Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks

The characteristics of cooperative and trustworthy interaction in peer-to-peer overlay network are seriously challenged by the open nature of the network. The impact is particularly large when the identifiers of resource and peer are not verified because the whole network can be compromised by such...

Full description

Saved in:
Bibliographic Details
Published inInformation Security Applications pp. 282 - 296
Main Authors Gu, Jabeom, Nah, Jaehoon, Chae, Cheoljoo, Lee, Jaekwang, Jang, Jongsoo
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2007
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The characteristics of cooperative and trustworthy interaction in peer-to-peer overlay network are seriously challenged by the open nature of the network. The impact is particularly large when the identifiers of resource and peer are not verified because the whole network can be compromised by such attacks as sybil or eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which is a third party who is serving as a delegate of an identity proof. Design rationale and framework details are presented. Discussion about the strength and cost of the proposed scheme is also presented.
ISBN:9783540710929
3540710922
ISSN:0302-9743
1611-3349
DOI:10.1007/978-3-540-71093-6_22