Download now Free registration required
Clear evidence indicates the existence of compromised routers in ISP and enterprise networks. Fault Localization (FL) protocols enable a network to localize specific links of compromised routers sabotaging network data delivery and are recognized as an essential means to enhancing network availability in the face of targeted attacks. However, theoretically proven lower bounds have shown that secure FL protocols in the current network infrastructure inevitably incur prohibitive overhead. The authors observe the current limits are due to a lack of trust relationships among network nodes.
- Format: PDF
- Size: 296 KB