A P2P content authentication protocol based on byzantine agreement

5Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

One of the main advantages of peer-to-peer (P2P) systems is their capability to offer replicas of the same content at various locations. This allows to access contents even when some nodes are disconnected. However, this high degree of redundancy implies that it is necessary to apply some security mechanisms in order to avoid attacks based on non-authorized content modification. In this paper, we propose a content authentication protocol for pure P2P systems. Under certain restrictions, our scheme provides guarantees that a content is authentic, i.e. it has not been altered, even if it is a replica of the original and the source has lost control over it. Our proposal relies on a set of peers playing the role of a certification authority, for it is unrealistic to assume that appropriate trusted third parties can be deployed in such environments. Finally, we discuss some of its security properties through several attack scenarios. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Palomar, E., Estevez-Tapiador, J. M., Hernandez-Castro, J. C., & Ribagorda, A. (2006). A P2P content authentication protocol based on byzantine agreement. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3995 LNCS, pp. 60–72). Springer Verlag. https://doi.org/10.1007/11766155_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free