Title :
Attacks against Network Coordinate System: Vulnerable PIC
Author :
Zhao, Xiaohan ; Song, Xiaoxiao ; Wang, Xiao ; Chen, Yang ; Deng, Beixing ; Li, Xing
Author_Institution :
Dept. of Electron. Eng., Tsinghua Univ., Beijing
Abstract :
In recent years, network coordinate systems which map nodes into a geometrical space can effectively support overlay applications relying on topology-awareness. However, these systems base on an ideal assumption that the nodes in them are honest to cooperate with each other. Although there have been some studies about attacks on network coordinate systems, the effect of attacks on PIC---one of the representative systems---has not been studied. Moreover, since PIC itself has proposed a security policy, how well it can protect PIC from attacks is another significant problem to be researched. We apply four typical attacks on PIC with security and without security. Our extensive experiments show that PIC is vulnerable by attacks and when the percentage of malicious nodes is more than 40%, PIC with security performs barely better than without security.
Keywords :
security of data; geometrical space; malicious nodes; network coordinate system; security policy; topology-awareness; vulnerable PIC; Application software; Computer science; Coordinate measuring machines; Delay estimation; Economic indicators; Information science; Laboratories; Protection; Security; Space technology; Network Coordinate; PIC; attack;
Conference_Titel :
Computer Science and its Applications, 2008. CSA '08. International Symposium on
Conference_Location :
Hobart, ACT
Print_ISBN :
978-0-7695-3428-2
DOI :
10.1109/CSA.2008.64