Analysis of the data flow in the newscast protocol for possible vulnerabilities

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Newscast is a model for information dissemination and membership management in large-scale, agent-based distributed systems. It deploys a simple, peer-to-peer data exchange protocol. The Newscast protocol forms an overlay network and keeps it connected by means of an epidemic algorithm, thus featuring a complex, spatially structured, and dynamically changing environment. It has recently become very popular due to its inherent resilience to node volatility as it exhibits strong self-healing properties. In this paper, we analyze the robustness of the data flow within the Newscast model against a set of vulnerabilities that have not been taken into account in previous analysis. In particular, we perform an attack based on a cache content corruption which is able to defeat the protocol by breaking the network connectivity. Concrete experiments are performed using a framework that implements both the protocol and the corruption model considered in this work. © Springer-Verlag Berlin Heidelberg 2014.

Author supplied keywords

Cite

CITATION STYLE

APA

Muszyński, J., Varrette, S., Laredo, J. L. J., & Bouvry, P. (2014). Analysis of the data flow in the newscast protocol for possible vulnerabilities. In Communications in Computer and Information Science (Vol. 448 CCIS, pp. 89–99). Springer Verlag. https://doi.org/10.1007/978-3-662-44893-9_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free