No junk, no peeking, serious offers only: P2P file exchange in wireless ad-hoc networks

被引:0
作者
Vogt, R [1 ]
Nikolaidis, I [1 ]
Gburzynski, P [1 ]
机构
[1] Univ Alberta, Dept Comp Sci, Edmonton, AB T6G 2E8, Canada
来源
LCN 2005: 30th Conference on Local Computer Networks, Proceedings | 2005年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of anonymous file exchange in wireless ad-hoc networks. We propose a new protocol, dubbed RASH (Roam And SHare), to address the problem. RASH is a peer-to-peer (P2P) protocol which fulfills three objectives: (a) protection of user privacy (understood as the confidentiality of their interests), (b) support for a high degree of file authentication and integrity (to reduce or eliminate false downloads and spoofs), and (c) enforcement of reciprocity (to remove freeloaders from the system). The environment of our scheme is purely ad-hoc, in that it does not assume pre-established trust, fixed-infrastructure, or the existence of specialized nodes.
引用
收藏
页码:10 / 17
页数:8
相关论文
共 9 条
  • [1] BLUM M, 1982, P IEEE SPRING COMPCO, P133
  • [2] ESCHENAUER L, 2002, TRUST ESTABLISHMENT
  • [3] GOLE P, 2002, P 9 ACM C COMP COMM, P59
  • [4] Jakobsson M, 1998, LECT NOTES COMPUT SC, V1403, P448, DOI 10.1007/BFb0054145
  • [5] LUO H, 2004, IEEE ACM T NETW OCT
  • [6] Schneier Bruce, 1996, APPL CRYPTOGRAPHY
  • [7] Stajano F., 2002, Security for ubiquitous computing
  • [8] Anonymous connections and onion routing
    Syverson, PF
    Goldschlag, DM
    Reed, MG
    [J]. 1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, : 44 - 54
  • [9] WAIDNER M, 1990, LECT NOTES COMPUT SC, V434, P690