Autor/a

Arnedo-Moreno, Joan

Herrera Joancomartí, Jordi

Altres autors/es

Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)

Data de publicació

2010-02-16T11:57:36Z

2010-02-16T11:57:36Z

2008



Resum

In order to access resources within a peer-to-peer network, JXTA completely relies in the usage of advertisements published by the resource owner. This may easily lead to DoS or spoofing attacks from malicious peers by forging advertisements with false identifiers unless advertisement authenticity is pro- vided. Furthermore, in a fully distributed environment, in order to truly isolate a malicious node, collaboration is necessary from other peers. For that reason, it must be possible to prove to other parties that a peer is being disruptive. This paper presents a method that provides authenticity and non-repudiation to JXTA advertisements. This scheme is fully distributed and based in a pure peer-to-peer model, not requiring the arbitration of a trusted third party or a previously established trust relationship between peers, which is one of the main challenges under this kind of environments.

Tipus de document

Capítol o part de llibre

Llengua

Anglès

Matèries i paraules clau

JXTA (Computer network protocol); Computer networks -- Security measures; Java (Computer program language); JXTA (Protocols de xarxes d'ordinadors); Ordinadors, Xarxes d' -- Mesures de seguretat; Java (Llenguatge de programació); JXTA (Protocolos de comunicaciones); Redes informáticas -- Medidas de seguridad; Java (Lenguaje de programación)

Drets

(c) 2008 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.

Aquest element apareix en la col·lecció o col·leccions següent(s)