Random visitor: a defense against identity attacks in P2P overlay networks

  • Authors:
  • Jabeom Gu;Jaehoon Nah;Cheoljoo Chae;Jaekwang Lee;Jongsoo Jang

  • Affiliations:
  • Electronics and Telecommunications Research Institute, Daejeon, Korea;Electronics and Telecommunications Research Institute, Daejeon, Korea;Hannam University, Daejeon, Korea;Hannam University, Daejeon, Korea;Electronics and Telecommunications Research Institute, Daejeon, Korea

  • Venue:
  • WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The characteristics of cooperative and trustworthy interaction in peer-to-peer overlay network are seriously challenged by the open nature of the network. The impact is particularly large when the identifiers of resource and peer are not verified because the whole network can be compromised by such attacks as sybil or eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which is a third party who is serving as a delegate of an identity proof. Design rationale and framework details are presented. Discussion about the strength and cost of the proposed scheme is also presented.