Improvements To The Secure Construction And Utilization Of Greedy Embeddings In Friend-To-Friend Overlays

Journal Article (2021)
Author(s)

Martin Byrenheid (Technische Universität Dresden)

S. Roos (TU Delft - Data-Intensive Systems)

Thorsten Strufe (Karlsruhe Institut für Technologie)

Research Group
Data-Intensive Systems
Copyright
© 2021 Martin Byrenheid, S. Roos, Thorsten Strufe
DOI related publication
https://doi.org/10.14279/tuj.eceasst.80.1155
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 Martin Byrenheid, S. Roos, Thorsten Strufe
Research Group
Data-Intensive Systems
Volume number
80
Pages (from-to)
1-4
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Routing based on greedy network embeddings enables efficient and privacypreserving routing in overlays where connectivity is restricted to mutually trusted nodes. In previous works, we proposed security enhancements to the embedding and routing procedures to protect against denial-of-service attacks by malicious overlay participants. In this work, we propose an improved timeout scheme to reduce the stabilization overhead of secure tree maintenance in response to node failures and malicious behavior. Furthermore, we present an attack-resistant packet replication scheme that leverages alternative paths discovered during routing

Files

1155_3542_1_PB.pdf
(pdf | 0.312 Mb)
License info not available