0
喜欢
0
书签
声明论文
Identity Theft Protection in Structured Overlays   
摘  要:   Structured peer-to-peer (P2P) overlays rely on consis- tent and robust key-based routing to support large-scale network applications such as multicast and global-scale storage. We identify the main attack in these networks as a form of P2P identity theft, where a malicious node in the path of a message claims it is the desired destination node. Attackers can hijack route and lookup requests to forge and destroy data to disrupt applications. We propose a solu- tion where nodes sign proof-of-life certificates for partial nodeidsanddistribute themto randomlychosenproofman- agers in the network. Source nodes can evade attackers by requesting proofs from multiple proof managers. Analysis and simulation show the approach is effective and imposes storage and communication costs that grow logarithmically with network size.
发  表:   2005

论文统计图
共享有2个版本

Bibtex
创新指数 
阅读指数 
重现指数 
论文点评
还没有人点评哦

Feedback
Feedback
Feedback
我想反馈:
排行榜