RIAPPA: a Robust Identity Assignment Protocol for P2P overlays

被引:1
|
作者
Caubet, Juan [1 ]
Esparza, Oscar [1 ]
Munoz, Jose L. [1 ]
Alins, Juanjo [1 ]
Mata-Diaz, Jorge [1 ]
机构
[1] Univ Politecn Cataluna, Dept Telemat Engn ENTEL, ES-08034 Barcelona, Spain
关键词
P2P overlay; DHT; Sybil attack; eclipse attack; identity assignment; ECLIPSE ATTACKS; SYBIL ATTACKS; KADEMLIA; DEFENSE; TRUST; CHORD;
D O I
10.1002/sec.956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks for years. Most prior work in security services was focused on trust and reputation systems, anonymity, and secure routing. However, the proper management of identities in overlays is an important prerequisite to provide most of these security services. In this paper, we propose a protocol to control the access to a P2P overlay and to assign identities in a secure way; all this preserving the anonymity of users. This protocol involves two trusted third parties (TTPs), thanks to which it is possible to preserve the users' anonymity within the network without losing traceability. Users are authenticated by a TTP using real-world digital certificates, they select their network identifier jointly with the other TTP, and finally, the two TTPs issue the internal certificate to them. The protocol also provides revocability and protection against Sybil attacks, Eclipse attacks, whitewashers, and so on. A detailed protocol description is presented, and a performance and security analysis of the protocol is also provided. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2743 / 2760
页数:18
相关论文
共 50 条
  • [31] Prototyping a P2P SIP User Agent With Support for Multiple Overlays
    Tsietsi, Mosiuoa
    Terzoli, Alfredo
    Wells, George
    2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 474 - 479
  • [32] Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems
    Butler, Kevin R. B.
    Ryu, Sunam
    Traynor, Patrick
    McDaniel, Patrick D.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2009, 20 (12) : 1803 - 1815
  • [33] Characterizing the Global Impact of P2P Overlays on the AS-Level Underlay
    Rasti, Amir Hassan
    Rejaie, Reza
    Willinger, Walter
    PASSIVE AND ACTIVE MEASUREMENT, PROCEEDINGS, 2010, 6032 : 1 - +
  • [34] Simulation of P2P Overlays over MANETs: Impediments and Proposed Solution
    Ali, Shabir
    Sewak, Anurag
    Pandey, Mayank
    Tyagi, Neeraj
    2017 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2017, : 338 - 345
  • [35] Impact of Self-Organization in P2P Overlays on Underlay Utilization
    Pussep, Konstantin
    Oechsner, Simon
    Abboud, Osama
    Kantor, Miroslaw
    Stiller, Burkhard
    2009 FOURTH INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES, 2009, : 84 - +
  • [36] A System of Systems Approach to Modeling and Analysis of P2P Overlays for WSNs
    Al-Shukri, Sh.
    Lenin, R. B.
    Ramaswamy, S.
    Imperiale, A.
    Itmi, M.
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEM OF SYSTEMS ENGINEERING SOSE 2009, 2009, : 76 - +
  • [37] Cryptography Enhanced Ad-Hoc Approach to P2P Overlays
    Zima, Michal
    Hladka, Eva
    2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 517 - 522
  • [38] An improved P2P lookup protocol model
    Xu Ke
    Song Meina
    Song Junde
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2010, 13 (02): : 199 - 211
  • [39] A congestion control protocol in P2P networks
    Zhao, Yongxiang
    Chen, Changjia
    APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 1241 - 1245
  • [40] P2P protocol analysis and blocking algorithm
    Hwang, SM
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 21 - 30