Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.4.103

Designing Reliable P2P Transmission Mechanism Against MITM Attack  

Kim, Sang-Choon (Gangwon National University)
Kwon, Hyeonk-Chan (Electronics and Telecommunications Research Institute)
Nah, Jae-Hoon (Electronics and Telecommunications Research Institute)
Abstract
Many Internet application provide the PKI(public key infrastructure)-based service to provide authentication and message integrity. Several researchers proposed PKI-based p2p network framework. However, in the real world, the use of PKI is not suitable for peer to peer network, because the peer-to-peer network is an open and dynamic network. Moreover, currently there is no nation-to-nation interoperable certificate. In this paper, we designed reliable p2p file sharing application without public key infrastructure. To do this we propose reliable public key distribution mechanism to distribute public key safely without PKI infrastructure for two-tier super-peer architecture. In our system, each peer generates and distributes its public/private key pairs, and the public key is securely distributed without PKI. The proposed mechanism is safe against MITM attack. This mechanism can be applied various P2P applications such as file sharing, IPTV, distributed resource sharing and so on
Keywords
P2P security; MITM; Public key distribution; PKI; self-certificate;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Thomas Wolfl, 'Public-Key-Infrastructure Based on a Peer-to-Peer Network', Proceedings of the 38th Hawaii International Conference on System Sciences, 2005
2 S.A.Baset and H.Schulzrinne, 'An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol', Computer Science Department, Columbia University, Tech. Rep. CUCS-039-44, 2004
3 J.Gu, J.Nah, C.Chae, J.Lee and J.Jang, 'Random Visitor: a Defense against Identity Attacks in P2P Overlay Networks', LNCS 4298(WISA2006), 2006
4 T.Dengler and al, The Project JXTA2.0 Super-Peer Virtual Network, Sun Microsystems, Tech. rep. May, 2003
5 K. Berket, A. Essiari and A. Muratas , 'PKI-Based Security for Peer-to-Peer Information Sharing', Proceedings of the Fourth IEEE International Conference on Peer-to-Peer Computing, Zurich, Switzerland, Aug. 25-27, 2004
6 Reidemeister, T., Ward, P.A.S., Bohm, K., Buchmann, E., 'Malicious Behaviour in Content-Addressable Peer-to-Peer Networks', 3rd Annual Conference on Communication Networks and Service Research, pp.319-326, May 2005
7 'LionShare P2P Profile of SAML', Tech. Report, Pennsylvania State University, 2005
8 J.Risson and T.Moors, 'Survey of research towards robust peer-to-peer networks: Search method', IRTF Internet Draft, draft-irtf-p2prg-survey-search-00.txt, Mar. 2006
9 Mudhakar Srivatsa and Ling Liu, 'Vulnerabilities and Security Threats in Structured Overlay', Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04), 2004