Basalt: A Rock-Solid Byzantine-Tolerant Peer Sampling for Very Large Decentralized Networks
Abstract
References
Index Terms
- Basalt: A Rock-Solid Byzantine-Tolerant Peer Sampling for Very Large Decentralized Networks
Recommendations
Secure Peer Sampling Service: The Mosquito Attack
WETICE '09: Proceedings of the 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative EnterprisesPeer sampling -- the capability of obtaining a random sample from a large population of peers -- is a basic building block for the gossip paradigm. Current peer sampling services have been designed for ''first-class'' citizens of the Internet: peers ...
Detection and mitigation of the eclipse attack in chord overlays
Distributed hash table-based overlays are widely used to support efficient information routing and storage in structured peer-to-peer networks, but they are also subject to numerous attacks aimed at disrupting their correct functioning. In this paper, ...
NAT-resilient Gossip Peer Sampling
ICDCS '09: Proceedings of the 2009 29th IEEE International Conference on Distributed Computing SystemsGossip peer sampling protocols now represent a solid basis to build and maintain peer to peer (p2p) overlay networks. They provide peers with a random sample of the network and maintain connectivity in highly dynamic settings. They rely on the ...
Comments
Information & Contributors
Information
Published In
Sponsors
In-Cooperation
- IFIP: International Federation for Information Processing
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Funding Sources
- CominLabs
- Agence Nationale de la Recherche
- Région Bretagne
Conference
Acceptance Rates
Upcoming Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 78Total Downloads
- Downloads (Last 12 months)78
- Downloads (Last 6 weeks)11
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in