[1]徐 鹤,王汝传,韩志杰.一种基于分组的P2P网络安全路由算法[J].南京师范大学学报(工程技术版),2008,08(04):017-20.
 Xu He,Wang Ruchuan,Han Zhijie,et al.A Novel Peer to Peer Network Security Route Algorithm Based on Group[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):017-20.
点击复制

一种基于分组的P2P网络安全路由算法
分享到:

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

卷:
08卷
期数:
2008年04期
页码:
017-20
栏目:
出版日期:
2008-12-30

文章信息/Info

Title:
A Novel Peer to Peer Network Security Route Algorithm Based on Group
作者:
徐  鹤1 王汝传1 2 韩志杰1
南京邮电大学计算机学院
Author(s):
Xu He1Wang Ruchuan12Han Zhijie1
1.College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China;2.State Key Lab of Novel Software Technology,Nanjing University,Nanjing 210093,China
关键词:
P2P 路由 分组密钥
Keywords:
Peer to Peer route B lo ck C iphe r
分类号:
TP393.08
摘要:
当前,对等计算(Peer to Peer)引起了广泛的关注,其典型应用有文件共享、即时通信等.为了保证P2P网络的有效运行和部署,在现有的混合式P2P网络中,以现有的P2P网络路由协议为基础,针对路由攻击和安全隐患,结合分组密钥管理机制,提出了一种过滤虚假路由信息和提供消息认证的机制.与传统的PKI密钥管理机制不同,该混合式P2P网络分组密钥管理机制提供了一种基于分组密钥的P2P安全路由机制,能够有效过滤虚假路由信息,为路由机制提供可靠消息认证算法.
Abstract:
Recently, there has been a grow ing interest in the po tential use of Peer to Peer computing ( P2P) in m any app lica tions such as file sharing, instan t comm un ication. There fo re, to realize the ir potentia ,l there is a need o f a P2P security route a lgor ithm that facilities the deploym en t o f a ne tw ork. Based on present P2P netw ork route protoco,l aim ing at route attacks and potentia l secur ity defects, comb ined w ith B lock C ipher m anagem ent m echan ism, th is paper ana lyzes the current hybr id P2P network and presents a a lgo rithm w hich can filter fa lse routingm essage and prov ide amessage authentication pro toco.l The paper pu ts forwa rd a nove l P2P secur ity routing m echan ism us ing group by using the Block C -i pher in the P2P netwo rk, wh ich is different from the trad itional PK I keym anagem entm echanism, and the present algorithm can filter false routing m essage effec tive ly and prov ide a reliablem essage authentication protoco l for routing m echan ism.

参考文献/References:

[ 1] M R, Foster I. M app ing the Gnutella netwo rk[ J]. IEEE Interne t Compu ting, 2002, 6: 50-57.
[ 2] Pe tarM aym ounkov, Dav idM az i res. Kadem lia: a Pee r- to-Peer informa tion system based on the XOR m etr ic[ C] / / Peer- to-Peer Sy stem s: The 1st Internationa lW o rkshop, IPTPS 2002. C ambr idge, USA, 2002: 7-8.
[ 3] Saro iu S, Gumm ad i P K, Gr ibb le S D. A m easurement study o f peer-to-peer file shar ing system s[ C] / /M ultim edia Com puting and Netw ork ing 2002 (MM CN2002). Ca lifo rn ia, USA, 2002: 156-170.
[ 4] Ka rlo Berket, Abdelilah E ssiar,i A rturM uratas. PK I-based secu rity fo r p2p inform a tion shar ing[ C ] / / Proceed ings of the 4 th
Interna tiona l Conference on Peer- to-Pee rC om puting. W ash ing ton, 2004: 45-52.
[ 5] Pa illier P. T rapdoo ring d iscre te logar ithm s on e lliptic curves over r ing s[ C ] / / Proceed ing s o f the 6 th Interna tiona l Conference
on the Theory and Application o f Crypto logy and Informa tion Secur ity: Advance in Cryp to logy. Singapo re, 2000: 573-584.
[ 6] R ita Chen, W illiam Y eager. Pob lano a d istributed trust m ode l fo r peer-to-peer ne tw orks[ EB /OL]. ( 2005-03-01) [ 2007-04-11]. http: / /www. jx ta. org /docs/ trust. pd.f
[ 7] Corne lli F. Choo sing repu tab le servants in a P2P network[ C] / / Pro ceedings of the Int-1Wo rldW ideW eb Conference. H aw a i:i ACM Press, 2002: 441-449.
[ 8] 冯登国. 密码学原理与实践[M ]. 2版. 北京: 电子工业出版社, 2003: 245-257.
Feng Dengguo. Cryptography and Netwo rk Secur ity: Princ iples and Prac tice[M ] . 2nd ed. Be ijing: E lectron ics Industry Press,2003: 245-257. ( in Ch inese)
[ 9] 关振胜. 公钥基础设施PK I与认证机构CA[M ]. 北京: 电子工业出版社, 2002.
Guan Zhensheng. Pulic Key Infrastructure-PK I and Certifica te Au thor ity-CA[M ]. Beijing: E lectron ics Industry Press, 2002.( in Chinese)

相似文献/References:

[1]汪瑜.基于P2P的混合安全信任机制研究[J].南京师范大学学报(工程技术版),2008,08(04):032.
 Wang Yu.Research of Mixed Security Trust Mechanism Based on Peer-to-Peer[J].Journal of Nanjing Normal University(Engineering and Technology),2008,08(04):032.
[2]褚为民,陈 波,于 泠.网络攻击路径重构中的报文标记方案研究[J].南京师范大学学报(工程技术版),2005,05(01):061.
 CHU Weimin,CHEN Bo,YU Ling,et al.Research on the Packets Marking Schemes of Reconstructing-Path in Network Attack[J].Journal of Nanjing Normal University(Engineering and Technology),2005,05(04):061.

备注/Memo

备注/Memo:
基金项目: 国家自然科学基金( 60573141和60773041)、国家“863”计划( 2006AA01Z201、2006AA01Z439、2007AA01Z404和2007AA01Z478 )和江苏省高技术研究计划( BG2006001和2007软资127)资助项目.
通讯联系人: 王汝传, 教授, 博士生导师, 研究方向: 计算机软件、计算机网络和网格及信息安全等. E-m ail:w angrc@ n jupt. edu. cn.
更新日期/Last Update: 2013-04-24