If a node (V) accepts incoming connections, is he vulnerable to becoming completely surrounded by corrupted nodes? Would an attacker be able to control which transactions are relayed to V and which transactions V is able to broadcast to the network?
I assume for this to happen V would have to, over time, lose connections to honest nodes to have them replaced by the attackers'.
If so, in what circumstances would the Bitcoin client lose connection with an honest node, other than it going offline?