Back to Search Start Over

Attacks against Network Coordinate System: Vulnerable PIC

Authors :
Xing Li
Beixing Deng
Yang Chen
Xiaohan Zhao
Xiaoxiao Song
Xiao Wang
Source :
International Symposium on Computer Science and its Applications.
Publication Year :
2008
Publisher :
IEEE, 2008.

Abstract

In recent years, network coordinate systems which map nodes into a geometrical space can effectively support overlay applications relying on topology-awareness. However, these systems base on an ideal assumption that the nodes in them are honest to cooperate with each other. Although there have been some studies about attacks on network coordinate systems, the effect of attacks on PIC---one of the representative systems---has not been studied. Moreover, since PIC itself has proposed a security policy, how well it can protect PIC from attacks is another significant problem to be researched. We apply four typical attacks on PIC with security and without security. Our extensive experiments show that PIC is vulnerable by attacks and when the percentage of malicious nodes is more than 40%, PIC with security performs barely better than without security.

Details

Database :
OpenAIRE
Journal :
International Symposium on Computer Science and its Applications
Accession number :
edsair.doi...........320a7d22b4930bd5981b1bffc51e3744
Full Text :
https://doi.org/10.1109/csa.2008.64