RIAPPA: a Robust Identity Assignment Protocol for P2P overlays

被引:1
|
作者
Caubet, Juan [1 ]
Esparza, Oscar [1 ]
Munoz, Jose L. [1 ]
Alins, Juanjo [1 ]
Mata-Diaz, Jorge [1 ]
机构
[1] Univ Politecn Cataluna, Dept Telemat Engn ENTEL, ES-08034 Barcelona, Spain
关键词
P2P overlay; DHT; Sybil attack; eclipse attack; identity assignment; ECLIPSE ATTACKS; SYBIL ATTACKS; KADEMLIA; DEFENSE; TRUST; CHORD;
D O I
10.1002/sec.956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks for years. Most prior work in security services was focused on trust and reputation systems, anonymity, and secure routing. However, the proper management of identities in overlays is an important prerequisite to provide most of these security services. In this paper, we propose a protocol to control the access to a P2P overlay and to assign identities in a secure way; all this preserving the anonymity of users. This protocol involves two trusted third parties (TTPs), thanks to which it is possible to preserve the users' anonymity within the network without losing traceability. Users are authenticated by a TTP using real-world digital certificates, they select their network identifier jointly with the other TTP, and finally, the two TTPs issue the internal certificate to them. The protocol also provides revocability and protection against Sybil attacks, Eclipse attacks, whitewashers, and so on. A detailed protocol description is presented, and a performance and security analysis of the protocol is also provided. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2743 / 2760
页数:18
相关论文
共 50 条
  • [41] Research of botnet base on P2P protocol
    Li Yue
    Fan Ya-qin
    Yang Duo
    Zheng Kai-yuan
    ENERGY DEVELOPMENT, PTS 1-4, 2014, 860-863 : 2758 - +
  • [42] Forensic Investigation Framework for P2P Protocol
    Manesh, T.
    Sha, M. Mohammed
    Vivekanandan, K.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 256 - 264
  • [43] An improved P2P lookup protocol model
    Xu Ke
    Song Meina
    Song Junde
    Cluster Computing, 2010, 13 : 199 - 211
  • [44] Hybrid Live P2P Streaming Protocol
    Hammami, Chourouk
    Jemili, Imen
    Gazdar, Achraf
    Belghith, Abdelfettah
    Mosbah, Mohamed
    5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014), 2014, 32 : 158 - 165
  • [45] An Improved P2P Lookup Protocol Model
    Ke, Xu
    Meina, Song
    Renjie, Pi
    Xiaohui, Wang
    Yan, Li
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 1009 - +
  • [46] Robust and Scalable P2P Live Streaming
    陈锬
    熊馨
    Journal of Donghua University(English Edition), 2009, 26 (05) : 482 - 488
  • [47] A LIGHT-WEIGHT FEDERATED VIDEO ADAPTATION SYSTEM FOR P2P OVERLAYS
    Iqbal, Razib
    Shirmohammadi, Shervin
    ICME: 2009 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-3, 2009, : 1126 - 1129
  • [48] The embedded gateway based on P2P protocol
    Zhou Shumin
    Tang Bin
    Sun Yamin
    Hu Lei
    PROCEEDINGS OF THE 26TH CHINESE CONTROL CONFERENCE, VOL 5, 2007, : 591 - +
  • [49] An SDN approach to detect targeted attacks in P2P fully connected overlays
    Medina-Lopez, Cristobal
    Casado, L. G.
    Gonzalez-Ruiz, Vicente
    Qiao, Yuansong
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (02) : 245 - 255
  • [50] RFID Implementation in Supply Chain Management Using P2P Network Overlays
    Podduturi, Pooja
    Ahmadi, Pouyan
    Islam, Khondkar
    Maco, Trevor
    2019 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2019,