|Table of Contents|

A Novel Peer to Peer Network Security Route Algorithm Based on Group(PDF)

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

Issue:
2008年04期
Page:
17-20
Research Field:
Publishing date:

Info

Title:
A Novel Peer to Peer Network Security Route Algorithm Based on Group
Author(s):
Xu He1Wang Ruchuan12Han Zhijie1
1.College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China;2.State Key Lab of Novel Software Technology,Nanjing University,Nanjing 210093,China
Keywords:
Peer to Peer route B lo ck C iphe r
PACS:
TP393.08
DOI:
-
Abstract:
Recently, there has been a grow ing interest in the po tential use of Peer to Peer computing ( P2P) in m any app lica tions such as file sharing, instan t comm un ication. There fo re, to realize the ir potentia ,l there is a need o f a P2P security route a lgor ithm that facilities the deploym en t o f a ne tw ork. Based on present P2P netw ork route protoco,l aim ing at route attacks and potentia l secur ity defects, comb ined w ith B lock C ipher m anagem ent m echan ism, th is paper ana lyzes the current hybr id P2P network and presents a a lgo rithm w hich can filter fa lse routingm essage and prov ide amessage authentication pro toco.l The paper pu ts forwa rd a nove l P2P secur ity routing m echan ism us ing group by using the Block C -i pher in the P2P netwo rk, wh ich is different from the trad itional PK I keym anagem entm echanism, and the present algorithm can filter false routing m essage effec tive ly and prov ide a reliablem essage authentication protoco l for routing m echan ism.

References:

[ 1] M R, Foster I. M app ing the Gnutella netwo rk[ J]. IEEE Interne t Compu ting, 2002, 6: 50-57.
[ 2] Pe tarM aym ounkov, Dav idM az i res. Kadem lia: a Pee r- to-Peer informa tion system based on the XOR m etr ic[ C] / / Peer- to-Peer Sy stem s: The 1st Internationa lW o rkshop, IPTPS 2002. C ambr idge, USA, 2002: 7-8.
[ 3] Saro iu S, Gumm ad i P K, Gr ibb le S D. A m easurement study o f peer-to-peer file shar ing system s[ C] / /M ultim edia Com puting and Netw ork ing 2002 (MM CN2002). Ca lifo rn ia, USA, 2002: 156-170.
[ 4] Ka rlo Berket, Abdelilah E ssiar,i A rturM uratas. PK I-based secu rity fo r p2p inform a tion shar ing[ C ] / / Proceed ings of the 4 th
Interna tiona l Conference on Peer- to-Pee rC om puting. W ash ing ton, 2004: 45-52.
[ 5] Pa illier P. T rapdoo ring d iscre te logar ithm s on e lliptic curves over r ing s[ C ] / / Proceed ing s o f the 6 th Interna tiona l Conference
on the Theory and Application o f Crypto logy and Informa tion Secur ity: Advance in Cryp to logy. Singapo re, 2000: 573-584.
[ 6] R ita Chen, W illiam Y eager. Pob lano a d istributed trust m ode l fo r peer-to-peer ne tw orks[ EB /OL]. ( 2005-03-01) [ 2007-04-11]. http: / /www. jx ta. org /docs/ trust. pd.f
[ 7] Corne lli F. Choo sing repu tab le servants in a P2P network[ C] / / Pro ceedings of the Int-1Wo rldW ideW eb Conference. H aw a i:i ACM Press, 2002: 441-449.
[ 8] 冯登国. 密码学原理与实践[M ]. 2版. 北京: 电子工业出版社, 2003: 245-257.
Feng Dengguo. Cryptography and Netwo rk Secur ity: Princ iples and Prac tice[M ] . 2nd ed. Be ijing: E lectron ics Industry Press,2003: 245-257. ( in Ch inese)
[ 9] 关振胜. 公钥基础设施PK I与认证机构CA[M ]. 北京: 电子工业出版社, 2002.
Guan Zhensheng. Pulic Key Infrastructure-PK I and Certifica te Au thor ity-CA[M ]. Beijing: E lectron ics Industry Press, 2002.( in Chinese)

Memo

Memo:
-
Last Update: 2013-04-24