RIAPPA: a Robust Identity Assignment Protocol for P2P overlays

被引:1
|
作者
Caubet, Juan [1 ]
Esparza, Oscar [1 ]
Munoz, Jose L. [1 ]
Alins, Juanjo [1 ]
Mata-Diaz, Jorge [1 ]
机构
[1] Univ Politecn Cataluna, Dept Telemat Engn ENTEL, ES-08034 Barcelona, Spain
关键词
P2P overlay; DHT; Sybil attack; eclipse attack; identity assignment; ECLIPSE ATTACKS; SYBIL ATTACKS; KADEMLIA; DEFENSE; TRUST; CHORD;
D O I
10.1002/sec.956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks for years. Most prior work in security services was focused on trust and reputation systems, anonymity, and secure routing. However, the proper management of identities in overlays is an important prerequisite to provide most of these security services. In this paper, we propose a protocol to control the access to a P2P overlay and to assign identities in a secure way; all this preserving the anonymity of users. This protocol involves two trusted third parties (TTPs), thanks to which it is possible to preserve the users' anonymity within the network without losing traceability. Users are authenticated by a TTP using real-world digital certificates, they select their network identifier jointly with the other TTP, and finally, the two TTPs issue the internal certificate to them. The protocol also provides revocability and protection against Sybil attacks, Eclipse attacks, whitewashers, and so on. A detailed protocol description is presented, and a performance and security analysis of the protocol is also provided. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2743 / 2760
页数:18
相关论文
共 50 条
  • [1] Bootstrapping P2P Overlays in MANETs
    Mawji, Afzal
    Hassanein, Hossam
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [2] Overlays in mobile P2P networks
    Zhang, G.-Y. (zhangguoyin@hrbeu.edu.cn), 1600, Chinese Academy of Sciences (24):
  • [3] Optimising P2P Overlays for Pervasive Environments
    Peng, Fei
    Malatras, Apostolos
    MANAGING THE DYNAMICS OF NETWORKS AND SERVICES, 2011, 6734 : 61 - 64
  • [4] Advanced Multimedia Search in P2P Overlays
    Grega, Michal
    IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS, 2009, : 317 - 318
  • [5] Underlay Aware Resiliency in P2P Overlays
    Kumar, S. D. Madhu
    Bellur, Umesh
    Govindan, V. K.
    DISTRIBUTED COMPUTING AND NETWORKING, 2009, 5408 : 99 - +
  • [6] Implementation of adaptive control for P2P overlays
    Koulouris, T
    Henjes, R
    Tutschku, K
    De Meer, H
    ACTIVE NETWORKS, 2003, 2982 : 292 - 306
  • [7] Malicious Peers Eviction for P2P Overlays
    Ismail, Hatem
    Germanus, Daniel
    Suri, Neeraj
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 216 - 224
  • [8] Similarity discovery in structured P2P overlays
    Hsiao, HC
    King, CT
    2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, PROCEEDINGS, 2003, : 636 - 644
  • [9] Caching routing indices in structured P2P overlays
    Cai, HL
    Wang, J
    2005 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSSING, PROCEEDINGS, 2005, : 521 - 528
  • [10] Construction and maintenance of P2P overlays for live streaming
    Eliseu C. Miguel
    Cristiano M. Silva
    Fernando C. Coelho
    Ítalo F. S. Cunha
    Sérgio V. A. Campos
    Multimedia Tools and Applications, 2021, 80 : 20255 - 20282