Accéder directement au contenu Accéder directement à la navigation
Pré-publication, Document de travail

Covert Cycle Stealing in a Single FIFO Server (extended version)

Abstract : Consider a setting where Willie generates a Poisson stream of jobs and routes them to a single server that follows the first-in first-out discipline. Suppose there is an adversary Alice, who desires to receive service without being detected. We ask the question: what is the amount of service that she can receive covertly, i.e. without being detected by Willie? In the case where both Willie and Alice jobs have exponential service times with respective rates µ 1 and µ 2 , we demonstrate a phase-transition when Alice adopts the strategy of inserting a single job probabilistically when the server idles : over n busy periods, she can achieve a covert throughput of O(√ n) when µ 1 < 2µ 2 , O(n/ log n) when µ 1 = 2µ 2 , and O(n µ2/µ1) when µ 1 > 2µ 2. When both Willie and Alice jobs have general service times we establish an upper bound for the amount of service Alice can get covertly. This bound is related to the Fisher information. Additional upper bounds are obtained for more general insertion policies.
Type de document :
Pré-publication, Document de travail
Liste complète des métadonnées

Littérature citée [19 références]  Voir  Masquer  Télécharger
Contributeur : Philippe Nain <>
Soumis le : mardi 3 mars 2020 - 17:11:57
Dernière modification le : lundi 29 mars 2021 - 14:46:58
Archivage à long terme le : : jeudi 4 juin 2020 - 16:51:17


Fichiers produits par l'(les) auteur(s)


  • HAL Id : hal-02497557, version 1


Bo Jiang, Philippe Nain, Don Towsley. Covert Cycle Stealing in a Single FIFO Server (extended version). 2020. ⟨hal-02497557v1⟩



Consultations de la notice


Téléchargements de fichiers