Peer-to-Peer Computing, IEEE International Conference on (2005)
Aug. 31, 2005 to Sept. 2, 2005
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/P2P.2005.40
Amit D. Lakhani , University of London
Kenneth G. Paterson , University of London
Shane Balfe , University of London
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security services within these networks, namely the absence of stable verifiable peer identities. We employ the functionalities provided by Trusted Computing technology to establish a pseudonymous authentication scheme for peers and extend this scheme to build secure channels between peers for future communications. In support of our work, we illustrate how commands from the Trusted Computing Group (TCG) specifications can be used to implement our approach in P2P networks.
Amit D. Lakhani, Kenneth G. Paterson, Shane Balfe, "Trusted Computing: Providing Security for Peer-to-Peer Networks", Peer-to-Peer Computing, IEEE International Conference on, vol. 00, no. , pp. 117-124, 2005, doi:10.1109/P2P.2005.40