Veracity: a fully decentralized service for securing network coordinate systems
نویسندگان
چکیده
Decentralized logical coordinate systems have been proposed as a means of estimating network distances. These systems have widespread usage in p2p networks, ranging from neighbor selection to replica placement. Unfortunately, these systems are vulnerable to even a small number of malicious nodes lying about their coordinates or measurements. In this paper, we introduce Veracity, a fully decentralized service for securing network coordinate systems. Unlike prior proposals, Veracity requires neither the presence of a large number of a priori trusted nodes nor the use of network triangle inequality testing. Veracity utilizes a vote-based approach, where all advertised coordinates are independently verified by a minimal set of nodes before being used. Via detailed simulations in p2psim, we demonstrate that Veracity mitigates a variety of known attacks against Vivaldi for moderate sizes of malicious nodes, incurring acceptable communication overhead, and in some cases, even reducing the convergence time of the coordi-
منابع مشابه
Veracity: A Fully Decentralized Secure Network Coordinate Service
Decentralized network coordinate systems have been proposed as a means of efficiently estimating network distances among end-hosts over the Internet without having to contact them directly. These systems support a wide range of network services, including proximity-based routing, neighbor selection in overlays, and replica placement in content-distribution networks. Unfortunately, these systems...
متن کاملVeracity: Practical Secure Network Coordinates via Vote-based Agreements
Decentralized network coordinate systems promise efficient network distance estimates across Internet endhosts. These systems support a wide range of network services, including proximity-based routing, neighbor selection in overlays, network-aware overlays, and replica placement in content-distribution networks. This paper describes Veracity, a practical fullydecentralized service for securing...
متن کاملVeracity, Plausibility, and Reputation
The canonical IT security properties are geared towards infrastructure security. The task of an infrastructure security service is completed once data has been delivered to the application. When false data is submitted to the infrastructure, false data will be delivered securely. To secure an application, one thus may have to go beyond securing the infrastructure and in addition provide mechani...
متن کاملA Decentralized Network Coordinate System for Robust Internet Distance Prediction
Network coordinate systems have recently been developed as a scalable mechanism to predict latencies among arbitrary Internet hosts. Our research addresses several design challenges of a large-scale decentralized network coordinate system that were not fully addressed in prior work. In particular, we examine the design issues of a decentralized network coordinate system operating in a peer-to-p...
متن کاملA two-level discount model for coordinating a decentralized supply chain considering stochastic price-sensitive demand
In this paper, a discount model is proposed to coordinate pricing and ordering decisions in a two-echelon supply chain (SC). Demand is stochastic and price sensitive while lead times are fixed. Decentralized decision making where downstream decides on selling price and order size is investigated. Then, joint pricing and ordering decisions are extracted where both members act as a single entity ...
متن کامل