RIAPPA: a Robust Identity Assignment Protocol for P2P overlays

被引:1
作者
Caubet, Juan [1 ]
Esparza, Oscar [1 ]
Munoz, Jose L. [1 ]
Alins, Juanjo [1 ]
Mata-Diaz, Jorge [1 ]
机构
[1] Univ Politecn Cataluna, Dept Telemat Engn ENTEL, ES-08034 Barcelona, Spain
关键词
P2P overlay; DHT; Sybil attack; eclipse attack; identity assignment; ECLIPSE ATTACKS; SYBIL ATTACKS; KADEMLIA; DEFENSE; TRUST; CHORD;
D O I
10.1002/sec.956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks for years. Most prior work in security services was focused on trust and reputation systems, anonymity, and secure routing. However, the proper management of identities in overlays is an important prerequisite to provide most of these security services. In this paper, we propose a protocol to control the access to a P2P overlay and to assign identities in a secure way; all this preserving the anonymity of users. This protocol involves two trusted third parties (TTPs), thanks to which it is possible to preserve the users' anonymity within the network without losing traceability. Users are authenticated by a TTP using real-world digital certificates, they select their network identifier jointly with the other TTP, and finally, the two TTPs issue the internal certificate to them. The protocol also provides revocability and protection against Sybil attacks, Eclipse attacks, whitewashers, and so on. A detailed protocol description is presented, and a performance and security analysis of the protocol is also provided. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2743 / 2760
页数:18
相关论文
共 50 条
  • [21] Robust feedback credibility-based distributed P2P trust model
    Hu, Jian-Li
    Wu, Quan-Yuan
    Zhou, Bin
    Liu, Jia-Hong
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (10): : 2885 - 2898
  • [22] Local P2P group (LPG) communication in structured mobile P2P networks
    Singh, Mahendra
    Kumar, Chiranjeev
    Nath, Prem
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (07) : 3005 - 3019
  • [23] Designing and verifying a P2P service security protocol in M2M environment
    Bae, Woo-Sik
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (03) : 539 - 545
  • [24] From P2P to Cloud based P2P for Live Media streaming-A Survey
    Evangeline, Preetha D.
    AnandhaKumar, P.
    2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2015,
  • [25] A P2P global trust model based on recommendation
    Zhang, Z
    Wang, XM
    Wang, YX
    PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 3975 - 3980
  • [26] Research of Hierarchical P2P Network based on Chord
    Ma, Haibo
    Wang, Deguang
    Zhang, Jiamin
    Shi, Li
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 867 - 871
  • [27] A Robust Trust Management Scheme against the Malicious Nodes in Distributed P2P Network
    An, Do-sik
    Ha, Byong-lae
    Cho, Gi-hwan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 317 - 326
  • [28] Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks
    da Costa Cordeiro, Weverton Luis
    Santos, Flavio Roberto
    Mauch, Gustavo Huff
    Barcelos, Marinho Pilla
    Gaspary, Luciano Paschoal
    COMPUTER NETWORKS, 2012, 56 (11) : 2569 - 2589
  • [29] Clustering storage and approximate text addressing on P2P system
    Dong, Jianshe
    Yuan, Zhanting
    Zhang, Qiuyu
    WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS, 2006, : 122 - 127
  • [30] Cooperativeness prediction in P2P networks
    Niu, Changyong
    Wang, Jian
    Shen, Ruimin
    Shen, Liping
    Luo, Heng
    EXPERT SYSTEMS WITH APPLICATIONS, 2008, 35 (03) : 1267 - 1274