• DocumentCode
    3139008
  • Title

    Attacks against Network Coordinate System: Vulnerable PIC

  • Author

    Zhao, Xiaohan ; Song, Xiaoxiao ; Wang, Xiao ; Chen, Yang ; Deng, Beixing ; Li, Xing

  • Author_Institution
    Dept. of Electron. Eng., Tsinghua Univ., Beijing
  • fYear
    2008
  • fDate
    13-15 Oct. 2008
  • Firstpage
    251
  • Lastpage
    256
  • Abstract
    In recent years, network coordinate systems which map nodes into a geometrical space can effectively support overlay applications relying on topology-awareness. However, these systems base on an ideal assumption that the nodes in them are honest to cooperate with each other. Although there have been some studies about attacks on network coordinate systems, the effect of attacks on PIC---one of the representative systems---has not been studied. Moreover, since PIC itself has proposed a security policy, how well it can protect PIC from attacks is another significant problem to be researched. We apply four typical attacks on PIC with security and without security. Our extensive experiments show that PIC is vulnerable by attacks and when the percentage of malicious nodes is more than 40%, PIC with security performs barely better than without security.
  • Keywords
    security of data; geometrical space; malicious nodes; network coordinate system; security policy; topology-awareness; vulnerable PIC; Application software; Computer science; Coordinate measuring machines; Delay estimation; Economic indicators; Information science; Laboratories; Protection; Security; Space technology; Network Coordinate; PIC; attack;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and its Applications, 2008. CSA '08. International Symposium on
  • Conference_Location
    Hobart, ACT
  • Print_ISBN
    978-0-7695-3428-2
  • Type

    conf

  • DOI
    10.1109/CSA.2008.64
  • Filename
    4654096