A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Abstract

Separation of identity and location is one of the key properties of peer-to-peer networks. However, this separation can be abused to mount attacks against the network itself. Our contribution in this matter is twofold: First, we present a security-first design for P2P networking based on self-certifying identifiers. It provides message authenticity, integrity of routing tables, and authenticated communication, is resistant (and not only resilient) against many typical peer-to-peer-specific attacks, and guarantees uniform identifier distribution. The second aspect of our contribution disproves the often-quoted assumption that proof-of-work-based identifier generation can sufficiently hinder certain peer-to-peer attacks such as the Sybil attack. This finding seriously questions previously roposed proof-of-work-based defence mechanisms and leads to the only conclusion possible: Proof-of-work-based measures to limit arbitrary identifier generation do not stand the test of reality.
Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks
EditorsRaheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu
Place of PublicationCham
PublisherSpringer International
Pages122-138
Number of pages16
Publication statusPublished - 2018
Event14th EAI International Conference on Security and Privacy in Communication Networks - , Singapore
Duration: 8 Aug 201810 Aug 2018
http://securecomm2018.eai-conferences.org/

Publication series

Name Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Volume255

Conference

Conference14th EAI International Conference on Security and Privacy in Communication Networks
Abbreviated titleSecureComm 2018
CountrySingapore
Period8/08/1810/08/18
Internet address

Fingerprint

Peer to peer networks
Communication

Cite this

Prünster, B., Kollmann, C. P., Suzic, B., & Ziegler, D. (2018). A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do. In R. Beyah, B. Chang, Y. Li, & S. Zhu (Eds.), Security and Privacy in Communication Networks (pp. 122-138). ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; Vol. 255). Cham: Springer International.

A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do. / Prünster, Bernd; Kollmann, Christian Paul; Suzic, Bojan; Ziegler, Dominik.

Security and Privacy in Communication Networks. ed. / Raheem Beyah; Bing Chang; Yingjiu Li; Sencun Zhu. Cham : Springer International, 2018. p. 122-138 ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; Vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Prünster, B, Kollmann, CP, Suzic, B & Ziegler, D 2018, A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do. in R Beyah, B Chang, Y Li & S Zhu (eds), Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering , vol. 255, Springer International, Cham, pp. 122-138, 14th EAI International Conference on Security and Privacy in Communication Networks, Singapore, 8/08/18.
Prünster B, Kollmann CP, Suzic B, Ziegler D. A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do. In Beyah R, Chang B, Li Y, Zhu S, editors, Security and Privacy in Communication Networks. Cham: Springer International. 2018. p. 122-138. ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ).
Prünster, Bernd ; Kollmann, Christian Paul ; Suzic, Bojan ; Ziegler, Dominik. / A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do. Security and Privacy in Communication Networks. editor / Raheem Beyah ; Bing Chang ; Yingjiu Li ; Sencun Zhu. Cham : Springer International, 2018. pp. 122-138 ( Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ).
@inproceedings{24bb24c355974006b232a05c05b441b2,
title = "A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do",
abstract = "Separation of identity and location is one of the key properties of peer-to-peer networks. However, this separation can be abused to mount attacks against the network itself. Our contribution in this matter is twofold: First, we present a security-first design for P2P networking based on self-certifying identifiers. It provides message authenticity, integrity of routing tables, and authenticated communication, is resistant (and not only resilient) against many typical peer-to-peer-specific attacks, and guarantees uniform identifier distribution. The second aspect of our contribution disproves the often-quoted assumption that proof-of-work-based identifier generation can sufficiently hinder certain peer-to-peer attacks such as the Sybil attack. This finding seriously questions previously roposed proof-of-work-based defence mechanisms and leads to the only conclusion possible: Proof-of-work-based measures to limit arbitrary identifier generation do not stand the test of reality.",
author = "Bernd Pr{\"u}nster and Kollmann, {Christian Paul} and Bojan Suzic and Dominik Ziegler",
year = "2018",
language = "English",
series = "Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering",
publisher = "Springer International",
pages = "122--138",
editor = "Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu",
booktitle = "Security and Privacy in Communication Networks",

}

TY - GEN

T1 - A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won’t Do

AU - Prünster, Bernd

AU - Kollmann, Christian Paul

AU - Suzic, Bojan

AU - Ziegler, Dominik

PY - 2018

Y1 - 2018

N2 - Separation of identity and location is one of the key properties of peer-to-peer networks. However, this separation can be abused to mount attacks against the network itself. Our contribution in this matter is twofold: First, we present a security-first design for P2P networking based on self-certifying identifiers. It provides message authenticity, integrity of routing tables, and authenticated communication, is resistant (and not only resilient) against many typical peer-to-peer-specific attacks, and guarantees uniform identifier distribution. The second aspect of our contribution disproves the often-quoted assumption that proof-of-work-based identifier generation can sufficiently hinder certain peer-to-peer attacks such as the Sybil attack. This finding seriously questions previously roposed proof-of-work-based defence mechanisms and leads to the only conclusion possible: Proof-of-work-based measures to limit arbitrary identifier generation do not stand the test of reality.

AB - Separation of identity and location is one of the key properties of peer-to-peer networks. However, this separation can be abused to mount attacks against the network itself. Our contribution in this matter is twofold: First, we present a security-first design for P2P networking based on self-certifying identifiers. It provides message authenticity, integrity of routing tables, and authenticated communication, is resistant (and not only resilient) against many typical peer-to-peer-specific attacks, and guarantees uniform identifier distribution. The second aspect of our contribution disproves the often-quoted assumption that proof-of-work-based identifier generation can sufficiently hinder certain peer-to-peer attacks such as the Sybil attack. This finding seriously questions previously roposed proof-of-work-based defence mechanisms and leads to the only conclusion possible: Proof-of-work-based measures to limit arbitrary identifier generation do not stand the test of reality.

M3 - Conference contribution

T3 - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

SP - 122

EP - 138

BT - Security and Privacy in Communication Networks

A2 - Beyah, Raheem

A2 - Chang, Bing

A2 - Li, Yingjiu

A2 - Zhu, Sencun

PB - Springer International

CY - Cham

ER -