
as a cryptographically secure proof of appropriate network
performance.
In this paper, we focus on measuring a specific network per-
formance parameter which is of central importance in decen-
tralized wireless network deployments. In such deployments,
users are required to get a broadband connection with appro-
priate bandwidth, as a backhaul for the wireless access point.
But how do we know that the user has indeed set up a good
backhaul connection? Can we simply use any of the existing
techniques from the large body of literature, spanning over
decades, on bottleneck link-throughput measurement? It turns
out none of the existing tools is applicable for our setting;
below we point out shortcomings of prominent techniques
and clarify our contributions.
Comparison with speedtest.
Speedtest (
speedtest.net
) is
a state-of-the-art bandwidth testing tool widely used globally.
Whenever a user (the “prover") sends a measurement request,
a nearby server is selected from a centralized challenger server
pool. The selected server generates traffic continuously until
the target link is saturated. This requires the challenger server
to have a high bandwidth, low latency, low packet loss link
to the prover; this represents a high barrier to becoming a
challenger. Furthermore, the measurements rely on the rates
of sending packets from challengers and acknowledgements
from the prover – an untrustworthy prover or challenger can
adversely impact the measurement. Speedtest and similar
architectures are unsuited for trustfree network telemetry.
Traffic aggregation.
One way to allow more challengers to
participate in the telemetry (and thus being more open) is to
aggregate traffic from multiple challengers. Such aggregation
removes the requirement of high capacity for a single server to
measure high-bandwidth links, by uniting a group of servers to
generate sufficient traffic in parallel. While this technique can
improve the accuracy (e.g., recent works [3,4,49]), the method
is not trustfree: a Byzantine prover can readily manipulate the
measurement results with no check or balance.
Interactive Measurement.
To eliminate the need of trust on
the prover, challengers should interact with other parties in
the network to generate measurements. Popular interactive
telemetry tools such as traceroute [22] and pathchar [21] use
the timing information obtained by combining the Internet
control message protocol’s (ICMP) time-to-live (TTL) and
packet dropped messages to estimate link performance over
the Internet. In particular, challengers estimate the round-trip
time (RTT) to the two end-points of the link to be measured,
the throughput is derived by dividing the packet size by the
difference of RTT
1
. Secure measurement, resistant to collu-
sion between the prover and challengers, is not guaranteed in
these protocols.
Our contributions.
We present the first protocol for mea-
1
The actual protocol is slightly different: packets of different sizes are
transmitted and linear regression is used to aggregate the measurements,
c.f., [15,21].
suring backhaul bandwidth that satisfies the aforementioned
trustfree and open properties, c.f., §3. Broadly, the protocol is
built by implementing the following ideas:
1.
Traffic aggregation. We simultaneously send challenge
traffic from multiple challengers to the prover. The dura-
tion of the challenge is chosen to be sufficiently high to
ensure that traffic from all the challengers queues at the
prover’s backhaul link.
2.
Unforgeable probe. The challengers are selected ran-
domly from a larger pool and each sends digital sig-
natures as traffic, so that no other party can forge the
measurement probe. Furthermore, to limit the influence
of any one challenger, we limit the amount of challenge
traffic that can come from a single challenger.
3.
Short witness. The prover can send a short message to
the challengers to prove that it has received appropriate
amount of data. As will be seen below, our security con-
siderations require us to use a partially verifiable hash.
For this purpose, we use a Merkle tree [36].
4.
Robust timing measurement. We estimate the RTT for the
overall challenge by taking median of the RTT measured
by different challengers.
We implement these steps and experimentally validate the
design choices to identify the best performing configuration;
see Figure 1for a depiction. The main contribution of this
work is the trustfree property of the proposed protocol – it
is secure under a rigorous threat model that we outline in
§4. It is interesting to note that, even ignoring the security
requirements, our proposed protocol is the first one that can
measure bandwidth of hundreds of Mbps without requiring
any specialized server with high throughput and low latency
for challengers. We further extend this protocol to measure
available bandwidth in the presence of cross-traffic, making
it a truly distributed “speedtest.”
.......
Challenger
Prover
Backhaul link
1k ...
1k ...
1k ...
111
Verifier
RTT Measurements Packets Receipt
Figure 1: The multichallenger PoB Protocol.
We analyze the security of our multichallenger PoB proto-
col under a formal threat model which allows any subset of
2