TY - GEN
T1 - Secure Embedding of Rooted Spanning Trees for Scalable Routing in Topology-Restricted Networks
AU - Byrenheid, Martin
AU - Strufe, Thorsten
AU - Roos, Stefanie
PY - 2020
Y1 - 2020
N2 - Greedy embeddings on rooted spanning trees are the most promising solution to provide sufficiently scalable routing in dynamic networks with restricted topologies, for instance friend-to-friend overlays such as the Dark Freenet and payment channel networks such as Lightning. Yet, they are not deployed in practice, as electing a root and configuring addresses remains an unsolved problem in adverse environments. Indeed, faulty or malicious nodes might provide incorrect coordinates, prevent the network from stabilizing by simulating dynamics, or not start the assignment of coordinates in their subtree at all. All of the above attacks may result in an inability to route. To mitigate the above attacks, we design a novel embedding algorithm with an adapted distance metric that only relies on interconnections between benign subtrees for successful delivery. In other words, even if roots of (sub-)trees are malicious or faulty, the remaining nodes still receive coordinates and can communicate with nodes in their tree branch as well as other branches reachable via the neighborhood of their benign ancestors. Extensive simulations demonstrate that we thus facilitate efficient routing even when seemingly decisive parts of the network are under adversarial control.
AB - Greedy embeddings on rooted spanning trees are the most promising solution to provide sufficiently scalable routing in dynamic networks with restricted topologies, for instance friend-to-friend overlays such as the Dark Freenet and payment channel networks such as Lightning. Yet, they are not deployed in practice, as electing a root and configuring addresses remains an unsolved problem in adverse environments. Indeed, faulty or malicious nodes might provide incorrect coordinates, prevent the network from stabilizing by simulating dynamics, or not start the assignment of coordinates in their subtree at all. All of the above attacks may result in an inability to route. To mitigate the above attacks, we design a novel embedding algorithm with an adapted distance metric that only relies on interconnections between benign subtrees for successful delivery. In other words, even if roots of (sub-)trees are malicious or faulty, the remaining nodes still receive coordinates and can communicate with nodes in their tree branch as well as other branches reachable via the neighborhood of their benign ancestors. Extensive simulations demonstrate that we thus facilitate efficient routing even when seemingly decisive parts of the network are under adversarial control.
UR - http://www.scopus.com/inward/record.url?scp=85097759201&partnerID=8YFLogxK
U2 - 10.1109/SRDS51746.2020.00025
DO - 10.1109/SRDS51746.2020.00025
M3 - Conference contribution
SN - 978-1-7281-7627-7
T3 - Proceedings of the IEEE Symposium on Reliable Distributed Systems
SP - 175
EP - 184
BT - Proceedings - 2020 International Symposium on Reliable Distributed Systems, SRDS 2020
A2 - Ceballos, C.
PB - IEEE
CY - Piscataway
T2 - 2020 International Symposium on Reliable Distributed Systems (SRDS)
Y2 - 21 September 2020 through 24 September 2020
ER -