@inproceedings{a19a303249a949dd8d5f1d9a4c7f5db8,
title = "Hop chains: Secure routing and the establishment of distinct identities",
abstract = "We present a secure routing protocol that is immune to Sybil attacks, and that can tolerate initial collusion of Byzantine routers, or runtime collusion of non-adjacent Byzantine routers in the absence of collusion between adjacent routers. For these settings, the calculated distance from a destination to a node is not smaller than the actual shortest distance from the destination to the node. The protocol can also tolerate initial collusion of Byzantine routers and runtime collusion of adjacent Byzantine routers but in the absence of runtime collusion between non-adjacent routers. For this setting, there is a bound on how short the calculated distance is compared to the actual shortest distance. The protocol makes very weak timing assumptions and requires synchronization only between neighbors or second neighbors. We propose to use this protocol for secure localization of routers using hop-count distances, which can be then used as a proof of identity of nodes.",
author = "Rida Bazzi and Choi, {Young Ri} and Gouda, {Mohamed G.}",
note = "Copyright: Copyright 2021 Elsevier B.V., All rights reserved.; 10th International Conference on Principles of Distributed Systems, OPODIS 2006 ; Conference date: 12-12-2006 Through 15-12-2006",
year = "2006",
doi = "10.1007/11945529_26",
language = "English (US)",
isbn = "9783540499909",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "365--379",
booktitle = "Principles of Distributed Systems - 10th International Conference, OPODIS 2006, Proceedings",
}