{"title":"Securing peer-to-peer overlay networks from Sybil Attack","authors":"E. Lua","doi":"10.1109/ISCIT.2007.4392202","DOIUrl":null,"url":null,"abstract":"Securing Peer-to-Peer (P2P) overlay networks is complicated by the lack of access control and its collaborative resource infrastructure. A malicious attacker can behave as if it were a larger number of nodes compromising the integrity and security of the whole system, either by impersonating other nodes or claiming multiple arbitrary identities - Sybil Attack. To solve this problem, we propose a hybrid security protocol by unifying the ID-based cryptography and online secret sharing schemes. In contrast to the heavyweight Public Key Infrastructure (PKI) which is complicated and required more memory space, our proposal is able to verify the nodes' identities by easily obtaining the ID-based public signature verification key of every other node from the node identifier in the P2P overlay networks. Through cross-pollination of the two schemes, our hybrid security protocol is able to verify the data communications among overlay nodes and identify any malicious (cheating) nodes in a secured manner. We evaluate our hybrid security protocol and show its effectiveness analytically.","PeriodicalId":331439,"journal":{"name":"2007 International Symposium on Communications and Information Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Symposium on Communications and Information Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCIT.2007.4392202","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18
Abstract
Securing Peer-to-Peer (P2P) overlay networks is complicated by the lack of access control and its collaborative resource infrastructure. A malicious attacker can behave as if it were a larger number of nodes compromising the integrity and security of the whole system, either by impersonating other nodes or claiming multiple arbitrary identities - Sybil Attack. To solve this problem, we propose a hybrid security protocol by unifying the ID-based cryptography and online secret sharing schemes. In contrast to the heavyweight Public Key Infrastructure (PKI) which is complicated and required more memory space, our proposal is able to verify the nodes' identities by easily obtaining the ID-based public signature verification key of every other node from the node identifier in the P2P overlay networks. Through cross-pollination of the two schemes, our hybrid security protocol is able to verify the data communications among overlay nodes and identify any malicious (cheating) nodes in a secured manner. We evaluate our hybrid security protocol and show its effectiveness analytically.