Security

A Brief Comparison of Security Patterns for Peer to Peer Systems

Download Now Free registration required

Executive Summary

The peer-to-peer networks are depends on securely distributing the identities. So P2P networks are vulnerable to attacks against identities which include Eclipse Attack, Sybil Attack, etc. In the defense against such attacks the security patterns are provided and compared. The paper includes CA Certification using central server for securely providing the identities to users of P2P system. This paper also includes the distributed approach defined as self certification to provide the security in such a network. In this paper, the authors have compared these patterns using theoretical analysis and simulated network.

  • Format: PDF
  • Size: 277.1 KB