期刊文献+

一种基于文件共享的P2P节点认证方案

A P2P Node Authentication Scheme Based on File Sharing
在线阅读 下载PDF
导出
摘要 身份认证是P2P(peer to peer)网络安全的重要组成部分,但传统的PKI(金钥基础设施)认证方式因为具有静态的集中化控制和固定的证书内容等特点,不能很好地满足P2P网络安全认证的需要,且在公钥的分发过程中容易遭受中间人攻击。为此,提出了一种新型的公钥管理架构和身份认证方案,每个节点可以自己产生并分发公私钥,认证服务器仅在节点加入网络时参与完成公钥的分发。超级节点负责管理本组内全部节点的公钥,节点在相互认证时无需认证服务器的参与,仅通过超级节点来完成。分析结果表明,这种认证方案可以有效地抵抗中间人攻击,在保持高效率的基础上又保证了认证的安全性。 Identity authentication is an important part of P2P network security. Traditional PKI authenticaton method can not adapt to the demand of P2P network security authentication due to its characteristics such as static centralized control and fixed certificate features. It is also vulnerable to man-in-the-middle attack during the process of common key distribution. In this paper, we propose a new common key management framework and identity authentication scheme. Each node can generate and distribute its own common key and private key. The certificate server works only during the process of common key distribution. The super node can manage the common keys of all the nodes in its group. When the nodes certificate each other, the super-node instead of the certificate server will manage the process. The analysis result shows that this authentication scheme can effectively resist man-in-the-middle attack and has higher security performance while keeping high efficiency.
出处 《信息化研究》 2009年第12期58-60,共3页 INFORMATIZATION RESEARCH
基金 中兴通讯高校合作基金
关键词 P2P 认证 公钥管理架构 中间人攻击 P2P authentication public key management framework man-in-the-middle attack
  • 相关文献

参考文献6

  • 1张国治,党小超,魏伟一.基于信任域的P2P访问控制模型研究[J].计算机技术与发展,2006,16(8):228-230. 被引量:9
  • 2屈晓辉.网络安全身份认证研究[M].北京:清华大学出版社,2006.
  • 3范林秀,陈舒娅,王喜进.基于PKI的身份认证在电子商务中的研究[J].电脑知识与技术(过刊),2007(22):979-980. 被引量:7
  • 4徐小平,尹颖禹.基于数字签名的身份认证模型的一种方案[J].计算机技术与发展,2006,16(2):220-222. 被引量:5
  • 5GU J,NAH J,CHAE C, et al. Random visitor: A defense against identity attacks in P2P overlay networks[ C ]//Proceeding of International Workshop on Information Security Applications ( WISA' 06 ), Aug 28-30, 2006, Jeju Island, Korea. LNCS4298. Berlin, Germany: Springer-verlag. 2006: 282-296.
  • 6BASET S A, SCHULZRINNE H. An analysis of the skype peer-to-peer intemet telephony protocol [ R ]. CUCS-039-44. New York, NY, USA: Computer Science Department of Columbia University ,2004.

二级参考文献13

  • 1张书钦,芦东昕,杨永田.对等网络中基于信任的访问控制研究[J].计算机科学,2005,32(5):31-33. 被引量:15
  • 2欧阳电平,孙炎林,赵丽.基于B/S模式的网络教学辅助系统的设计与实现——学生注册与在线学习管理[J].中国管理信息化,2006,9(7):57-59. 被引量:7
  • 3NashA DuaneW 等 张玉清 陈建奇 等译.公钥基础设施(PKI)实现和管理电子安全[M].北京:清华大学出版社,2002..
  • 4Ford W.Baum M S.安全电子商务—为数字签名和加密构造基础设施(第2版)[M].劳帼龄,等译.北京:人民邮电出版社,2002.
  • 5李明柱.PKI技术及应用开发指南[EB/OL].http://www-900.ibm.com/developerWorks/cn/security/se-pkiusing/index.shtml,2002-06.
  • 6Tran H,Hitchens M,Varadharaj V,et al.A Trust based Access Control Framework for P2P File-Sharing Systems[A].Proceedings of the 38th Hawaii International Conference on System Sciences,2005[C].Washington,DC,USA:IEEE Computer Society,2005.
  • 7Gupta R,Somani A K.Reputation Management Framework and Its Use as Currency in Large-Scale Peer-to-Peer Networks,p2p[A].Fourth International Conference on Peer-to-Peer Computing (P2P'04)[C].Washington,DC,USA:IEEE Computer Society,2004.124-132.
  • 8Dewan P,Dasgupta P.Securing P2P Networks Using Peer Reputations:Is there a silver bullet?[A].consumer communications & networking conferece[C].Nevada,USA:CEA,2005.
  • 9Neil D,Garcia-Molina H,Beverly Y.Open problems in data -sharing peer-to-peer systems[A].The 9th Int'l Conf on Database Theory (ICDT)[C].Siena,Italy:[s.n.],2003.1-15.
  • 10Li Xiong,Ling Liu.A Reputation-Based Trust Model for Peer-to-Peer eCommerce Communities[A].2003 IEEE International Conference on E-Commerce Technology (CEC'03)[C].New York:IEEE Comput Soc,2003.275-286.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部