A New Scalable Distributed Authentication for P2P Network and its Performance Evaluation
被引:0
作者:
Takeda, Atushi
论文数: 0引用数: 0
h-index: 0
机构:
Tohoku Univ, Grad Sch Informat Sci, Aoba Ku, 2-1-1 Katahira, Sendai, Miyagi 980, JapanTohoku Univ, Grad Sch Informat Sci, Aoba Ku, 2-1-1 Katahira, Sendai, Miyagi 980, Japan
Takeda, Atushi
[1
]
Chakraborty, Debasish
论文数: 0引用数: 0
h-index: 0
机构:
Tohoku Univ, Res Inst Elect Commun, Aoba ku, Sendai, JapanTohoku Univ, Grad Sch Informat Sci, Aoba Ku, 2-1-1 Katahira, Sendai, Miyagi 980, Japan
Chakraborty, Debasish
[2
]
Kitagata, Gen
论文数: 0引用数: 0
h-index: 0
机构:
Tohoku Univ, Res Inst Elect Commun, Aoba ku, Sendai, JapanTohoku Univ, Grad Sch Informat Sci, Aoba Ku, 2-1-1 Katahira, Sendai, Miyagi 980, Japan
Kitagata, Gen
[2
]
Hashimoto, Kazuo
论文数: 0引用数: 0
h-index: 0
机构:
Tohoku Univ, Grad Sch Informat Sci, Aoba Ku, 2-1-1 Katahira, Sendai, Miyagi 980, JapanTohoku Univ, Grad Sch Informat Sci, Aoba Ku, 2-1-1 Katahira, Sendai, Miyagi 980, Japan
Hashimoto, Kazuo
[1
]
Shiratori, Norio
论文数: 0引用数: 0
h-index: 0
机构:
Tohoku Univ, Res Inst Elect Commun, Aoba ku, Sendai, JapanTohoku Univ, Grad Sch Informat Sci, Aoba Ku, 2-1-1 Katahira, Sendai, Miyagi 980, Japan
Shiratori, Norio
[2
]
机构:
[1] Tohoku Univ, Grad Sch Informat Sci, Aoba Ku, 2-1-1 Katahira, Sendai, Miyagi 980, Japan
[2] Tohoku Univ, Res Inst Elect Commun, Aoba ku, Sendai, Japan
来源:
PROCEEDINGS OF THE 12TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS , PTS 1-3: NEW ASPECTS OF COMPUTERS
|
2008年
关键词:
Distributed authentication;
Decentralized public key exchange;
P2P network;
D O I:
暂无
中图分类号:
TP39 [计算机的应用];
学科分类号:
081203 ;
0835 ;
摘要:
Recently P2P networks become more and more popular. Though they have many advantages, P2P networks suffer from authentication of nodes. To overcome this problem, a new authentication method called Hash-based Distributed Authentication Method (HDAM) is proposed. HDAM realizes a decentralized efficient mutual authentication mechanism for each pair of nodes in the P2P network. It performs a distributed management of public keys by using Web of Trust and Distributed Hash Table. Our proposed scheme significantly reduces both the memory size requirement and the overhead of communication data sent by the nodes. Additionally, the results also show that required resource size of HDAM is O(logN) and HDAM is more scalable than the conventional method.