Abstract | ||
---|---|---|
The characteristics of cooperative and trustworthy interaction in peer-to-peer overlay network are seriously challenged by the open nature of the network. The impact is particularly large when the identifiers of resource and peer are not verified because the whole network can be compromised by such attacks as sybil or eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which is a third party who is serving as a delegate of an identity proof. Design rationale and framework details are presented. Discussion about the strength and cost of the proposed scheme is also presented. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1007/978-3-540-71093-6_22 | WISA |
Keywords | Field | DocType |
framework detail,random visitor,whole network,proposed scheme,identity proof,identifier authentication mechanism,open nature,identity attack,p2p overlay network,trustworthy interaction,design rationale,peer-to-peer overlay network,overlay network,p2p | Trusted third party,Authentication,Identifier,Delegate,Computer science,Computer security,Computer network,Sybil attack,Design rationale,Visitor pattern,Overlay network | Conference |
Volume | ISSN | Citations |
4298 | 0302-9743 | 3 |
PageRank | References | Authors |
0.46 | 23 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jabeom Gu | 1 | 20 | 3.36 |
Jaehoon Nah | 2 | 23 | 9.27 |
Cheol-Joo Chae | 3 | 26 | 5.27 |
Jaekwang Lee | 4 | 17 | 7.06 |
Jongsoo Jang | 5 | 55 | 13.43 |