Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks
The characteristics of cooperative and trustworthy interaction in peer-to-peer overlay network are seriously challenged by the open nature of the network. The impact is particularly large when the identifiers of resource and peer are not verified because the whole network can be compromised by such...
Saved in:
Published in | Information Security Applications pp. 282 - 296 |
---|---|
Main Authors | , , , , |
Format | Book Chapter |
Language | English |
Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
2007
|
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The characteristics of cooperative and trustworthy interaction in peer-to-peer overlay network are seriously challenged by the open nature of the network. The impact is particularly large when the identifiers of resource and peer are not verified because the whole network can be compromised by such attacks as sybil or eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which is a third party who is serving as a delegate of an identity proof. Design rationale and framework details are presented. Discussion about the strength and cost of the proposed scheme is also presented. |
---|---|
ISBN: | 9783540710929 3540710922 |
ISSN: | 0302-9743 1611-3349 |
DOI: | 10.1007/978-3-540-71093-6_22 |