期刊文献+

一种P2P网络中对等结点间的身份认证方法 被引量:1

A Peer-to-Peer Node Authentication Method in Peer-to-Peer Network
下载PDF
导出
摘要 随着P2P技术的快速发展,其在网络安全方面的问题也越来越突出,尤其在对等节点间的身份认证方面缺乏简单、可靠的方法来防止非法节点加入P2P网络实施攻击。现有身份认证方法多采用集中式认证,无法充分利用P2P网络特性,因此提出了一种基于"身份凭证"的对等节点间身份认证方法,每个用户登录时从认证服务器获得其身份凭证后便可以不依赖于认证服务器而完成对等节点间的身份认证,减轻了认证服务器的压力,在保障可靠身份认证的同时降低了认证过程的复杂度。 Various file sharing and streaming applications utilize P2P technologies to provide better service, many serious security problems obstruct their widely adoption. Especially, it lacks a simple and reliable mechanism to authenticate peers' identities. Related works usually propose centralized authentication methods, which are not quite suitable for P2P network. So an identity certificate based method used between peers authentication is presented. Every peer will get their own identity certificate from an authentication server when then login, then they could launch authentication process with other peers without the participation of the authentication server. This authentication mechanism could provide strong reliable identity authentication with less complexity, and greatly reduce the pressure of the central authentication server.
出处 《科学技术与工程》 2009年第21期6558-6561,共4页 Science Technology and Engineering
基金 国家"十一五"科技支撑计划项目基金(2006BAH02A11)资助
关键词 P2P网络 身份认证 身份凭证 peer-to-peer network peers authentication identity certificate
  • 相关文献

参考文献4

  • 1[美]Wadlow T A,网络安全与实施方法,北京:人民邮电出版社,2001.
  • 2Hahm Seongil, Jung Yongjae, Yi Seunghee, et al. A self-organized authentication architecture in mobile ad-hoc networks. International Conference on Information Networking. Jeju Island, South Korea, 2005 ;3391:689-696.
  • 3Gokhale S, Dasgupta P. Distributed authentication for peer-to-peer networks. Applications and the Internet Workshops. Orlando, FL, USA, 2003 : 347 -353.
  • 4贾素平,张玉清.P2P网络的认证方法研究(英文)[J].中国科学院研究生院学报,2007,24(6):820-828. 被引量:3

二级参考文献16

  • 1Napster. http ://www. napster. com.
  • 2Guntella. http://www. gnutella. com
  • 3Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings of 17th IEEE Symposium on Security and Privacy. Oakland: IEEE Computer Society Press, 1996. 164- 173.
  • 4Abdul-Rahman A, Hailes S. Supporting trust in virtual communities. In: Proceedings of 33rd Hawaii International Conference on System Sciences. Maui: IEEE Computer Society Press, 2000. 6007.
  • 5Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system. In: Proceedings of the 10th International Conference on Information and Knowledge Management. New York: ACM Press, 2001. 310- 317.
  • 6Xiong L, Liu L. A reputation-based trust model for peer-to-peer ecommerce communities. In: Proceedings of IEEE International Conference on Electronic Commerce. New York: ACM Press, 2003. 228 - 229.
  • 7Singh A, Liu L. TrustMe: anonymous management of trust relationships in decentralized P2P systems. In: Proceedings of the 3rd International Conference on Peer-to-Peer Computing. Washington, DC: IEEE Computer Society Press, 2003. 142 - 149.
  • 8Gupta M, Judge P, Ammar M. A reputation system for peer-to-peer networks. In: Proceedings of the 13th International Workshop on Network and Operating System Support for Digital Video and. Audio. New York: ACM Press, 2003. 144- 152.
  • 9Zhang Y, Li XX, Huai JP, et al. Access control in peer-to-peer collaborative systems. In: Proceedings of the 25th International Conference on Distributed Computing Systems (/EEE ICDCS' 05) Workshop on Mobility of Peer-to-Peer Systems. Ohio : IEEE Computer Society Press, 2005. 835-840.
  • 10Wierzbicki A, Zwierko A, Kotulski Z. Authentication with controlled anonymity in P2P systems. In: Proceedings of the Sixth IEEE International Conference on Parallel and Distributed Computing, AppIications and Technologies (PDCAT' 05). IEEE Computer Society Press, 2005. 871 - 875.

共引文献2

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部