DocumentCode
3139008
Title
Attacks against Network Coordinate System: Vulnerable PIC
Author
Zhao, Xiaohan ; Song, Xiaoxiao ; Wang, Xiao ; Chen, Yang ; Deng, Beixing ; Li, Xing
Author_Institution
Dept. of Electron. Eng., Tsinghua Univ., Beijing
fYear
2008
fDate
13-15 Oct. 2008
Firstpage
251
Lastpage
256
Abstract
In recent years, network coordinate systems which map nodes into a geometrical space can effectively support overlay applications relying on topology-awareness. However, these systems base on an ideal assumption that the nodes in them are honest to cooperate with each other. Although there have been some studies about attacks on network coordinate systems, the effect of attacks on PIC---one of the representative systems---has not been studied. Moreover, since PIC itself has proposed a security policy, how well it can protect PIC from attacks is another significant problem to be researched. We apply four typical attacks on PIC with security and without security. Our extensive experiments show that PIC is vulnerable by attacks and when the percentage of malicious nodes is more than 40%, PIC with security performs barely better than without security.
Keywords
security of data; geometrical space; malicious nodes; network coordinate system; security policy; topology-awareness; vulnerable PIC; Application software; Computer science; Coordinate measuring machines; Delay estimation; Economic indicators; Information science; Laboratories; Protection; Security; Space technology; Network Coordinate; PIC; attack;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and its Applications, 2008. CSA '08. International Symposium on
Conference_Location
Hobart, ACT
Print_ISBN
978-0-7695-3428-2
Type
conf
DOI
10.1109/CSA.2008.64
Filename
4654096
Link To Document