Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Defending against eclipse attacks on overlay networks
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Random visitor: a defense against identity attacks in P2P overlay networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Identity theft protection in structured overlays
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Hi-index | 0.00 |
Opening property of P2P network allows nodes to freely join P2P network and to create identity at no cost. Utilizing the loopholes, malicious nodes can create a number of identities in a short time, which will exhaust the identifiers resources and damage the operation of P2P network. The paper proposes a conundrum verification scheme which enables the node to join P2P network and creates identity more difficult. Moreover, it also puts forward a detection and elimination scheme, which can help P2P network to detect identity attackers promptly and eliminate them. Simulation experiments demonstrate that with the combination of the two schemes, P2P network can prevent identity attack effectively.