A Group-oriented Access Control Scheme for P2P Networks

Full Text (PDF, 249KB), PP.30-37

Views: 0 Downloads: 0

Author(s)

Wang Xiaoming 1,* Cheng Fan 1

1. Jinan University, Guangzhou 510632, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2011.01.05

Received: 4 Nov. 2010 / Revised: 8 Dec. 2010 / Accepted: 5 Jan. 2011 / Published: 15 Feb. 2011

Index Terms

P2P Network, Access Control, Authentication Control, Added and Removed Members

Abstract

A group-oriented access control scheme is proposed for P2P (peer to peer) networks. In the proposed scheme, authentication control, admission control and revocation control are used in order to provide security services for P2P networks. Moreover, the proposed scheme can simply and efficient establish share key between two members without interactions, therefore it can perform secure communications with them. The analysis of security and performance shows that the proposed scheme not only can realize authentication and secure communication, but also can easily and efficiently add new group members and revoke malicious group members. Therefore, it is more efficient, and more practical protocol for P2P networks.

Cite This Paper

Wang Xiaoming, Cheng Fan,"A Group-oriented Access Control Scheme for P2P Networks", IJWMT, vol.1, no.1, pp.30-37, 2011. DOI: 10.5815/ijwmt.2011.01.05

Reference

[1] N. Saxena, G. Tsudik, and J.H.Yi. Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. 13th IEEE International Conference on Network Protocols, November 6-9, 2005, Boston, Massachusetts, USA.

[2] X,M.Wang. Decentralized Access Control Scheme for Dynamic Group. International Conference on Information Technology and Environmental Systems Sciences,2008.

[3] Y.Zhou, Y.Zhang,Y.Fang, Access control in wireless sensor networks, Ad Hoc Networks 5 ,2007: 3–13.

[4] H.F.Huang. A novel access control protocol for secure sensor networks. Computer Standards & Interfaces 31,2009: 272–276.

[5] H.S.Kim, S.W. Lee. Enhanced Novel Access Control Protocol over Wireless Sensor Networks .IEEE Transactions on Consumer Electronics, Vol. 55, No. 2, MAY 2009.

[6] C. Blundo, A.D.Santis, A.Herzberg, S.Kutten, U.VaccaroU, and M. Yung. Perfectly-Secure Key Distribution for Dynamic Conferences. In CRYPTO'92, number 740 in LNCS, 1992:48-52

[7] M.Naor, B.Pinkas, and O.Reingold. Distibuted Pseudo -Random Functions and KDCs. In EUROCRYPT'99, number 1592 in LNCS, 1999: 327-346.

[8] D. Liu, P.Ning. Establishing Pairwise Keys in Distributed Sensor Networks. In ACM Conference on Computers and Communication Security, Oct. 2003: 52-61.

[9] G.F. Gu, B.B.Zhu etc. PLI: A New Framework to Protect Digital Content for P2P Networks.In: The International conference application and network security. Kunming, china, 2003:206-216.