A new scalable distributed authentication for P2P network and its performance evaluation

Recently P2P networks become more and more popular. Though they have many advantages, P2P networks suffer from authentication of nodes. To overcome this problem, a new authentication method called Hash-based Distributed Authentication Method (HDAM) is proposed in this paper. HDAM realizes a decentralized efficient mutual authentication mechanism for each pair of nodes in the P2P network. It performs a distributed management of public keys by using Web of Trust and Distributed Hash Table. Our proposed scheme significantly reduces both the memory size requirement and the overhead of communication data sent by the nodes. Additionally, the results also show that required resource size of HDAM is O(logn) and HDAM is more scalable than the conventional method.

[1]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[2]  Jin-Soo Kim,et al.  Closed P2P system for PVR-based file sharing , 2005, IEEE Transactions on Consumer Electronics.

[3]  I. Sasase,et al.  On demand distributed public key management for wireless ad hoc networks , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..

[4]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[5]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[6]  Russ Housley,et al.  An Internet Attribute Certificate Profile for Authorization , 2010, RFC.

[7]  Jaime Lloret,et al.  The popularity parameter in unstructured P2P file sharing networks , 2004 .

[8]  Stamatios V. Kartalopoulos,et al.  Proceedings of the 12th WSEAS international conference on Computers , 2008 .

[9]  DU DavidH.-C.,et al.  Highly Adaptive Lookup Systems for P 2 P Computing , 2005 .

[10]  Burton S. Kaliski,et al.  PKCS #7: Cryptographic Message Syntax Version 1.5 , 1998, RFC.

[11]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[12]  M. Clement,et al.  Improving Routing Security Using a Decentralized Public Key Distribution Algorithm , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[13]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[14]  Tetsuo Kinoshita,et al.  A New Authentication Method with Distributed Hash Table for P2P Network , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).

[15]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[16]  Yiming Hu,et al.  Efficient, proximity-aware load balancing for DHT-based P2P systems , 2005, IEEE Transactions on Parallel and Distributed Systems.