Proposal and Performance Evaluation of Hash-based Authentication for P2P Network
スポンサーリンク
概要
- 論文の詳細を見る
Recently, P2P networks have been evolving rapidly. Efficient authentication of P2P network nodes remains a difficult task. As described herein, we propose an authentication method called Hash-based Distributed Authentication Method (HDAM), which realizes a decentralized efficient mutual authentication mechanism for each pair of nodes in a P2P network. It performs distributed management of public keys using Web of Trust and a Distributed Hash Table. The scheme markedly reduces both the memory size requirement and the overhead of communication data sent by the nodes. Simulation results show that HDAM can reduce the required memory size by up to 95%. Furthermore, the results show that HDAM is more scalable than the conventional method: the communication overhead of HDAM is <i>O</i>(log <i>p</i>).
- 一般社団法人情報処理学会の論文
- 2009-02-15
著者
-
Norio Shiratori
Graduate School Of Information Sciences Tohoku University | Research Institute Of Electrical Communi
-
Atushi Takeda
Department of Intelligent Information Systems, Tohoku Bunka Gakuen University,Graduate School of Inf
-
Debasish Chakraborty
Research Institute of Electrical Communication, Tohoku University
-
Gen Kitagata
Graduate School of Information Sciences, Tohoku University,Research Institute of Electrical Communic
-
Kazuo Hashimoto
Graduate School of Information Sciences, Tohoku University
-
Gen Kitagata
Research Institute of Electrical Communication Tohoku University Graduate School of Information Scie
-
Atushi Takeda
Department Of Intelligent Information Systems Tohoku Bunka Gakuen University Graduate School Of Info
-
Debasish Chakraborty
Research Institute Of Electrical Communication Tohoku University
-
Kazuo Hashimoto
Graduate School Of Information Sciences Tohoku University
-
Gen Kitagata
Graduate School of Information Sciences, Tohoku University|Research Institute of Electrical Communication, Tohoku University
関連論文
- Design of Adaptive Communication Mechanism for Ubiquitous Multiagent Systems
- Proposal and Performance Evaluation of Hash-based Authentication for P2P Network
- A New QoS Routing Scheme Based on Bandwidth Consumption for MANETs
- Symbiotic Computing Based Approach Towards Reducing User's Burden Due to Information Explosion
- Numerosity Reduction for Resource Constrained Learning (Preprint)