Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Random visitor: Defense against identity attacks in P2P networks

Authors
GU, JabeomNAH, JaehoonKWON, HyeokchanJANG, JongsooPARK, Sehyun
Issue Date
Apr-2008
Publisher
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG
Keywords
peer-to-peer; overlay network; security; identifier authentication; random visitor; identity-based cryptography
Citation
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E91D, no.4, pp 1058 - 1073
Pages
16
Journal Title
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
Volume
E91D
Number
4
Start Page
1058
End Page
1073
URI
https://scholarworks.bwise.kr/cau/handle/2019.sw.cau/52898
DOI
10.1093/ietisy/e91-d.4.1058
ISSN
1745-1361
Abstract
Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of ICT Engineering > School of Electrical and Electronics Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Park, Sehyun photo

Park, Sehyun
대학원 (지능형에너지산업융합학과)
Read more

Altmetrics

Total Views & Downloads

BROWSE