Fireflies

  • Johansen H
  • Renesse R
  • Vigfusson Y
  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.

Abstract

An attacker who controls a computer in an overlay network can effectively control the entire overlay network if the mechanism managing membership information can successfully be targeted. This article describes Fireflies, an overlay network protocol that fights such attacks by organizing members in a verifiable pseudorandom structure so that an intruder cannot incorrectly modify the membership views of correct members. Fireflies provides each member with a view of the entire membership, and supports networks with moderate total churn. We evaluate Fireflies using both simulations and PlanetLab to show that Fireflies is a practical approach for secure membership maintenance in such networks.

Cite

CITATION STYLE

APA

Johansen, H. D., Renesse, R. V., Vigfusson, Y., & Johansen, D. (2015). Fireflies. ACM Transactions on Computer Systems, 33(2), 1–32. https://doi.org/10.1145/2701418

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free