RIAPPA: a Robust Identity Assignment Protocol for P2P overlays

被引:1
作者
Caubet, Juan [1 ]
Esparza, Oscar [1 ]
Munoz, Jose L. [1 ]
Alins, Juanjo [1 ]
Mata-Diaz, Jorge [1 ]
机构
[1] Univ Politecn Cataluna, Dept Telemat Engn ENTEL, ES-08034 Barcelona, Spain
关键词
P2P overlay; DHT; Sybil attack; eclipse attack; identity assignment; ECLIPSE ATTACKS; SYBIL ATTACKS; KADEMLIA; DEFENSE; TRUST; CHORD;
D O I
10.1002/sec.956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks for years. Most prior work in security services was focused on trust and reputation systems, anonymity, and secure routing. However, the proper management of identities in overlays is an important prerequisite to provide most of these security services. In this paper, we propose a protocol to control the access to a P2P overlay and to assign identities in a secure way; all this preserving the anonymity of users. This protocol involves two trusted third parties (TTPs), thanks to which it is possible to preserve the users' anonymity within the network without losing traceability. Users are authenticated by a TTP using real-world digital certificates, they select their network identifier jointly with the other TTP, and finally, the two TTPs issue the internal certificate to them. The protocol also provides revocability and protection against Sybil attacks, Eclipse attacks, whitewashers, and so on. A detailed protocol description is presented, and a performance and security analysis of the protocol is also provided. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:2743 / 2760
页数:18
相关论文
共 50 条
[31]   Cooperativeness prediction in P2P networks [J].
Niu, Changyong ;
Wang, Jian ;
Shen, Ruimin ;
Shen, Liping ;
Luo, Heng .
EXPERT SYSTEMS WITH APPLICATIONS, 2008, 35 (03) :1267-1274
[32]   FCTrust: A Robust and Efficient Feedback Credibility-Based Distributed P2P Trust Model [J].
Hu, Jianli ;
Wu, Quanyuan ;
Zhou, Bin .
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, :1963-1968
[33]   A Declarative Semantics for P2P Systems [J].
Caroprese, Luciano ;
Zumpano, Ester .
MACHINE LEARNING AND KNOWLEDGE EXTRACTION, CD-MAKE 2017, 2017, 10410 :315-329
[34]   An Enhanced Chord-based P2P Lookup Protocol for Mobile Ad hoc Networks [J].
Thaalbi, Mariem ;
Meddahi, Ahmed ;
Bejaoui, Tarek ;
Tabbane, Nabil .
2011 IFIP WIRELESS DAYS (WD), 2011,
[35]   C-trust: A trust management system to improve fairness on circular P2P networks [J].
Naghizadeh, Alireza ;
Razeghi, Behrooz ;
Meamari, Ehsan ;
Hatamian, Majid ;
Atani, Reza Ebrahimi .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (06) :1128-1144
[36]   DuDE: A Distributed Computing System using a Decentralized P2P Environment [J].
Skodzik, Jan ;
Danielis, Peter ;
Altmann, Vlado ;
Rohrbeck, Jens ;
Timmermann, Dirk ;
Bahls, Thomas ;
Duchow, Daniel .
2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, :1048-1055
[37]   Detection and mitigation of localized attacks in a widely deployed P2P network [J].
Thibault Cholez ;
Isabelle Chrisment ;
Olivier Festor ;
Guillaume Doyen .
Peer-to-Peer Networking and Applications, 2013, 6 :155-174
[38]   Privacy-Aware Contact Sharing for Groups in P2P Networks [J].
Meskanen, Tommi ;
Kuusijarvi, Jarkko ;
Niemi, Valtteri .
INTERNATIONAL JOURNAL OF EMBEDDED AND REAL-TIME COMMUNICATION SYSTEMS (IJERTCS), 2021, 12 (04) :36-54
[39]   BF-Chord: An improved lookup protocol to Chord based on Bloom Filter for wireless P2P [J].
Wang, Shiguo ;
Ji, Hong ;
Li, Yi .
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, :2830-2833
[40]   Detecting and Mitigating P2P Eclipse Attacks [J].
Ismail, Hatem ;
Germanus, Daniel ;
Suri, Neeraj .
2015 IEEE 21ST INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2015, :224-231