Enabling Secure Routing in P2P Environment With TPMs (Part I)

Tien Tuan Anh Dinh :: Tuesday 31st March 2009

Venue: Room 245 @ 1200

Abstract. The term Peer-to-Peer (P2P) is often related to applications such as Napster, Kazaa, Bittorrent, etc. Current research in P2P mainly focuses in two distinct types of architectures, namely: unstructured and structured. This talks will be about the latter, which is more scalable and has been gaining more and more research attention.
Routing in structured P2P is very efficient under static network. However, due to its unique and deterministic way of storing and locating data objects, a malicious peer could easily compromise the routing protocol. In addition, Sybil attack - in which a malicious peer controls more than one identities - is always inherent in any P2P systems, because of their decentralised nature.
In this talks, I will describe my early attempt to counter attacks on P2P routing protocols. A main attack considered is the one in which a remote peer lies about it being the destination for a particular object. The assumption is that peers in the system have TPM-like devices enabled. I will explain a set of features and protocols available in the current TPM's specification that are used. Future work is highlighted at the end.