Covert Cycle Stealing in a Single FIFO Server

03/11/2020
by   Bo Jiang, et al.
0

Consider a setting where Willie generates a Poisson stream of jobs and routes them to a single server that follows the first-in first-out discipline. Suppose there is an adversary Alice, who desires to receive service without being detected. We ask the question: what is the amount of service that she can receive covertly, i.e. without being detected by Willie? In the case where both Willie and Alice jobs have exponential service times with respective rates μ_1 and μ_2, we demonstrate a phase-transition when Alice adopts the strategy of inserting a single job probabilistically when the server idles : over n busy periods, she can achieve a covert throughput of 𝒪(√(n)) when μ_1 < 2μ_2, 𝒪(√(n/log n)) when μ_1 = 2μ_2, and 𝒪(n^μ_2/μ_1) when μ_1 > 2μ_2. When both Willie and Alice jobs have general service times we establish an upper bound for the amount of service Alice can get covertly. This bound is related to the Fisher information. Additional upper bounds are obtained for more general insertion policies.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/13/2021

Covert queueing problem with a Markovian statistic

Based on the covert communication framework, we consider a covert queuei...
research
04/20/2023

Poly-Exp Bounds in Tandem Queues

When the arrival processes are Poisson, queueing networks are well-under...
research
05/31/2018

Age of Information in G/G/1/1 Systems

We consider a single server communication setting where the interarrival...
research
04/09/2022

Learning to Dispatch Multi-Server Jobs in Bipartite Graphs with Unknown Service Rates

Multi-server jobs are imperative in modern cloud computing systems. A mu...
research
05/25/2018

Nonparametric estimation of service time characteristics in infinite-server queues with nonstationary Poisson input

This paper provides a mathematical framework for estimation of the servi...
research
10/05/2016

10-millisecond Computing

Despite computation becomes much complex on data with an unprecedented s...
research
05/31/2019

Age of Information in G/G/1/1 Systems: Age Expressions, Bounds, Special Cases, and Optimization

We consider the age of information in G/G/1/1 systems under two service ...

Please sign up or login with your details

Forgot password? Click here to reset