Abstract
The security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity assignment has been less considered. These networks are designed so that each user has a unique identifier (nodeID), but the most of identity assignment systems allow malicious users to obtain a set of nodeIDs or even select certain identifiers. Thus, these users can disrupt the proper operation of a P2P overlay. In this paper, we propose a nodeID assignment protocol based on the issue of implicit certificates. Our purpose is to provide security services to struggle against the most of security threats in these networks with special attention to the identity assignment. This approach is based on the use of certificates and the joint generation of nodeIDs between a Certification Authority (CA) and the user. In addition, the use of implicit certificates presents certain advantages over the use of traditional certificates (explicit certificates).
Chapter PDF
Similar content being viewed by others
References
Cisco visual networking index: Forecast and methodology (2011-2016), http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-481360_ns827_Networking_Solutions_White_Paper.html
Wallach, D.S.: A survey of peer-to-peer security issues. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 42–57. Springer, Heidelberg (2003)
Pintsov, L.A., Vanstone, S.A.: Postal revenue collection in the digital age. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 105–120. Springer, Heidelberg (2001)
Brown, D.R.L., Gallant, R., Vanstone, S.A.: Provably secure implicit certificate schemes. In: Syverson, P. (ed.) FC 2001. LNCS, vol. 2339, pp. 156–165. Springer, Heidelberg (2002)
Fantacci, R., Maccari, L., Rosi, M., Chisci, L., Aiello, L.M., Milanesio, M.: Avoiding eclipse attacks on kad/kademlia: an identity based approach. In: IEEE International Conference on Communications (ICC), Dresden, Germany, pp. 1–5. IEEE Press (June 2009)
Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network. In: ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM), San Diego, CA, USA, pp. 161–172. ACM, New York (2001)
Stoica, I., Morris, R., Karger, D., Frans Kaaskoek, M., Balakrishman, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communication (SIGCOMM), San Diego, CA, USA, pp. 149–160. ACM, New York (2001)
Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002)
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Marti, S., Garcia-Molina, H.: Taxonomy of trust: Categorizing p2p reputation systems. Comput. Netw. 50(4), 472–484 (2006)
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. ACM Operating Systems Review (OSR) 36, 299–314 (2002)
Srivatsa, M., Liu, L.: Vulnerabilities and security threats in structured overlay networks: a quantitative analysis. In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA, pp. 252–261. IEEE Computer Society, Washington, DC (2004)
Butler, K.R.B., Ryu, S., Traynor, P., McDaniel, P.D.: Leveraging identity-based cryptography for node id assignment in structured p2p systems. IEEE Transactions on Parallel and Distributed Systems 20(12), 1803–1815 (2009)
Baumgart, I., Mies, S.: S/kademlia: A practicable approach towards secure key-based routing. In: 13th International Conference on Parallel and Distributed Systems, vol. 2, pp. 1–8. IEEE Computer Society, Washington, DC (2007)
Aiello, L.M., Milanesio, M., Ruffo, G., Schifanella, R.: Tempering kademlia with a robust identity based system. In: 8th International Conference on Peer-to-Peer Computing (P2P), pp. 30–39. IEEE Computer Society, Washington, DC (2008)
Aiello, L.M., Milanesio, M., Ruffo, G., Schifanella, R.: An identity-based approach to secure p2p applications with likir. Peer-to-Peer Networking and Applications 4, 420–438 (2011)
Rowaihy, H., Enck, W., McDaniel, P.D., La Porta, T.F.: Limiting sybil attacks in structured p2p networks. In: 26th IEEE International conference on Computer communications (INFOCOM), Anchorage, Alaska, USA, pp. 2596–2600. IEEE Communications Society (May 2007)
Da Costa Cordeiro, W.L., Santos, F.R., Mauch, G.H., Barcelos, M.P., Gaspary, L.P.: Identity management based on adaptive puzzles to protect p2p systems from sybil attacks. Comput. Netw. 56(11), 2569–2589 (2012)
Lu, C.: Detection and defense of identity attacks in p2p network. In: Cai, Z., Li, Z., Kang, Z., Liu, Y. (eds.) ISICA 2009. LNCS, vol. 5821, pp. 500–507. Springer, Heidelberg (2009)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.D.: Sybilguard: Defending against sybil attacks via social networks. IEEE/ACM Transactions on Networking 16(3), 576–589 (2008)
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. IEEE/ACM Transactions on Networking 18(3), 885–898 (2010)
Tran, N., Li, J., Subramanian, L., Chow, S.S.M.: Optimal sybil-resilient node admission control. In: 30th IEEE International Conference on Computer Communications (INFOCOM), Shanghai, P.R. China, pp. 3218–3226. IEEE Communications Society (April 2011)
Lesueur, F., Mé, L., Tong, V.V.T.: A sybilproof distributed identity management for p2p networks. In: IEEE Symposium on Computers and Communications (ISCC), Marrakech, Morocco, pp. 246–253. IEEE Computer Society (July 2008)
Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of Applied Cryptography, 1st edn. CRC Press, Inc., Boca Raton (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Caubet, J., Esparza, O., Alins, J., Mata-Díaz, J., Soriano, M. (2013). Securing Identity Assignment Using Implicit Certificates in P2P Overlays. In: Fernández-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds) Trust Management VII. IFIPTM 2013. IFIP Advances in Information and Communication Technology, vol 401. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38323-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-38323-6_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38322-9
Online ISBN: 978-3-642-38323-6
eBook Packages: Computer ScienceComputer Science (R0)