ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Random Visitor: Defense against Identity Attacks in P2P Networks
Cited 1 time in scopus Download 8 time Share share facebook twitter linkedin kakaostory
Authors
Ja Beom Gu, Jae Hoon Nah, Hyeok Chan Kwon, Jon Soo Jang, Se Hyun Park
Issue Date
2008-04
Citation
IEICE Transactions on Information and Systems, v.E91-D, no.4, pp.1058-1073
ISSN
0916-8532
Publisher
일본, 전자정보통신학회 (IEICE)
Language
English
Type
Journal Article
DOI
https://dx.doi.org/10.1093/ietisy/e91-d.4.1058
Project Code
06MK1600, 유무선 IPv6 기반 P2P 네트워크 정보보호 기술 개발, Nah Jae Hoon
Abstract
Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network. Copyright © 2008 The Institute of Electronics, Information and Communication Engineers.
KSP Keywords
Design Rationale, Identity-based cryptography, Information and communication, Ownership proof, P2P Network, Peer-to-Peer(P2P), Strength increases, security analysis