RIAPPA: a Robust Identity Assignment Protocol for P2P overlays

被引:1
|
作者
Caubet, Juan [1 ]
Esparza, Oscar [1 ]
Munoz, Jose L. [1 ]
Alins, Juanjo [1 ]
Mata-Diaz, Jorge [1 ]
机构
[1] Univ Politecn Cataluna, Dept Telemat Engn ENTEL, ES-08034 Barcelona, Spain
关键词
P2P overlay; DHT; Sybil attack; eclipse attack; identity assignment; ECLIPSE ATTACKS; SYBIL ATTACKS; KADEMLIA; DEFENSE; TRUST; CHORD;
D O I
10.1002/sec.956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks for years. Most prior work in security services was focused on trust and reputation systems, anonymity, and secure routing. However, the proper management of identities in overlays is an important prerequisite to provide most of these security services. In this paper, we propose a protocol to control the access to a P2P overlay and to assign identities in a secure way; all this preserving the anonymity of users. This protocol involves two trusted third parties (TTPs), thanks to which it is possible to preserve the users' anonymity within the network without losing traceability. Users are authenticated by a TTP using real-world digital certificates, they select their network identifier jointly with the other TTP, and finally, the two TTPs issue the internal certificate to them. The protocol also provides revocability and protection against Sybil attacks, Eclipse attacks, whitewashers, and so on. A detailed protocol description is presented, and a performance and security analysis of the protocol is also provided. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2743 / 2760
页数:18
相关论文
共 50 条
  • [1] Malicious Peers Eviction for P2P Overlays
    Ismail, Hatem
    Germanus, Daniel
    Suri, Neeraj
    2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 216 - 224
  • [2] An improved P2P lookup protocol model
    Xu Ke
    Song Meina
    Song Junde
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2010, 13 (02): : 199 - 211
  • [3] An improved P2P lookup protocol model
    Xu Ke
    Song Meina
    Song Junde
    Cluster Computing, 2010, 13 : 199 - 211
  • [4] An Improved P2P Lookup Protocol Model
    Ke, Xu
    Meina, Song
    Renjie, Pi
    Xiaohui, Wang
    Yan, Li
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 1009 - +
  • [5] An identity-based approach to secure P2P applications with Likir
    Aiello, Luca Maria
    Milanesio, Marco
    Ruffo, Giancarlo
    Schifanella, Rossano
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (04) : 420 - 438
  • [6] Robustness of a P2P Community Management System based on Two-level Hierarchical DHT Overlays
    Koskela, Timo
    Harjula, Erkki
    Kassinen, Otso
    Ylianttila, Mika
    2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
  • [7] An identity-based approach to secure P2P applications with Likir
    Luca Maria Aiello
    Marco Milanesio
    Giancarlo Ruffo
    Rossano Schifanella
    Peer-to-Peer Networking and Applications, 2011, 4 : 420 - 438
  • [8] A Sybilproof Distributed Identity Management for P2P Networks
    Lesueur, Francois
    Me, Ludovic
    Tong, Valerie Viet Triem
    2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 684 - 691
  • [9] Sybil Resilient Identity Distribution in P2P Networks
    Jose, Jissy Liz
    Jayasudha, J. S.
    Thampi, Sabu M.
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 433 - 439
  • [10] AS-aware Relay Selection using DHT Service Discovery in P2P overlays
    Ma, Tao
    Zhang, Chunhong
    Li, Lichun
    Ji, Yang
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 206 - +