Authentication in peer-to-peer systems
Independent thesis Basic level (professional degree)Student thesisAlternative title
Autenticering i peer-to-peer system (Swedish)
In the environment of the 3:rd generation Internet based on peer-to-peer architecture, well-trusted methods must exist to establish a secure environment. One main issue is the possibility to verify that a node actually is who it claims to be (authentication). Establishment of authentication between nodes in a peer-to-peer environment where nodes are exchanging information directly with each other requires more planning than in a typical client-server environment where the authentication methods are server-based. The peer-to-peer applications described in this report use authentication methods based on central authorities as well as solutions without central authorities.
Lack of standards in the way peer-to-peer systems should communicate and apply security lead to a variety of “local” communication and security solutions. These local solutions make different applications incompatible with each other, meaning that a peer using one application will not be able to communicate and exchange information with other peers using some other application.
Place, publisher, year, edition, pages
Institutionen för systemteknik , 2002. , 120 p.
Informationsteknik, P2P, peer-to-peer, peer, node, authentication, public key, certificate, ticket
Computer and Information Science
IdentifiersURN: urn:nbn:se:liu:diva-1222OAI: oai:DiVA.org:liu-1222DiVA: diva2:18480