End-to-End Key Exchange through Disjoint Paths in P2P Networks

Ahmat, Daouda and Magoni, Damien and Bissyandé, Tegawendé F. (2015) End-to-End Key Exchange through Disjoint Paths in P2P Networks. EAI Endorsed Transactions on Security and Safety, 2 (3). e3. ISSN 2032-9393

[img]
Preview
Text
sesa.2.3.e3.pdf
Available under License Creative Commons Attribution No Derivatives.

Download (1MB) | Preview

Abstract

Due to their inherent features, P2P networks have proven to be effective in the exchange of data between autonomous peers. Unfortunately, these networks are subject to various security threats that cannot be addressed readily since traditional security infrastructures, which are centralized, cannot be applied to them. Furthermore, communication reliability across the Internet is threatened by various attacks, including usurpation of identity, eavesdropping or traffic modification. Thus, in order to overcome these security issues and allow peers to securely exchange data, we propose a new key management scheme over P2P networks. Our approach introduces a new method that enables a secret key exchange through disjoint paths in the absence of a trusted central coordination point which would be required in traditional centralized security systems.

Item Type: Article
Uncontrolled Keywords: P2P networks, key management, Diffie-Hellman algorithm, MITM attacks, multipath routing, backtracking.
Subjects: H Social Sciences > H Social Sciences (General)
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
QA75 Electronic computers. Computer science
Depositing User: EAI Editor IV
Date Deposited: 26 Mar 2021 13:50
Last Modified: 26 Mar 2021 13:50
URI: https://eprints.eudl.eu/id/eprint/2026

Actions (login required)

View Item View Item