<P>Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the <I>open</I> nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks...
http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
https://www.riss.kr/link?id=A107724121
2008
-
SCOPUS,SCIE
학술저널
1058-1073(16쪽)
0
상세조회0
다운로드다국어 초록 (Multilingual Abstract)
<P>Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the <I>open</I> nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks...
<P>Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the <I>open</I> nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called <I>random visitor</I>, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses <I>identity-based cryptography</I> and <I>identity ownership proof</I> mechanisms collectively to create multiple, cryptographically protected <I>indirect</I> bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.</P>
Low Static Powered Asynchronous Data Transfer for GALS System
Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization