DocumentCode :
2530010
Title :
Routing in the Dark: Pitch Black
Author :
Evans, Nathan S. ; GauthierDickey, Chris ; Grothoff, Christian
Author_Institution :
Univ. of Denver, Denver
fYear :
2007
fDate :
10-14 Dec. 2007
Firstpage :
305
Lastpage :
314
Abstract :
In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks have a small-world topology; while short paths exist between any pair of nodes in small-world networks, it is non-trivial to determine such paths with a distributed algorithm. Recently, Clarke and Sandberg proposed the first decentralized routing algorithm that achieves efficient routing in such small-world networks. This paper is the first independent security analysis of Clarke and Sandberg´s routing algorithm. We show that a relatively weak participating adversary can render the overlay ineffective without being detected, resulting in significant data loss due to the resulting load imbalance. We have measured the impact of the attack in a testbed of 800 nodes using minor modifications to Clarke and Sandberg´s implementation of their routing algorithm in Freenet. Our experiments show that the attack is highly effective, allowing a small number of malicious nodes to cause rapid loss of data on the entire network. We also discuss various proposed countermeasures designed to detect, thwart or limit the attack. While we were unable to find effective countermeasures, we hope that the presented analysis will be a first step towards the design of secure distributed routing algorithms for restricted-route topologies.
Keywords :
computer networks; distributed algorithms; telecommunication network routing; telecommunication network topology; telecommunication security; Clarke-Sandberg routing algorithm; decentralized routing algorithm; network security analysis; restricted-route topology; secure distributed routing algorithm; Algorithm design and analysis; Application software; Computer science; Computer security; Network topology; Peer to peer computing; Privacy; Routing protocols; Testing; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual
Conference_Location :
Miami Beach, FL
ISSN :
1063-9527
Print_ISBN :
978-0-7695-3060-4
Type :
conf
DOI :
10.1109/ACSAC.2007.7
Filename :
4412998
Link To Document :
بازگشت