DocumentCode :
2408427
Title :
Identity theft protection in structured overlays
Author :
Ganesh, Lakshmi ; Zhao, Ben Y.
Author_Institution :
Dept. of Comput. Sci., California Univ., Santa Barbara, CA, USA
fYear :
2005
fDate :
6 Nov. 2005
Firstpage :
49
Lastpage :
54
Abstract :
Structured peer-to-peer (P2P) overlays rely on consistent and robust key-based routing to support large-scale network applications such as multicast and global-scale storage. We identify the main attack in these networks as a form of P2P identity theft, where a malicious node in the path of a message claims it is the desired destination node. Attackers can hijack route and lookup requests to forge and destroy data to disrupt applications. We propose a solution where nodes sign proof-of-life certificates for partial node ids and distribute them to randomly chosen proof managers in the network. Source nodes can evade attackers by requesting proofs from multiple proof managers. Analysis and simulation show the approach is effective and imposes storage and communication costs that grow logarithmically with network size.
Keywords :
peer-to-peer computing; telecommunication network routing; telecommunication security; identity theft protection; network management; peer-to-peer overlays; proof manager; source nodes; structured overlays; Computer science; Costs; File systems; Intelligent networks; Intrusion detection; Large-scale systems; Peer to peer computing; Protection; Robustness; Routing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Secure Network Protocols, 2005. (NPSec). 1st IEEE ICNP Workshop on
Print_ISBN :
0-7803-9427-5
Type :
conf
DOI :
10.1109/NPSEC.2005.1532053
Filename :
1532053
Link To Document :
بازگشت