Projects per year
Abstract
Separation of identity and location is one of the key properties of peer-to-peer networks. However, this separation can be abused to mount attacks against the network itself. Our contribution in this matter is twofold: First, we present a security-first design for P2P networking based on self-certifying identifiers. It provides message authenticity, integrity of routing tables, and authenticated communication, is resistant (and not only resilient) against many typical peer-to-peer-specific attacks, and guarantees uniform identifier distribution. The second aspect of our contribution disproves the often-quoted assumption that proof-of-work-based identifier generation can sufficiently hinder certain peer-to-peer attacks such as the Sybil attack. This finding seriously questions previously roposed proof-of-work-based defence mechanisms and leads to the only conclusion possible: Proof-of-work-based measures to limit arbitrary identifier generation do not stand the test of reality.
Original language | English |
---|---|
Title of host publication | Security and Privacy in Communication Networks |
Editors | Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu |
Place of Publication | Cham |
Publisher | Springer International |
Pages | 122-138 |
Number of pages | 16 |
Publication status | Published - 2018 |
Event | 14th EAI International Conference on Security and Privacy in Communication Networks - , Singapore Duration: 8 Aug 2018 → 10 Aug 2018 http://securecomm2018.eai-conferences.org/ |
Publication series
Name | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
---|---|
Volume | 255 |
Conference
Conference | 14th EAI International Conference on Security and Privacy in Communication Networks |
---|---|
Abbreviated title | SecureComm 2018 |
Country/Territory | Singapore |
Period | 8/08/18 → 10/08/18 |
Internet address |
Fingerprint
Dive into the research topics of 'A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do'. Together they form a unique fingerprint.-
A-SIT - Secure Information Technology Center Austria
Stranacher, K., Dominikus, S., Leitold, H., Marsalek, A., Teufl, P., Bauer, W., Aigner, M. J., Rössler, T., Neuherz, E., Dietrich, K., Zefferer, T., Mangard, S., Payer, U., Orthacker, C., Lipp, P., Reiter, A., Knall, T., Bratko, H., Bonato, M., Suzic, B., Zwattendorfer, B., Kreuzhuber, S., Oswald, M. E., Tauber, A., Posch, R., Bratko, D., Feichtner, J., Ivkovic, M., Reimair, F., Wolkerstorfer, J. & Scheibelhofer, K.
21/05/99 → 31/12/24
Project: Research area
-
SUNFISH - SUNFISH- Secure information sharing in federated heterogeneous private clouds
Reiter, A., Marsalek, A., Suzic, B., Posch, R., Leitold, H. & Reimair, F.
1/01/15 → 31/12/17
Project: Research project