[en] Structured P2P networks have proven to be effective in the
exchange of data between nodes whose identity and content are generally
indexed in a DHT. For years, such DHT networks have allowed, among
other users, third world inhabitants, such as African people, to exchange
information among them and with the rest of the world without relying
on a centralized infrastructure. Unfortunately, more than ever, reliability
of communication across the Internet is threatened by various attacks,
including usurpation of identity, eavesdropping or traffic modification.
Thus, in order to overcome these security issues and allow peers to securely exchange data, we propose a new key management scheme that
enables to handle public keys in the absence of a central coordination
which would be required in a traditional PKI.
Disciplines :
Computer science
Author, co-author :
Ahmat, Daouda; Laboratoire Bordelais de Recherche en Informatique - LaBRI , Interdisciplinary Centre for Security, Reliability and Trust [Luxembourg] - SnT
Ahmat, D., Magoni, D.: Muses: Mobile user secured session. In: Wireless Days (WD), 2012 IFIP, pp. 1-6 (2012)
Avramidis, A., Kotzanikolaou, P., Douligeris, C., Burmester, M.: Chord-pki: a distributed trust infrastructure based on p2p networks. Comput. Netw. 56(1), 378-398 (2012)
Cassagnes, C., Tiendrebeogo, T., Bromberg, D., Magoni, D.: Overlay addressing and routing system based on hyperbolic geometry. In: ISCC'11 - IEEE International Symposium on Computers and Communications, pp. 294-301, 28 June-1 July 2011
Demmer, M.J.: A Delay Tolerant Networking and System Architecture for Developing Regions. Ph.D. thesis, University of California, Berkeley (2008)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644-654 (1976)
Epstein, D.B.A.: Curves on 2-manifolds and isotopies. Acta Math. 115(1), 15-16 (1966)
Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups (2000)
Kwon, H., Koh, S., Nah, J., Jang, J.: The secure routing mechanism for dht-based overlay network. In: 10th International Conference on Advanced Communication Technology, ICACT 2008, vol. 2, pp. 1300-1303 (2008)
Lee, P.P.C., Lui, J.C.S., Member, S., Yau, D.K.Y.: Distributed collaborative key agreement and authentication protocols for dynamic peer groups. IEEE/ACM Trans. Networking 14, 263-276 (2006)
Lilien, L., Kamal, Z., Gupta, A.: Opportunistic networks: challenges in specializing the p2p paradigm. In: 17th International Workshop on Database and Expert Systems Applications, DEXA'06, pp. 722-726 (2006)
Lindgren, A., Hui, P.: The quest for a killer app for opportunistic and delay tolerant networks (invited paper). In: CHANTS, pp. 59-66 (2009)
Manku, G.S., Bawa, M., Raghavan, P.: Symphony: Distributed hashing in a small world. In: Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems, pp. 127-140 (2003)
Morris, R., Karger, D., Kaashoek, F., Balakrishnan, H.: Chord: a scalable Peerto- Peer lookup service for internet applications. In: ACM SIGCOMM 2001, San Diego, CA, September 2001
Ouoba, J., Bissyandé, T.F.: Leveraging the cultural model for opportunistic networking in Sub-Saharan Africa. In: Jonas, K., Rai, I.A., Tchuente, M. (eds.) AFRICOMM 2012. LNICST, vol. 119, pp. 163-173. Springer, Heidelberg (2013)
Reich, J., Chaintreau, A.: The age of impatience: optimal replication schemes for opportunistic networks. In: CoNEXT, pp. 85-96 (2009)
Risson, J., Moors, T.: Survey of research towards robust peer-to-peer networks: search methods. Comput. Netw. 50(17), 3485-3521 (2006)
Saif, U., Chudhary, A.L., Butt, S., Butt, N.S., Murtaza, G.: Internet for the developing world: offline internet access at modem-speed dialup connections. In: International Conference on Information and Communication Technologies and Development, ICTD 2007, pp. 1-13 (2007)
Saif, U., Chudhary, A.L., Butt, S., Butt, N.F., Murtaza, G.: A peer-to-peer internet for the developing world. Inf. Technol. Int. Dev. 5(1), 31-47 (2009)
Srivatsa, M., Liu, L.: Vulnerabilities and security threats in structured overlay networks: a quantitative analysis. In: 20th Annual Computer Security Applications Conference, pp. 252-261 (2004)
Steiner, M., Tsudik, G., Waidner, M.: Diffie-hellman key distribution extended to group communication. pp. 31-37. ACM Press (1996)
Takano, Y., Isozaki, N., Shinoda, Y.: Multipath key exchange on p2p networks. In: The First International Conference on Availability, Reliability and Security, ARES 2006, p. 8 (2006)
Tiendrebeogo, T., Ahmat, D., Magoni, D.: Reliable and scalable distributed hash tables harnessing hyperbolic coordinates. In: 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1-6 (2012)
Urdaneta, V., Pierre, G., Steen, M.V.: A survey of dht security techniques. ACM Comput. Surv. 43(2), 8:1-8:49 (2011)
Wang, P., Osipkov, I., Kim, Y.: Myrmic: Secure and robust dht routing. Technical report (2007)
Wen, V., Shao-Zhang, N., Jian-Cheng, Z.: A key management mechanism for dht networks. In: 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp. 339-342 (2012)