Detecting and Excluding Misbehaving Nodes in a P2P Network

Given their fully distributed architecture, P2P networks allow the design of low cost and high availability systems but also pose new security problems. In these collaborative networks, security properties need to be ensured by the participants themselves. In this paper, we propose to detect and exclude misbehaving nodes to allow honest participants to enforce security properties. The proposed scheme is fully distributed. RÉSUMÉ. De par leur nature totalement distribuée, les réseaux pair-à-pair permettent de mettre en place des systèmes à faible coût et haute disponibilité mais posent également de nouveaux problèmes de sécurité. Dans ces réseaux collaboratifs, les propriétés de sécurité doivent être garanties par les participants eux-mêmes. Dans cet article, nous proposons de détecter et d’exclure des nœuds malveillants afin de permettre aux nœuds honnêtes de garantir des propriétés de sécurité. Le système proposé est complètement distribué.

[1]  Robert Morris,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.

[2]  Valérie Viet Triem Tong,et al.  A Distributed Certification System for Structured P2P Networks , 2008, AIMS.

[3]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[4]  Divyakant Agrawal,et al.  Meghdoot: Content-Based Publish/Subscribe over P2P Networks , 2004, Middleware.

[5]  Valérie Viet Triem Tong,et al.  A sybilproof distributed identity management for P2P networks , 2008, 2008 IEEE Symposium on Computers and Communications.

[6]  Gene Tsudik,et al.  Admission control in peer groups , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..

[7]  Valérie Viet Triem Tong,et al.  A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification , 2008, 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[8]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[9]  Cullen Jennings,et al.  SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System , 2005, First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA'05).

[10]  David R. Karger,et al.  Wide-area cooperative storage with CFS , 2001, SOSP.

[11]  Miguel Castro,et al.  SplitStream: high-bandwidth multicast in cooperative environments , 2003, SOSP '03.

[12]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[13]  Matthew K. Franklin,et al.  Efficient generation of shared RSA keys , 2001, JACM.