Improvements To The Secure Construction And Utilization Of Greedy Embeddings In Friend-To-Friend Overlays

Martin Byrenheid, Stefanie Roos, Thorsten Strufe

Research output: Contribution to journalArticleScientificpeer-review

10 Downloads (Pure)

Abstract

Routing based on greedy network embeddings enables efficient and privacypreserving routing in overlays where connectivity is restricted to mutually trusted nodes. In previous works, we proposed security enhancements to the embedding and routing procedures to protect against denial-of-service attacks by malicious overlay participants. In this work, we propose an improved timeout scheme to reduce the stabilization overhead of secure tree maintenance in response to node failures and malicious behavior. Furthermore, we present an attack-resistant packet replication scheme that leverages alternative paths discovered during routing

Original languageEnglish
Pages (from-to)1-4
Number of pages4
JournalElectronic Communications of the EASST
Volume80
DOIs
Publication statusPublished - 2021

Keywords

  • Friend-to-Friend Overlay
  • Network Embedding
  • Secure Routing

Fingerprint

Dive into the research topics of 'Improvements To The Secure Construction And Utilization Of Greedy Embeddings In Friend-To-Friend Overlays'. Together they form a unique fingerprint.

Cite this