A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Bernd Prünster, Christian Paul Kollmann, Bojan Suzic, Dominik Ziegler

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

Separation of identity and location is one of the key properties of peer-to-peer networks. However, this separation can be abused to mount attacks against the network itself. Our contribution in this matter is twofold: First, we present a security-first design for P2P networking based on self-certifying identifiers. It provides message authenticity, integrity of routing tables, and authenticated communication, is resistant (and not only resilient) against many typical peer-to-peer-specific attacks, and guarantees uniform identifier distribution. The second aspect of our contribution disproves the often-quoted assumption that proof-of-work-based identifier generation can sufficiently hinder certain peer-to-peer attacks such as the Sybil attack. This finding seriously questions previously roposed proof-of-work-based defence mechanisms and leads to the only conclusion possible: Proof-of-work-based measures to limit arbitrary identifier generation do not stand the test of reality.
Originalspracheenglisch
TitelSecurity and Privacy in Communication Networks
Redakteure/-innenRaheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu
ErscheinungsortCham
Herausgeber (Verlag)Springer International
Seiten122-138
Seitenumfang16
PublikationsstatusVeröffentlicht - 2018
Veranstaltung14th EAI International Conference on Security and Privacy in Communication Networks - , Singapur
Dauer: 8 Aug. 201810 Aug. 2018
http://securecomm2018.eai-conferences.org/

Publikationsreihe

Name Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Band255

Konferenz

Konferenz14th EAI International Conference on Security and Privacy in Communication Networks
KurztitelSecureComm 2018
Land/GebietSingapur
Zeitraum8/08/1810/08/18
Internetadresse

Fingerprint

Untersuchen Sie die Forschungsthemen von „A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren