Download Now Free registration required
While mesh-based approaches have emerged as the dominant architecture for P2P streaming, the performance of these approaches under malicious participants has received little attention. In this paper, the authors provide taxonomy of the implicit commitments made by nodes when peering with others. They show that when these commitments are not enforced explicitly, they can be exploited by malicious nodes to conduct attacks that degrade the data delivery service. They consider mesh-based specific P2P attacks where malicious nodes deliberately become neighbors of a large number of nodes and do not upload data to them, or malicious nodes deliberately delay packets till they are not useful anymore for the application.
- Format: PDF
- Size: 279.7 KB