Attack-resistant Spanning Tree Construction in Route-Restricted Overlay Networks

Conference Paper (2019)
Author(s)

Martin Byrenheid (Technische Universität Dresden)

Stefanie Roos (TU Delft - Data-Intensive Systems)

Thorsten Strufe (Technische Universität Dresden)

Research Group
Data-Intensive Systems
Copyright
© 2019 Martin Byrenheid, S. Roos, Thorsten Strufe
DOI related publication
https://doi.org/10.1109/SRDS47363.2019.00035
More Info
expand_more
Publication Year
2019
Language
English
Copyright
© 2019 Martin Byrenheid, S. Roos, Thorsten Strufe
Research Group
Data-Intensive Systems
Pages (from-to)
251-260
ISBN (print)
978-1-7281-4223-4
ISBN (electronic)
['0769567118', '9781728142227']
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Nodes in route-restricted overlays have an im-mutable set of neighbors, explicitly specified by their users. Pop-ular examples include payment networks such as the Lightningnetwork as well as social overlays such as the Dark Freenet.Routing algorithms are central to such overlays as they enablecommunication between nodes that are not directly connected.Recent results show that algorithms based on spanning treesare the most promising provably efficient choice. However, allsuggested solutions fail to address how distributed spanning treealgorithms can deal with active denial of service attacks bymalicious nodes.In this work, we design a novel self-stabilizing spanning treeconstruction algorithm that utilizes cryptographic signatures andprove that it reduces the set of nodes affected by active attacks.Our simulations substantiate this theoretical result withconcretevalues based on real-world data sets. In particular, our resultsindicate that our algorithm reduces the number of affectednodes by up to 74% compared to state-of-the-art attack-resistantspanning tree constructions

Files

Attack_resistant.pdf
(pdf | 0.376 Mb)
License info not available