Abstract

AbstractA critical requirement in overlay networks is to have unique, undeniable and verifiable identifiers for each node in the system.Without them, every node in such an overlay network would be able to impersonate other nodes or create an arbitrary amount of bogus nodes. Thus, a node or a group of nodes, could easily gain control over an overlay network by orchestrating such artificial nodes. Most proposed solutions are based on public key cryptography and public key infrastructures. Unfortunately, the process of issuing and distributing certificates is not solved for large scale overlay networks. In this work we provide a solution for creating unique, undeniable and verifiable identifiers for large-scale overlay networks using mechanisms provided by the Trusted Computing Group. We facilitate the use of a unique asymmetric key pair which has been created on a Trusted Platform Module and is vouched for by the manufacturer.KeywordsOverlay NetworkAuthentication ProtocolMutual AuthenticationReputation SystemTrusted Platform ModuleThese keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.