UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ITU-T X.1161

Framework for secure peer-to-peer communications

active, Most Current
Buy Now
Organization: ITU-T
Publication Date: 1 May 2008
Status: active
Page Count: 22
scope:

Peer-to-peer (P2P) is an instantiation of network architectures where all peers have equivalent authority and responsibility, differing completely from that of server and client system. In the case of P2P communications, a peer can be both the server and the client. When data or messages are exchanged in a P2P network, a peer communicates with other peers directly. Because traffic and processing are distributed to each peer, the P2P network does not require high performance computing power and high bandwidth network compared with the server and client system.

Because the P2P communication architecture differs from that of the server and client system, further security threats emerge, which are not applicable to server and client architecture. With this in mind, P2P applications should be carefully built while taking into consideration the security threats to P2P communications.

This Recommendation describes the framework for secure P2P communications, which includes security threats and security requirements for P2P communications. In addition, this Recommendation describes the security functions for satisfying the security requirements of P2P communications. Security architectures and operations of P2P communications are defined in [ITU-T X.1162].

Document History

ITU-T X.1161
May 1, 2008
Framework for secure peer-to-peer communications
Peer-to-peer (P2P) is an instantiation of network architectures where all peers have equivalent authority and responsibility, differing completely from that of server and client system. In the case...

References

Advertisement