A holistic approach towards peer-to-peer security and why proof of work won’t do

4Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Separation of identity and location is one of the key properties of peer-to-peer networks. However, this separation can be abused to mount attacks against the network itself. Our contribution in this matter is twofold: First, we present a security-first design for P2P networking based on self-certifying identifiers. It provides message authenticity, integrity of routing tables, and authenticated communication, is resistant (and not only resilient) against many typical peer-to-peer-specific attacks, and guarantees uniform identifier distribution. The second aspect of our contribution disproves the often-quoted assumption that proof-of-work-based identifier generation can sufficiently hinder certain peer-to-peer attacks such as the Sybil attack. This finding seriously questions previously proposed proof-of-work-based defence mechanisms and leads to the only conclusion possible: Proof-of-work-based measures to limit arbitrary identifier generation do not stand the test of reality.

Cite

CITATION STYLE

APA

Prünster, B., Ziegler, D., Kollmann, C., & Suzic, B. (2018). A holistic approach towards peer-to-peer security and why proof of work won’t do. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 255, pp. 122–138). Springer Verlag. https://doi.org/10.1007/978-3-030-01704-0_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free