The lack of a trusted authority, responsible for peers' identity verification or for authentication purposes, makes actual P2P systems extremely vulnerable to a large spectrum of attacks. The main purpose of this paper is to present Likir (Layered Identity-based Kademlia-like InfRastructure), a framework that includes an identity-based scheme and a secure communication protocol, built on top of Kademlia, that may provide an effective defense against well known attacks. This will be accomplished with the adoption of a certification service, with the use of an authentication protocol between nodes and with the introduction of credentials to make non-repudiable the ownership of the contents and messages inserted in the DHT. For sake of interoperability with other social networking services, Likir enables identity management under the Identity 2.0 framework. Under this perspective, the IBS (Identity-Based Signature) scheme is taken into consideration and analyzed as well.

Tempering Kademlia with a Robust Identity Based System

AIELLO, LUCA MARIA;MILANESIO, Marco;RUFFO, Giancarlo Francesco;SCHIFANELLA, ROSSANO
2008

Abstract

The lack of a trusted authority, responsible for peers' identity verification or for authentication purposes, makes actual P2P systems extremely vulnerable to a large spectrum of attacks. The main purpose of this paper is to present Likir (Layered Identity-based Kademlia-like InfRastructure), a framework that includes an identity-based scheme and a secure communication protocol, built on top of Kademlia, that may provide an effective defense against well known attacks. This will be accomplished with the adoption of a certification service, with the use of an authentication protocol between nodes and with the introduction of credentials to make non-repudiable the ownership of the contents and messages inserted in the DHT. For sake of interoperability with other social networking services, Likir enables identity management under the Identity 2.0 framework. Under this perspective, the IBS (Identity-Based Signature) scheme is taken into consideration and analyzed as well.
Eighth International Conference on Peer-to-Peer Computing
Aachen, Germany
8-11 September
Peer-to-Peer Computing
IEEE Computer Society
30
39
9780769533186
Kademlia; Identity Management; P2P
L. M. AIELLO; M. MILANESIO; G. RUFFO; R. SCHIFANELLA
File in questo prodotto:
File Dimensione Formato  
Likir_p2p_08_IEEE.pdf

Accesso riservato

Tipo di file: POSTPRINT (VERSIONE FINALE DELL’AUTORE)
Dimensione 224.52 kB
Formato Adobe PDF
224.52 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: http://hdl.handle.net/2318/60029
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 28
  • ???jsp.display-item.citation.isi??? 15
social impact