--314, 2006.
    [32]
    A. D. Wood and J. A. Stankovic. Denial of Service in Sensor Networks. Computer, 35(10):54--62, 2002.
    [33]
    W. Xu, W. Trappe, Y. Zhang, and T. Wood. The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In MobiHoc, pages 46--57, 2005.
    [34]
    M. Young and R. Boutaba. Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious Interference. Accepted to IEEE Communications Surveys & Tutorials, 2011.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    PODC '11: Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing
    June 2011
    406 pages
    ISBN:9781450307192
    DOI:10.1145/1993806
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 June 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. byzantine fault tolerance
    2. distributed denial-of-service attacks
    3. energy efficiency
    4. jamming attacks
    5. wireless sensor networks

    Qualifiers

    • Research-article

    Conference

    PODC '11
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 740 of 2,477 submissions, 30%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)30
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 10 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Defending Hash Tables from Algorithmic Complexity Attacks with Resource BurningTheoretical Computer Science10.1016/j.tcs.2024.114762(114762)Online publication date: Aug-2024
    • (2023)Bankrupting Sybil despite churnJournal of Computer and System Sciences10.1016/j.jcss.2023.02.004135(89-124)Online publication date: Aug-2023
    • (2021)Bankrupting Sybil Despite Churn2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS51616.2021.00048(425-437)Online publication date: Jul-2021
    • (2021)Windowed backoff algorithms for WiFi: theory and performance under batched arrivalsDistributed Computing10.1007/s00446-021-00403-9Online publication date: 13-Sep-2021
    • (2020)Brief Announcement: Resource Competitive Broadcast against Adaptive Adversary in Multi-channel Radio NetworksProceedings of the 39th Symposium on Principles of Distributed Computing10.1145/3382734.3405697(286-288)Online publication date: 31-Jul-2020
    • (2020)ANTS on a PlaneStructural Information and Communication Complexity10.1007/978-3-030-54921-3_3(47-62)Online publication date: 28-Jul-2020
    • (2019)Exponential Separations in the Energy Complexity of Leader ElectionACM Transactions on Algorithms10.1145/334111115:4(1-31)Online publication date: 4-Oct-2019
    • (2019)Fast and Resource Competitive Broadcast in Multi-channel Radio NetworksThe 31st ACM Symposium on Parallelism in Algorithms and Architectures10.1145/3323165.3323186(179-189)Online publication date: 17-Jun-2019
    • (2018)Adaptive wireless communications under competition and jamming in energy constrained networksWireless Networks10.1007/s11276-016-1324-x24:1(151-171)Online publication date: 1-Jan-2018
    • (2018)A resource-competitive jamming defenseDistributed Computing10.1007/s00446-017-0313-331:6(419-439)Online publication date: 1-Nov-2018
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media