To access the full text documents, please follow this link: http://hdl.handle.net/2117/25344

RIAPPA: a robust identity assignment protocol for P2P overlays
Caubet Fernández, Juan; Esparza Martín, Óscar; Muñoz Tapia, José Luis; Alins Delgado, Juan José; Mata Diaz, Jorge
Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica; Universitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics
Peer-to-peer (P2P) overlay networks have been proposed to solve routing problems of big distributed infrastructures, even for Internet scale. But the research community has been questioning the security of these networks for years. Most prior work in security services was focused on trust and reputation systems, anonymity, and secure routing. However, the proper management of identities in overlays is an important prerequisite to provide most of these security services. In this paper, we propose a protocol to control the access to a P2P overlay and to assign identities in a secure way; all this preserving the anonymity of users. This protocol involves two trusted third parties (TTPs), thanks to which it is possible to preserve the users' anonymity within the network without losing traceability. Users are authenticated by a TTP using real-world digital certificates, they select their network identifier jointly with the other TTP, and finally, the two TTPs issue the internal certificate to them. The protocol also provides revocability and protection against Sybil attacks, Eclipse attacks, whitewashers, and so on. A detailed protocol description is presented, and a performance and security analysis of the protocol is also provided. Copyright (c) 2014 John Wiley & Sons, Ltd.
Peer Reviewed
Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors::Protocols de comunicació
Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica
Computer networks -- Security measures
Computer security
Computer network protocols
P2P overlay
DHT
Sybil attack
Eclipse attack
Identity assignment
Sybil attacks
Network
Systems
Defense
Trust
Chord
Protocols de xarxes d'ordinadors
Seguretat informàtica
Ordinadors, Xarxes d' -- Mesures de seguretat
info:eu-repo/semantics/publishedVersion
Article
         

Show full item record

Related documents

Other documents of the same author

Caubet Fernández, Juan; Muñoz Tapia, José Luis; Alins Delgado, Juan José; Mata Diaz, Jorge; Esparza Martín, Óscar
Caubet Fernández, Juan; Esparza Martín, Óscar; Alins Delgado, Juan José; Mata Diaz, Jorge; Soriano Ibáñez, Miguel
Gañan, Carlos; Caubet Fernández, Juan; Mata Diaz, Jorge; Alins Delgado, Juan José; Esparza Martín, Óscar
Reñé, Sergi; Gañan, Carlos; Caubet Fernández, Juan; Alins Delgado, Juan José; Mata Diaz, Jorge; Muñoz Tapia, José Luis
Muñoz Tapia, José Luis; Esparza Martín, Óscar; Hernández Gañán, Carlos; Mata Diaz, Jorge; Alins Delgado, Juan José; Ganchev, Ivan
 

Coordination

 

Supporters