A Secure Routing Protocol for Peer-to-Peer Network

In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To address this issue, we propose a secure protocol which consists of two phases: detecting malicious nodes and bypassing them. We present a novel efficient routing strategy called tracer routing to control routing progress, accompanied by a node-ID based signature scheme. Combining these two, the source of each query can verify each step and malicious nodes can be identified. We also present a scheme to create a secure path to bypass malicious nodes. With high probability, each query can successfully reach the destination even if there are a large number of malicious nodes in the system. Simulation results show the superiority of our protocol in comparison with previous protocols.

[1]  CastroMiguel,et al.  Secure routing for structured peer-to-peer overlay networks , 2002 .

[2]  Bruce Lowekamp,et al.  The design of a versatile, secure P2PSIP communications architecture for the public internet , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[3]  Eng Keong Lua,et al.  Embeddable Overlay Networks , 2007, 2007 12th IEEE Symposium on Computers and Communications.

[4]  Dan S. Wallach,et al.  A Survey of Peer-to-Peer Security Issues , 2002, ISSS.

[5]  Ben Y. Zhao,et al.  An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .

[6]  Antonio F. Gómez-Skarmeta,et al.  A novel methodology for constructing secure multipath overlays , 2005, IEEE Internet Computing.

[7]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[8]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[9]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[10]  Christian Cachin On-Line Secret Sharing , 1995, IMACC.

[11]  Gábor Tardos,et al.  On-line secret sharing , 2011, Designs, Codes and Cryptography.

[12]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[13]  Robert Tappan Morris,et al.  Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.

[14]  Eng Keong Lua,et al.  Securing peer-to-peer overlay networks from Sybil Attack , 2007, 2007 International Symposium on Communications and Information Technologies.