Return to search

Authentication in peer-to-peer systems / Autenticering i peer-to-peer system

<p>In the environment of the 3:rd generation Internet based on peer-to-peer architecture, well-trusted methods must exist to establish a secure environment. One main issue is the possibility to verify that a node actually is who it claims to be (authentication). Establishment of authentication between nodes in a peer-to-peer environment where nodes are exchanging information directly with each other requires more planning than in a typical client-server environment where the authentication methods are server-based. The peer-to-peer applications described in this report use authentication methods based on central authorities as well as solutions without central authorities. </p><p>Lack of standards in the way peer-to-peer systems should communicate and apply security lead to a variety of “local” communication and security solutions. These local solutions make different applications incompatible with each other, meaning that a peer using one application will not be able to communicate and exchange information with other peers using some other application.</p>

Identiferoai:union.ndltd.org:UPSALLA/oai:DiVA.org:liu-1222
Date January 2002
CreatorsÅslund, Jonas
PublisherLinköping University, Department of Electrical Engineering, Institutionen för systemteknik
Source SetsDiVA Archive at Upsalla University
LanguageEnglish
Detected LanguageEnglish
TypeStudent thesis, text
RelationLiTH-ISY-Ex, ; 3153

Page generated in 0.0017 seconds