2015
DOI: 10.4108/sesa.2.3.e3
|View full text |Cite
|
Sign up to set email alerts
|

End-to-End Key Exchange through Disjoint Paths in P2P Networks

Abstract: International audienceDue to their inherent features, P2P networks have proven to be effective in the exchange of data between autonomous peers. Unfortunately, these networks are subject to various security threats that cannot be addressed readily since traditional security infrastructures, which are centralized, cannot be applied to them. Furthermore, communication reliability across the Internet is threatened by various attacks, including usurpation of identity, eavesdropping or traffic modification. Thus, i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 24 publications
(31 reference statements)
0
1
0
Order By: Relevance
“…Our future work will consist in completing and improving our current implementation as well as integrating a key management scheme suitable for dynamic networks to provide the users with a means to exchange or generate secret keys in-band. To this end, we have designed a key generation technique based on the Shamir's secret sharing method and using multiple disjoint paths in the overlay, for creating a secret key without requiring certificates such as in Diffie-Hellman [25]. We are currently evaluating this technique and we plan to insert it in the negotiation phase of a SEMOS connection.…”
Section: Resultsmentioning
confidence: 99%
“…Our future work will consist in completing and improving our current implementation as well as integrating a key management scheme suitable for dynamic networks to provide the users with a means to exchange or generate secret keys in-band. To this end, we have designed a key generation technique based on the Shamir's secret sharing method and using multiple disjoint paths in the overlay, for creating a secret key without requiring certificates such as in Diffie-Hellman [25]. We are currently evaluating this technique and we plan to insert it in the negotiation phase of a SEMOS connection.…”
Section: Resultsmentioning
confidence: 99%