Font Size: a A A

The Research And Design Of P2P Trusted Authentication Model Based On Trust Chain

Posted on:2016-06-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y Y SunFull Text:PDF
GTID:2308330470478581Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the continuous development of P2P network, different kinds of network problems emerge endless. As decentralized network management factors in P2P network leading to poor data confidentiality were scattered, many kinds of P2P network security problems are overtaken. Identity authentication is the first defense in P2P network, which highlight the importance to ensure its security and integrity. According to a third party’s participation, existing authentication mechanisms can be divided intoones based on trusted third party certification bodies and no third party authentication.The former one has a problem in ensuring its own credibility. Although the later one avoids the third party’s credibility problem, to deal with the problems of preventing the authentication credentials from being leaked, forged or hijacked, there is no good way to solve them for now.Bitcoin is a kind of virtual currencies in P2P network. The main difference between Bitcoin and other virtual currency is that it does not depend on any particular issuers. It is created by a lot of computation using specific complex algorithm. It utilizes the distributed database to store all the transaction records, which makes the whole P2P network nodes join. By transforming the principle of Bitcoin trading and applying it into authentication can we achieve a authentication with high security and antifalsification in authentication credentials but without the participation of a third party.This paper focuses on designing the model of P2P trusted identity authentication based on an identity authentication trust chain, which is transformed by the Bitcoin trading chain, just call it Bit authentication model in this paper.Using the trust degree calculation method of the trust mode with uncertain factor to calculate the trust degree of this paper’s authentication model and the authentication model based on dynamic password and ECC in authentication credentials not be leaked, not be forged or hijacked. The results shows the trust degree of identity authentication model in this paper is higher than the former model. Using Loadrunner test tools to test with 100 users login, the test result shows that with or without the join of trust chain in the identity authentication, the average time of users completing the login and key validation logic do not have much increase, so the model is suitable for the real environment. Using wireshark traffic monitoring tool to test the I/O traffic when 100 users login, the result shows that the process of identity authentication does not consume a large amount of network bandwidthor affect the normal network link. The model proposed in this paper is practical.
Keywords/Search Tags:Trust, Trust chain, Authentication, P2P, Bitcoin chain
PDF Full Text Request
Related items