원문정보
초록
영어
This paper aims to analyze vulnerability of overlay networks for the existing P2P service and suggest a secure and efficient ESCORT network. Encryption functions are used to provide encryption, explicit mutual authentication and session keys are provided to ensure secure communication, and a middle object is suggested to maintain efficiency. Moreover, Time stamps are used for each communication process to provide effective network security service. Thus, the proposed ESCORT network provides not only security for P2P users but also other advantages such as user privacy protection, secure communication and effective security management through centralized control.
목차
1. Introduction
2. ANALYSIS OF EXISTING SCHEMES
2.1 The Distributed Schemes
2.2 Mudhakar Scheme
2.3 Existing pub-sub scheme
3. ESCORT NETWORK SCHEME
3.1 System parameters
3.2 Consist of protocol
3.3 Assumptions
3.4 System parameters
3.5 Architecture of the ESCORT
4. The analysis of ESCORT scheme
4.1 Analysis of security
4.2 Analysis of effectiveness
5. Conclusions
References
