Graph analysis of blockchain p2p overlays and their security implications

A Paphitis, N Kourtellis, M Sirivianos - … on Security and Privacy in Social …, 2023 - Springer
In blockchain systems, similar to any distributed system, the underlying network plays a
crucial role and provides the infrastructure for communication and coordination among the …

Detection and mitigation of the eclipse attack in chord overlays

C Rottondi, A Panzeri, CT Yagne… - International Journal …, 2016 - inderscienceonline.com
Distributed hash table-based overlays are widely used to support efficient information
routing and storage in structured peer-to-peer networks, but they are also subject to …

WhisperChord: Scalable and Secure Node Discovery for Overlay Networks

A Panchenko, A Mitseva… - 2021 IEEE 46th …, 2021 - ieeexplore.ieee.org
Node discovery is a fundamental service for any overlay network, including anonymization
networks. Although anonymization and node discovery are two disjoint services, the node …

Decentralized trusted computing base for blockchain infrastructure security

T Hardjono, N Smith - Frontiers in Blockchain, 2019 - frontiersin.org
There is a growing interest today in blockchain technology as a possible foundation for the
future global financial ecosystem. However, in order for this future financial ecosystem to be …

SEPastry: Security Enhanced Pastry

M Mishra, S Tripathy, S Peri - … of the Second International Conference on …, 2012 - Springer
Pastry is one of the most popular DHT overlay used in various distributed applications,
because of its scalability, efficiency and reliability. On the other hand, Pastry is not resistant …

Availability for DHT-based overlay networks with unidirectional routing

J Seedorf, C Muus - IFIP International Workshop on Information Security …, 2008 - Springer
Abstract Distributed Hash Tables (DHTs) provide a formally defined structure for overlay
networks to store and retrieve content. However, handling malicious nodes which …

[PDF][PDF] Working with the gridkit overlay framework the secure-anthocnet overlay

A Marnerides - 2007 - Citeseer
ABSTRACT Mobile Ad-hoc Networks (MANETs) compose one of the most challenging and
significant area in the networking research scope. Their unpredictable behavior in manners …

Overall Network and Service Architecture

M Toy, A Toy - Future Networks, Services and Management: Underlay …, 2021 - Springer
The current Internet derives mainly from the 1980s and soon after. Among the key objectives
were best effort connectivity and simplicity along with the ability to survive some level of link …

[引用][C] Overlay networking: applications and research challenges.

JX Lu, XM Shan, Y Ren - Tongxin Xuebao(Journal of China Institute of …, 2004

Secure overlay network design

L Li, M Mahdian, VS Mirrokni - … Conference, AAIM 2006, Hong Kong, China …, 2006 - Springer
Due to the increasing security threats in the Internet, new overlay network architectures have
been proposed to secure privileged services. In these architectures, the application servers …