Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - Impact of simple cheating in application-level multicast.
AU - Mathy, Laurent M. J.
AU - Blundell, Nick
AU - Roca, Vincent
AU - El-Sayed, Ayman
N1 - This paper presents the first quantitative study of the impact of cheating on the structure of application-level multicast trees. Our research shows that in all cases, ALM protocols are very susceptible to structural attacks, with trees quickly exhibiting performance that is worse than if they had been randomly constructed. The evidence, as published work, is that this paper has triggered further research in the community, being the motivational basis of part of the work of Mike Afergan (PhD at MIT and Akamai CTO, USA), Dan Li (Tsinghua University, China) and Jiangchuan Liu (Simon Fraser University, Canada). Acceptance rate = 18%. RAE_import_type : Conference contribution RAE_uoa_type : Computer Science and Informatics
PY - 2004/3/7
Y1 - 2004/3/7
N2 - We study the impact of cheating nodes in application-level multicast overlay trees. We focus on selfish nodes acting independently, cheating about their distance measurements during the control phase building or maintaining the tree. More precisely, we study, through simulations, the impact of simple cheating strategies in four protocols, representatives of different application-level multicast protocol "families": HBM (a protocol based on a centralized approach), TBCP (a distributed, tree first protocol), NICE (a distributed, tree first protocol based on clustering) and NARADA (a mesh first protocol). We evaluate the impact of cheats on the performance of the overlay trees as perceived by their nodes and the underlying network.
AB - We study the impact of cheating nodes in application-level multicast overlay trees. We focus on selfish nodes acting independently, cheating about their distance measurements during the control phase building or maintaining the tree. More precisely, we study, through simulations, the impact of simple cheating strategies in four protocols, representatives of different application-level multicast protocol "families": HBM (a protocol based on a centralized approach), TBCP (a distributed, tree first protocol), NICE (a distributed, tree first protocol based on clustering) and NARADA (a mesh first protocol). We evaluate the impact of cheats on the performance of the overlay trees as perceived by their nodes and the underlying network.
U2 - 10.1109/INFCOM.2004.1357017
DO - 10.1109/INFCOM.2004.1357017
M3 - Conference contribution/Paper
SP - 1318
EP - 1328
BT - INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies
T2 - INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies
Y2 - 7 March 2004 through 11 March 2004
ER -