TY - GEN
T1 - Tempering kademlia with a robust identity based system
AU - Aiello, Luca Maria
AU - Milanesio, Marco
AU - Ruffo, Giancarlo
AU - Schifanella, Rossano
PY - 2008
Y1 - 2008
N2 - The lack of a trusted authority, responsible for peers' identity verification or for authentication purposes, makes actual P2P systems extremely vulnerable to a large spectrum of attacks. The main purpose of this paper is to present Likir (Layered Identity-based Kademlia-like In-fRastructure), a framework that includes an identity based scheme and a secure communication protocol, built on top of Kademlia, that may provide an effective defense against well known attacks. This will be accomplished with the adoption of a certification service, with the use of an authentication protocol between nodes and with the introduction of credentials to make non-repudiable the ownership of the contents and messages inserted in the DHT. For sake of interoperability with other social networking services, Likir enables identity management under the Identity 2.0 framework. Under this perspective, the IBS (Identity-Based Signature) scheme is taken into consideration and analyzed as well.
AB - The lack of a trusted authority, responsible for peers' identity verification or for authentication purposes, makes actual P2P systems extremely vulnerable to a large spectrum of attacks. The main purpose of this paper is to present Likir (Layered Identity-based Kademlia-like In-fRastructure), a framework that includes an identity based scheme and a secure communication protocol, built on top of Kademlia, that may provide an effective defense against well known attacks. This will be accomplished with the adoption of a certification service, with the use of an authentication protocol between nodes and with the introduction of credentials to make non-repudiable the ownership of the contents and messages inserted in the DHT. For sake of interoperability with other social networking services, Likir enables identity management under the Identity 2.0 framework. Under this perspective, the IBS (Identity-Based Signature) scheme is taken into consideration and analyzed as well.
UR - http://www.scopus.com/inward/record.url?scp=55149122075&partnerID=8YFLogxK
U2 - 10.1109/P2P.2008.40
DO - 10.1109/P2P.2008.40
M3 - Conference contribution
AN - SCOPUS:55149122075
SN - 9780769533186
T3 - Proceedings - P2P'08, 8th International Conference on Peer-to-Peer Computing
SP - 30
EP - 39
BT - Proceedings - P2P'08, 8th International Conference on Peer-to-Peer Computing
T2 - P2P'08, 8th International Conference on Peer-to-Peer Computing
Y2 - 8 September 2008 through 11 September 2008
ER -