A Self-Organized Public-Key Management for P2P Network

Article Preview

Abstract:

P2P network is open, anonymous, dynamical in contrast with conventional network. It’s full of dishonesty, deceit, selfishness. It’s necessary to build a robust security infrastructure system. The one important module of security infrastructure is to identify the users in transactions. This paper will propose an identification solution based on PKI. In our algorithm, the peer generates their public-private key pairs by themselves, to issue certificates, and perform authentication without any centralized services. It can realize the identification, meanwhile keep peers anonymous. Moreover, it can limit the quantity of ID that a user applies for; alleviate the risk of Sybil attack.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 204-210)

Pages:

612-616

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] L. Zhou and Z. Haas, Securing Ad Hoc Networks, IEEE Network, vol. 13, no. 6, pp.24-30, Nov. /Dec. (1999).

DOI: 10.1109/65.806983

Google Scholar

[2] J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks, " Proc. Ninth Int, l Conf. Network Protocols (ICNP), Nov. (2001).

DOI: 10.1109/icnp.2001.992905

Google Scholar

[3] J. Douceur, The Sybil Attack, " Proc. First Int, l Workshop Peer-to-Peer Systems (IPTPS), (2002).

Google Scholar

[4] G. Montenegro and C. Castelluccia, Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses, Proc. Ninth Ann. Network and Distributed System Security Symp. (NDSS), (2002).

Google Scholar

[5] G. O'Shea and M. Roe, Child-Proof Authentication for MIPv6 (CAM), ACM Computer Comm. Rev., Apr. (2001).

Google Scholar

[6] Girault, M. (1991). Self-certified public keys. In EuroCrypt'91, volume 547 of Lecture.

Google Scholar

[7] Capkun, S.; Buttyan, L.; Hubaux, J. -P.; Self-organized public-key management for mobile ad hoc networks,; Mobile Computing, IEEE Transactions on Volume: 2, Issue: 1 Digital Object Identifier: 10. 1109/TMC. 2003. 1195151, Publication Year: 2003 , Page(s): 52 - 64.

DOI: 10.1109/tmc.2003.1195151

Google Scholar