Use of peer-to-peer networks for secured communication
DOI:
https://doi.org/10.31649/mccs2022.20Keywords:
peer-to-peer network, distributed hash tables, asymmetric encryption, web of trust, authentication, graphAbstract
Peculiarities of the applied application of peering networks are considered (every node is equal; it can be both a client and a server). Mathematically, a decentralized network can be represented as a graph. The reasons for the emergence of peering networks are analyzed (low load on the client processor, the need to provide access to data and joint work on data). The classification of P2P networks according to three characteristics (functions, degree of centralization and method of connection) is also considered. The relevance and perspective of their application for personal communication, especially for data exchange within the company (required data security, fault tolerance and independence from Internet access) are determined.
A peering network organization model is proposed, which provides for increased data security (messages, files, audio, user settings, etc.), reliable authentication of nodes (based on a combination of manual key distribution and trust network principles), scalability of the network itself and expansion of its functional capabilities (sending text, files, support for audio, video, etc.). The software implementation should work on most modern devices and operating systems (Android, IOS, Windows, MacOS). The created model makes it possible to increase security due to the combination of various cryptographic algorithms and data exchange protocols. Data exchange is based on the Tox protocol, which involves the use of distributed hash tables and asymmetric encryption. Data transport using the Tox protocol is organized based on TCP and UDP. A graphic representation of the above-described model is given, as well as a key exchange scheme between nodes. The data is also stored at the node in a protected form, and it can be read only if the key is present.
References
Krentsin M. D., Kupershtein L. M. Analiz tendencii rozvitku pirinhovih merezh. Visnuk Khmenlytskogo natsionalnogo universitetu. Tekhnichni nayku. 2021. T. 4, № 299. S. 25–29. URL: http://journals.khnu.km.ua/vestnik/wp-content/uploads/2021/11/299-text_2021_4_t.pdf (accessed on: 07.11.2022).
Hauben M. The social forces behind the development of usenet. Columbia University in the City of New York. URL: http://www.columbia.edu/~hauben/book/ch106.x03 (accessed on: 07.11.2022).
Analiz problem pirinhovih merezh / М. D. Krencin ta in. Informacinii tekhnologii ta komputerna inzheneriia. 2022. Т. 54, № 2. s. 5–14. URL: https://doi.org/10.31649/1999-9941-2022-54-2-5-14.
What is a distributed hash table?. Educative: Interactive Courses for Software Developers. URL: https://www.educative.io/answers/what-is-a-distributed-hash-table (data zvernennia: 08.11.2022).
Tox documentation. Welcome to the tox automation project. URL: https://tox.wiki/en/latest/ (accessed on: 08.11.2022).
Curve25519: high-speed elliptic-curve cryptography. cr.yp.to. URL: https://cr.yp.to/ecdh.html (accessed on: 08.11.2022).
The GNU General Public License v3.0 - GNU Project - Free Software Foundation. URL: https://www.gnu.org/licenses/gpl-3.0.en.html (accesses on: 08.11.2022).
The TokTok project – Protocol. URL: https://toktok.ltd/spec.html (accessed on: 06.11.22).
Anonymous and Distributed Authentication for Peer-to-Peer Networks / P. Tennakoon ta in. URL: https://eprint.iacr.org/2021/838.pdf (accessed on: 08.11.2022).