ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술지 Random Visitor: Defense against Identity Attacks in P2P Networks
Cited 1 time in scopus Download 8 time Share share facebook twitter linkedin kakaostory
저자
구자범, 나재훈, 권혁찬, 장종수, 박세현
발행일
200804
출처
IEICE Transactions on Information and Systems, v.E91-D no.4, pp.1058-1073
ISSN
0916-8532
출판사
일본, 전자정보통신학회 (IEICE)
DOI
https://dx.doi.org/10.1093/ietisy/e91-d.4.1058
협약과제
06MK1600, 유무선 IPv6 기반 P2P 네트워크 정보보호 기술 개발, 나재훈
초록
Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network. Copyright © 2008 The Institute of Electronics, Information and Communication Engineers.
KSP 제안 키워드
Design Rationale, Identity-based cryptography, Information and communication, Ownership proof, P2P Network, Peer-to-Peer(P2P), Strength increases, security analysis