[p2p-hackers] Overlay attacks

Thorsten Strufe thorsten.strufe at tu-ilmenau.de
Mon Mar 13 15:23:40 UTC 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Stuart,

the PIC-Paper [1] has quite some stuff on destructive node-behaviour in
systems with synthetic coordinates.


HTH,

Thorsten

[1]
@inproceedings{ costa04pic,
  author = {M. Costa and M. Castro and A. Rowstron and P. Key},
  title = {{PIC: Practical Internet coordinates for distance  estimation}},
  booktitle = {Proceedings of ICDCS},
  year = {2004},
  month = {March}
}
URL: http://www.cl.cam.ac.uk/Teaching/2003/AdvSysTop/pic.pdf

steve clausensaun schrieb:
> Hi all,
>  
> I' m doing some experiments on a few overlays. Basically, I'm trying to
> see the effect of nodes' misbehavior in landmark-based positionning
> networks such as GNP or NPS.
> Is there any litterature or useful links to know?
> Have you some ideas on behaviors that should be studied?
- --8<---
- --
Dipl.-Inf. Thorsten Strufe         +49(0)3677-694552, CC 440
Fachgebiet Telematik               Institut Praktische Informatik	
Technische Universität Ilmenau     http://www-ia.tu-ilmenau.de/IPI/FGT
Sartre:Begehe keine Dummheit zweimal, die Auswahl ist doch groß genug!
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEFY58OQ9e8ojbqFYRAhKzAJ9vJzw0iSI1RxaUNT3Oru+bIbxRaACfTZSY
t0+IHP4Lxnay+NRYVMz6n/Y=
=V+H4
-----END PGP SIGNATURE-----



More information about the P2p-hackers mailing list