Topology Inference of Networks utilizing Rooted Spanning Tree Embeddings

08/09/2021
by   Martin Byrenheid, et al.
0

Due to its high efficiency, routing based on greedy embeddings of rooted spanning trees is a promising approach for dynamic, large-scale networks with restricted topologies. Friend-to-friend (F2F) overlays, one key application of embedding-based routing, aim to prevent disclosure of their participants to malicious members by restricting exchange of messages to mutually trusted nodes. Since embeddings assign a unique integer vector to each node that encodes its position in a spanning tree of the overlay, attackers can infer network structure from knowledge about assigned vectors. As this information can be used to identify participants, an evaluation of the scale of leakage is needed. In this work, we analyze in detail which information malicious participants can infer from knowledge about assigned vectors. Also, we show that by monitoring packet trajectories, malicious participants cannot unambiguously infer links between nodes of unidentified participants. Using simulation, we find that the vector assignment procedure has a strong impact on the feasibility of inference. In F2F overlay networks, using vectors of randomly chosen numbers for routing decreases the mean number of discovered individuals by one order of magnitude compared to the popular approach of using child enumeration indexes as vector elements.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/04/2022

Rainbow spanning trees in randomly coloured G_k-out

Given a graph G=(V,E) on n vertices and an assignment of colours to its ...
research
02/28/2023

Security in Distributed Systems by Verifiable Location-Based Identities

Proof-of-Location (PoL) is a lightweight security concept for Internet-o...
research
01/09/2019

On the Limits of Byzantine-tolerant Spanning Tree Construction in Route-Restricted Overlay Networks

Route-restricted overlays are peer-to-peer networks where each node can ...
research
05/17/2023

Resolving the Decreased Rank Attack in RPL's IoT Networks

The Routing Protocol for Low power and Lossy networks (RPL) has been dev...
research
01/24/2021

Independent Spanning Trees in Eisenstein-Jacobi Networks

Spanning trees are widely used in networks for broadcasting, fault-toler...
research
03/08/2018

Self-healing Routing and Other Problems in Compact Memory

This paper looks at the question of designing distributed algorithms for...
research
04/25/2019

Genet: A Quickly Scalable Fat-Tree Overlay for Personal Volunteer Computing using WebRTC

WebRTC enables browsers to exchange data directly but the number of poss...

Please sign up or login with your details

Forgot password? Click here to reset