Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays
DOI:
https://doi.org/10.14279/tuj.eceasst.80.1155Abstract
Routing based on greedy network embeddings enables efficient and privacy-preserving routing in overlays where connectivity is restricted to mutually trusted nodes. In previous works, we proposed security enhancements to the embedding and routing procedures to protect against denial-of-service attacks by malicious overlay participants. In this work, we propose an improved timeout scheme to reduce the stabilization overhead of secure tree maintenance in response to node failures and malicious behavior. Furthermore, we present an attack-resistant packet replication scheme that leverages alternative paths discovered during routing.Downloads
Published
2021-09-08
How to Cite
[1]
M. Byrenheid, S. Roos, and T. Strufe, “Improvements to the Secure Construction and Utilization of Greedy Embeddings in Friend-to-Friend Overlays”, eceasst, vol. 80, Sep. 2021.
Issue
Section
Articles
License
Copyright (c) 2021 Electronic Communications of the EASST
This work is licensed under a Creative Commons Attribution 4.0 International License.