Enabling Secure Routing in P2P Environment With TPMs (Part I)
Tien Tuan Anh Dinh :: Tuesday 31st March 2009
Venue: Room 245 @ 1200
Abstract. The term Peer-to-Peer (P2P) is often related to applications such as
Napster, Kazaa, Bittorrent, etc. Current research in P2P mainly
focuses in two distinct types of architectures, namely: unstructured
and structured. This talks will be about the latter, which is
more scalable and has been gaining more and more research
attention.
Routing in structured P2P is very efficient under static
network. However, due to its unique and deterministic way of storing
and locating data objects, a malicious peer could easily compromise
the routing protocol. In addition, Sybil attack - in which a
malicious peer controls more than one identities - is always inherent
in any P2P systems, because of their decentralised nature.
In this talks, I will describe my early attempt to counter attacks on
P2P routing protocols. A main attack considered is the one in which a
remote peer lies about it being the destination for a particular
object. The assumption is that peers in the system have TPM-like
devices enabled. I will explain a set of features and protocols
available in the current TPM's specification that are used. Future
work is highlighted at the end.