ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks
Cited 3 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Ja Beom Gu, Jae Hoon Nah, Cheol Joo Chae, Jae Kwang Lee, Jong Soo Jang
Issue Date
2006-08
Citation
International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.282-296
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1007/978-3-540-71093-6_22
Abstract
The characteristics of cooperative and trustworthy interaction in peer-to-peer overlay network are seriously challenged by the open nature of the network. The impact is particularly large when the identifiers of resource and peer are not verified because the whole network can be compromised by such attacks as sybil or eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which is a third party who is serving as a delegate of an identity proof. Design rationale and framework details are presented. Discussion about the strength and cost of the proposed scheme is also presented. © Springer-Verlag Berlin Heidelberg 2007.
KSP Keywords
Design Rationale, P2P overlay networks, Peer-to-Peer(P2P), Third party, peer-to-peer overlay