Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays

Authors

  • Martin Byrenheid TU Dresden
  • Stefanie Roos TU Delft
  • Thorsten Strufe Karlsruher Institut für Technologie

DOI:

https://doi.org/10.14279/tuj.eceasst.80.1155

Abstract

Routing based on greedy network embeddings enables efficient and privacy-preserving routing in overlays where connectivity is restricted to mutually trusted nodes. In previous works, we proposed security enhancements to the embedding and routing procedures to protect against denial-of-service attacks by malicious overlay participants. In this work, we propose an improved timeout scheme to reduce the stabilization overhead of secure tree maintenance in response to node failures and malicious behavior. Furthermore, we present an attack-resistant packet replication scheme that leverages alternative paths discovered during routing.

Downloads

Published

2021-09-08

How to Cite

[1]
M. Byrenheid, S. Roos, and T. Strufe, “Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays”, eceasst, vol. 80, Sep. 2021.