What's inside a node? Malicious IPFS nodes under the magnifying glass.
Christos KarapapasGeorge C. PolyzosConstantinos PatsakisPublished in: CoRR (2023)
Keyphrases
- malicious nodes
- graph structure
- directed graph
- neighboring nodes
- root node
- intermediate nodes
- wireless sensor networks
- network nodes
- node selection
- shortest distance
- malicious behavior
- hidden nodes
- destination node
- shortest path
- tree nodes
- node failures
- leaf nodes
- mobile nodes
- centrality measures
- topology control
- overlapping communities
- malicious attacks
- parent child
- path length
- undirected graph
- malicious users
- finding the shortest path
- nodes of a graph
- source node
- sink node
- black hole
- betweenness centrality
- routing protocol
- search tree
- ad hoc networks
- graphical models
- spectrum sensing
- decision trees
- strongly connected
- edge weights
- spanning tree
- sensor nodes