2010 IEEE 18th International Workshop on Quality of Service (IWQoS) 2010
DOI: 10.1109/iwqos.2010.5542735
|View full text |Cite
|
Sign up to set email alerts
|

SPoIM: A close look at pollution attacks in P2P live streaming

Abstract: Peer-to-Peer (P2P) live streaming traffic has been growing at a phenomenal rate over the past few years. When the original streaming content is mixed with bogus data, the corresponding P2P streaming network is being subjected to a "pollution attack." As the content is shared by peers, the bogus data can be spread widely in minutes. In this paper, we study the impact of a pollution attack in popular streaming models, under various network settings and configurations. The study was conducted in SPoIM, our emulat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
8
1
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 14 publications
1
8
1
1
Order By: Relevance
“…In order to avoid high overhead of signing each packet with traditional asymmetric cryptographic protocol, Haridasan and van Renesse [32] grouped the hashes of a couple of packets into a special message, and have it signed by the source. However, Lin et al [33] believed that reputation system was a better solution than a cryptographic approach, which imposed significantly less computational and communication overhead. Regarding the communication overhead introduced by the hash values and the computational overhead imposed by the verification algorithm, Wang et al [34] designed a light‐weight non‐repudiation transmission protocol based on efficient one‐way hash function.…”
Section: Related Workmentioning
confidence: 99%
“…In order to avoid high overhead of signing each packet with traditional asymmetric cryptographic protocol, Haridasan and van Renesse [32] grouped the hashes of a couple of packets into a special message, and have it signed by the source. However, Lin et al [33] believed that reputation system was a better solution than a cryptographic approach, which imposed significantly less computational and communication overhead. Regarding the communication overhead introduced by the hash values and the computational overhead imposed by the verification algorithm, Wang et al [34] designed a light‐weight non‐repudiation transmission protocol based on efficient one‐way hash function.…”
Section: Related Workmentioning
confidence: 99%
“…In Lin et al [2010] it is shown that a limited number of polluters can easily deteriorate the quality of a streaming application; a preliminary analysis of the possible defense mechanisms, whether based on cryptographic tools or reputation-based approaches, is presented in Lin et al [2010], as well. As opposed to our work in Lin et al [2010], a pull-based P2P streaming system without coding is used and the focus is more on the analysis of the effects of pollution in P2P streaming, whereas known techniques are evaluated as possible defenses.…”
Section: Related Workmentioning
confidence: 99%
“…The authors conclude that the use of Merkle trees is one of the most efficient in terms of computational overhead. More recently, the authors of [18] have evaluated the impact of pollution attacks, and they show that the impact of an attack is not directly related to the network size, but is strongly depend on the network stability and on the bandwidth available by the malicious peers and by the source.…”
Section: Related Workmentioning
confidence: 99%
“…Peer-to-peer (P2P) live streaming video transmissions are becoming increasing popular in the Internet [18]. Several systems that implement video live streaming in P2P networks have appeared in last years, for instance PPLive 1 , SopCast 2 , and PPStream 3 .…”
Section: Introductionmentioning
confidence: 99%