End-to-End Key Exchange through Disjoint Paths in P2P Networks

Abstract : Due to their inherent features, P2P networks have proven to be effective in the exchange of data between autonomous peers. Unfortunately, these networks are subject to various security threats that cannot be addressed readily since traditional security infrastructures, which are centralized, cannot be applied to them. Furthermore, communication reliability across the Internet is threatened by various attacks, including usurpation of identity, eavesdropping or traffic modification. Thus, in order to overcome these security issues and allow peers to securely exchange data, we propose a new key management scheme over P2P networks. Our approach introduces a new method that enables a secret key exchange through disjoint paths in the absence of a trusted central coordination point which would be required in traditional centralized security systems.
Document type :
Journal articles
Complete list of metadatas

Cited literature [26 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-01117336
Contributor : Damien Magoni <>
Submitted on : Tuesday, March 8, 2016 - 10:48:07 AM
Last modification on : Thursday, January 11, 2018 - 6:20:17 AM
Long-term archiving on : Sunday, November 13, 2016 - 7:30:37 AM

File

ahmat-tss2014.pdf
Publisher files allowed on an open archive

Identifiers

Collections

Citation

Daouda Ahmat, Damien Magoni, Tegawendé F. Bissyandé. End-to-End Key Exchange through Disjoint Paths in P2P Networks. EAI Endorsed Transactions on Security and Safety, ICST, 2015, 15 (3), pp.15. ⟨10.4108/sesa.2.3.e3⟩. ⟨hal-01117336⟩

Share

Metrics

Record views

178

Files downloads

253