{"title":"Divalia: a practical framework for anonymous peer-to-peer file exchange in wireless ad-hoc networks","authors":"Ryan Vogt, I. Nikolaidis, P. Gburzynski","doi":"10.1109/CNSR.2006.26","DOIUrl":null,"url":null,"abstract":"We describe Divalia, a new peer-to-peer (P2P) file exchange framework that targets mobile wireless ad-hoc networks. The framework supports anonymous transfers, to protect user privacy, as well as pre-authentication of data to be received, to reduce the likelihood of spoofs and the resulting bandwidth wastage. Divalia is composed of two parts: the hash set dual-request protocol, to challenge a would-be provider to prove the possession of the requested file; and, a form of Direct Anonymous Broadcast, for anonymous acquisition of information to be used for the challenge. One goal of this paper is to demonstrate how an original and secure P2P system can be constructed within the constraints and opportunities of mobile wireless ad-hoc networks through the use of well known and extensively studied component cryptographic methods","PeriodicalId":425107,"journal":{"name":"4th Annual Communication Networks and Services Research Conference (CNSR'06)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"4th Annual Communication Networks and Services Research Conference (CNSR'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CNSR.2006.26","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
We describe Divalia, a new peer-to-peer (P2P) file exchange framework that targets mobile wireless ad-hoc networks. The framework supports anonymous transfers, to protect user privacy, as well as pre-authentication of data to be received, to reduce the likelihood of spoofs and the resulting bandwidth wastage. Divalia is composed of two parts: the hash set dual-request protocol, to challenge a would-be provider to prove the possession of the requested file; and, a form of Direct Anonymous Broadcast, for anonymous acquisition of information to be used for the challenge. One goal of this paper is to demonstrate how an original and secure P2P system can be constructed within the constraints and opportunities of mobile wireless ad-hoc networks through the use of well known and extensively studied component cryptographic methods