Secure naming structure and p2p application interaction

Christian Dannewitz, Teemu Rautio, Ove Strandberg

Research output: Contribution to conferenceConference articleProfessional


Many P2P applications use their own way to identify and address data relying on host centric addressing, limiting the access to the same data on potentially multiple locations for multiple P2P applications. There are potential benefits in providing a generic way to identify and address data so that multiple P2P systems can use the same data regardless of data location. The proposed secure naming structure provides a potential way to address these challenges with a common naming structure for all data and different needs. The additional feature of the proposal is securing the way data is addressed such that the receiver has the possibility to verify that the correct data is received. The secure naming structure should be beneficial as potential design principle in defining the two protocols identified as objectives in the PPSP charter. This document enumerates a number of design considerations to impact the design and implementation of the tracker-peer signaling and peer-peer streaming signaling protocols.
Original languageEnglish
Number of pages12
Publication statusPublished - 2010
MoE publication typeNot Eligible
Event78th Internet Engineering Task Force (IETF) Meeting - Maastricht, Netherlands
Duration: 25 Jul 201030 Jul 2010


Conference78th Internet Engineering Task Force (IETF) Meeting


Dive into the research topics of 'Secure naming structure and p2p application interaction'. Together they form a unique fingerprint.

Cite this