A secure and resilient communication infrastructure for decentralized networking applications

نویسنده

  • Matthias Wachs
چکیده

The contribution of this thesis is the study, design and implementation of a resilient and secure communication infrastructure for decentralized peer-to-peer networks. On today’s Internet, free and unrestricted communication between users is often restricted due to limited connectivity between participants, attempts to degrade service for certain traffic classes and other filtering and manipulation attempts. Peer-to-peer networks are in particular impacted by these effects since peer-to-peer networks are a target for censorship attempts due to the lack of a centralized node to control, their dependency on end-to-end connectivity and on a neutral network treating all traffic classes equally. In this thesis, we design and implement a communication infrastructure for decentralized peer-to-peer networks employing existing Internet infrastructure and technologies with the goal of re-establishing unhindered communication between users. The proposed communication infrastructure tries to provide and improve connectivity between participants and to improve quality of service for applications by detecting and counteracting traffic management and degradation attempts. The communication infrastructure has the goal to make communication resilient against censorship attempts and provides with GNS a public key infrastructure that provides a secure, resilient, and privacy-preserving way to map human-memorable names to addresses and other information. This thesis starts with a motivation for the objective of this work introducing and explaining limitations with respect to unrestricted communication on today’s Internet. We describe the different parties interested in controlling and influencing traffic on the Internet and their motivations and give an overview over technical restrictions to unrestricted communication a communication infrastructure tailored for the requirements of decentralized peer-to-peer networks and trying to provide resilient communication has to cope with and counteract. As a second step, we analyze if the current Internet can provide a suitable foundation for resilient communication between peers in a peer-to-peer overlay network. For this evaluation, we analyze how resilient the Internet and its routing infrastructure is against Byzantine failures of providers or links between networks and what impact these failures have on routing in a peer-to-peer network. We use a graph representation of the Internet topology generated from BGP routing data and path measurement data and apply a new graph separation heuristic to find the smallest set of providers and networks to partition the Internet. The size of the resulting separators gives evidence how hard it is to partition the Internet in a way that prevents communication between partitions and therefore could have an impact on routing between peers in the peer-to-peer overlay. We then present the design and implementation of a resilient and secure communication infrastructure for the GNUnet peer-to-peer framework. This communication infrastructure has the goal to increase connectivity between participants, improve connectivity for peers in restricted environments, counteract service degradation and traffic manipulation attempts and provide secure communication between participants of the peer-to-peer network. One of the key approaches used to detect and counteract service degradation is to support multiple transport mechanisms and to provide the possibility to

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

POST: A Secure, Resilient, Cooperative Messaging System

POST is a decentralized messaging infrastructure that supports a wide range of collaborative applications, including electronic mail, instant messaging, chat, news, shared calendars and whiteboards. POST is highly resilient, secure, scalable and does not rely on dedicated servers. Instead, POST is built upon a peer-to-peer (p2p) overlay network, consisting of participants’ desktop computers. PO...

متن کامل

A Decentralized Location and Routing Infrastructure for Fault-tolerant Wide-area Network Applications

Today’s Moore’s Law increases in computational power and network bandwidth, combined with the increasing reach of networks into diverse environments and devices, offer new opportunities to and stretch the bounds of traditional network applications. More specifically, new challenges of scalability, fault-tolerance and manageability stretch the limits of the communication components of applicatio...

متن کامل

Multifeatured and Integrated P2P Platform for Distributed Networking Application Using Juxtapose

There is an increasing need to design and deploy multifeatured networking applications due to the fast growth of the Internet infrastructure and the use of large-scale complex applications in industries, transport, logistics, government, health, and businesses,. Important features of such applications include the capability to be self-organized, be decentralized, integrate different types of re...

متن کامل

Independent Policy Oriented Layering of Security Services

Implementing a security policy has to cope with the diversity of communication requirements and applications. We present a policy oriented approach from the observation of common problems and characteristics given in networked applications. The solution reduces the trust required into the security system to a single entity. This is done in an application independent manner by fooling the applic...

متن کامل

A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks

Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a major concern. To resist against malicious attacks, secure communication between severely resource-constrained sensor nodes is necessary while maintaining scalability and flexibility to topology chan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015