Tempering Kademlia with a Robust Identity Based System

被引:14
作者
Aiello, Luca Maria [1 ]
Milanesio, Marco [1 ]
Ruffo, Giancarlo [1 ]
Schifanella, Rossano [1 ]
机构
[1] Univ Turin, Dept Comp Sci, I-10149 Turin, Italy
来源
P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS | 2008年
关键词
D O I
10.1109/P2P.2008.40
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The lack of a trusted authority, responsible for peers' identity verification or for authentication purposes, makes actual P2P systems extremely vulnerable to a large spectrum of attacks. The main purpose of this paper is to present Likir (Layered Identity-based Kademlia-like InfRastructure), a framework that includes an identity based scheme and a secure communication protocol, built on top of Kademlia, that may provide an effective defense against well known attacks. This will be accomplished with the adoption of a certification service, with the use of an authentication protocol between nodes and with the introduction of credentials to make non-repudiable the ownership of the contents and messages inserted in the DHT For sake of interoperability with other social networking services, Likir enables identity management under the Identity 2.0 framework. Under this perspective, the IBS (Identity-Based Signature) scheme is taken into consideration and analyzed as well.
引用
收藏
页码:30 / 39
页数:10
相关论文
共 23 条
[1]  
Baumgart I., 2007, P P2P NVE 2007 CONJ, V2
[2]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[3]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[4]   Secure routing for structured peer-to-peer overlay networks [J].
Castro, M ;
Druschel, P ;
Ganesh, A ;
Rowstron, A ;
Wallach, DS .
USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, :299-314
[5]  
Cocks Clifford., 2001, IMA Int. Conf., V2260, P360, DOI DOI 10.1007/3-540-45325-3
[6]  
DOUCEUR J, 2002, SYBIL ATTACK
[7]  
DUMITRIU D, 2005, SIGMETRICS PERFORM E, V33, P38
[8]  
MAYMOUNKOV P, 2002, P 1 INT WORKSH PEER, P53, DOI DOI 10.1007/3-540-45748-8_5
[9]  
Rowstron A., 2001, Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), V2218, P329, DOI 10.1007/3-540-45518-3_18
[10]  
Shamir A., 1984, LECT NOTES COMPUTER, V196, P47, DOI [DOI 10.1007/3-540-39568-7, 10.1007/3-540-39568-7_5, 10.1007/978-1-4757-0602-4_5, DOI 10.1007/978-1-4757-0602-4_5]