DOI QR코드

DOI QR Code

A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks

  • Jeong, Yoon-Su (Department of Information Communication Engineering, Mokwon University) ;
  • Kim, Yong-Tae (Department of Multimedia Engineering, Hannam University) ;
  • Shin, Seung-Soo (Department of Information Security, Tongmyong University) ;
  • Lee, Sang-Ho (Department of Software Engineering, Chungbuk National University)
  • Received : 2012.03.28
  • Accepted : 2013.04.08
  • Published : 2013.04.30

Abstract

The main concern in mobile peer-to-peer (P2P) networks is security because jamming or eavesdropping on a wireless link is much easier than on a wired one and such damage can be incurred without physical access or contact. In particular, authentication has increasingly become a requirement in mobile P2P environments. This paper presents a new mutual authentication mechanism which requires less storage space and maintains a high level of security in mobile P2P networks. The proposed mechanism improves efficiency by avoiding the use of centralized entities and is designed to be agile in terms of both reliability and low-cost implementation. The mechanism suggested in the simulation evaluates the function costs occurring in authentication between the devices under mobile P2P network environment comparing to existing method in terms of basic operation costs, traffic costs, communications costs, storage costs and scalability. The simulation results show that the proposed mechanism provides high authentication with low cryptography processing overhead.

Keywords

References

  1. K. Bennett and C. Grothoff, "GAP - Practical anonymous networking," in Proc. of Privacy Enhancing Technologies workshop, 2003. http://dx.doi.org/10.1007/978-3-540-40956-4_10
  2. I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, "Freenet: A Distributed Anonymous Information Storage and Retrieval System," in Proc. of Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, 2000.
  3. R. Dingledine, M. J. Freedman, and D. Molnar, "The Free Haven Project: Distributed Anonymous Storage Service," in Proc. of Workshop on Design Issues in Anonymity and Unobservability, 2000. PMid:10736377.
  4. D. Kugler, "An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks," in Proc. of Privacy Enhancing Technologies workshop, 2003. http://dx.doi.org/10.1007/978-3-540-40956-4_11
  5. A. Serjantov, "Anonymizing Censorship Resistant Systems," in Proc. of the First International Workshop on Peer-to-peer Systems, 2002. http://dx.doi.org/10.1007/3-540-45748-8_11
  6. M. Waldman, A. D. Rubin, and L. F. Cranor, "Publius: A Robust, Tamper-evident, Censorship-resistant Web Publishing System," in Proc. of the 9th USENIX Security Symposium, 2000. PMCid:2560618.
  7. S. Sherwood, B. Bhattacharjee, and A. SrinivasanM, " 5 P : A Protocol for Scalable Anonymous Communication," in Proc. IEEE Symp. Security and Privacy, May 2002. http://dx.doi.org/10.1109/SECPRI.2002.1004362
  8. J. Han, Y. Liu, L. Xiao, R. Xiao and L. M. Ni "A Mutual Anonymous Peer-to-peer Protocol Design," in Proc. of the 19th IEEE International Parallel and Distributed Processing Symposium, 2005. http://dx.doi.org/10.1109/IPDPS.2005.49
  9. L. Xiao, Z. Xu, and X. Shang, "Low-cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks," IEEE Transactions on Parallel and Distributed Systems, 2003. http://dx.doi.org/10.1109/TPDS.2003.1233706
  10. V. Scarlata, B. N. Levine, and C. Shields, " Responder Anonymity and Anonymous Peer-to-Peer File Sharing," in Proc. of the 9th International Conference of Network Protocol(ICNP), 2001. PMCid:1301537. http://dx.doi.org/10.1109/ICNP.2001.992907
  11. X. Liu, L. Xiao, A. Kreling, and Y. Liu, "Optimizing Overlay Topology by Reducing Cut Vertices," in Proc. of ACM NOSSDAV, 2006. http://dx.doi.org/10.1145/1378191.1378213
  12. X. Wang, S. Chellappan, P. Boyer, and D. Xuan, "On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks," IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2005. http://dx.doi.org/10.1109/TPDS.2006.93
  13. Y. Liu, A. -H. Esfahanian, L. Xiao, and L. M. Ni, "Approaching Optimal Peer-to-Peer Overlays," in Proc. of the 13th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems(MASCOTS), 2005. http://dx.doi.org/10.1109/MASCOTS.2005.15
  14. X. Y. Zhang, Q. Zhang, Z. Zhang, G. Song, and W. Zhu, "A Construction of Locality-Aware Overlay Network:mOverlay and Its Performance," IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004. http://dx.doi.org/10.1109/JSAC.2003.818780
  15. D. Qiu and R. Srikant, "Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks," in Proc. of ACM SIGCOMM, 2004.
  16. Y. Liu, Z. Zhuang, L. Xiao, and L. M. Ni, "A Distributed Approach to Solving Overlay Mismatch Problem," in Proc. of the 24th International Conference on Distributred Computing Systems(ICDCS), 2004. http://dx.doi.org/10.1109/ICDCS.2004.1281576
  17. X. Liu, Y. Liu, and L. Xiao, "Reliable Response Delivery in Peer-to-Peer System," in Proc. of the 12th Annual Meeting of the IEEE International Symposium on Modeling Analysis, and Simulation of Computer and Telecommunication Systems(MASCOTS), 2004. http://dx.doi.org/10.1109/MASCOT.2004.1348298
  18. K. V. Nguyen, "Simplifying Peer-to-Peer Device Authentication Using Identity-Based Cryptography," in Proc. of International conference on Networking and Services(ICNS06), 2006. http://dx.doi.org/10.1109/ICNS.2006.101
  19. SafeNet, "SafeNet Authentication Manager," SafeNet, Inc., 2013.
  20. L.E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta , M. Beigl and H. W. Gellersen, "Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts," in Proc. Of UBICOMP 2001, Atlanta, GA, USA, Sept. 2001.
  21. T. Kindberg and K. Zhang, "Context authentication using constrained channels," HP Labs Tech. report HPL-2001-84, 2001. http://dx.doi.org/10.1109/MCSA.2002.1017481
  22. Y. Liu, X. Liu, L. Xiao, L. M. Ni, and X. Zhang, "Location-aware topology matching in P2P Systems," in Proc. of IEEE INFOCOM, 2004. http://dx.doi.org/10.1109/INFCOM.2004.1354645
  23. W. Jia, D. Xuan, W. Tu, L. Lin, and W. Zhao, "Distributed admission control for anycast flows," IEEE Transactions on Parallel and Distributed Systems(TPDS), 2004. http://dx.doi.org/10.1109/TPDS.2004.34
  24. K. P. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, and J. Zahorjan, "Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload," in Proc. of the 19th ACM Symposium on Operating Systems Principles(SOSP), 2003.
  25. Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker, "Making Gnutella-like P2P Systems Scalable," in Proc. of ACM SIGCOMM, 2003.
  26. The Gnutella Protocol Specification v0.4, "http://www.clip2.com/GnutellaProtocol04.pdf".
  27. S. Zhu, S. Setia, S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," in Proc. of the Seventh IEEE International Symposium on Multimedia, 0-7695-2489-3/05 (2005). http://dx.doi.org/10.1145/948109.948120
  28. N. Saxena, G. Tsudik, J. H. Yi, "Admission Control in Peer-to-Peer: Design and Performance Evaluation," in Proc. of the first ACM Workshop Security of Ad Hoc and Sensor Networks Fairfax, 2003. http://dx.doi.org/10.1145/986858.986873
  29. J. Han, Y. Liu, L. Xiao, R. Xiao, and L. M. Ni, "A mutual anonymous peer-to-peer protocol design," in Proc. of 19th IEEE International Parallel and Distributed Processing Symposium, Denver, CO, United states, 2005. http://dx.doi.org/10.1109/IPDPS.2005.49
  30. B. Schneier, "Applied Cryptography-Protocols, Algorithms, and Source Code in C," second ed. John Wiley & Sons, Inc., 1996.
  31. J. Liao, J. Xiao, Y. Qi, P. Huang, and M. Rong, "ID-based signature scheme without trusted PKG," in Proc. of 1st Conference on Information Security and Cryptology, Beijing, China, 2005. http://dx.doi.org/10.1007/11599548_5
  32. Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Huai, Lionel M. Ni, Jian Ma, "Pseudo Trust: Zero-knowledge Authentication in Anonymous P2Ps", IEEE Transactions on Parallel and Distributed Systems, Vol. 19, No. 10, October, 2008. http://dx.doi.org/10.1109/TPDS.2008.15
  33. J. S. Han and Y. H. Liu, "Mutual Anonymity for Mobile P2P Systems," IEEE Transactions on Parallel and Distributed System, Vol. 19, No. 8, pp. 1009-1019, August, 2008. http://dx.doi.org/10.1109/TPDS.2007.70805
  34. Z. Y. Li, L. M. Wang and S. G. Chen, "Network Coding-Based Mutual Anonymity Communication Protocol for Mobile P2P Networks," in Proc. of 2012 IEEE 11th International Conference on Communications(TrustCom), pp. 986-991, June, 2012. http://dx.doi.org/10.1109/TrustCom.2012.211
  35. Y. H. Liu, J. S. Han and J. L. Wang, "Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems," IEEE Transactions on Parallel and Distributed Systems, Vol. 22, Issue 3, pp. 464-475, Feb. 2011. http://dx.doi.org/10.1109/TPDS.2010.98