Table of Contents
1Scope
2References
3Definitions
3.1Termsdefinedelsewhere
3.2TermsdefinedinthisRecommendation
4Abbreviations
5Conventions
6ConceptsofP2Pcommunications
6.1BasicP2Pserviceconcept
6.2UnstructuredandstructuredP2Pcommunications
7ServicescenariosofP2Pcommunications
7.1Informationsharingandcontentsdistribution
7.2Communicationplatform
7.3Groupware(Collaboration)
7.4Distributedcomputing
8CharacteristicsofP2Pcommunications
9SecuritythreatstoP2Pcommunications
9.1Eavesdropping
9.2Communicationjamming
9.3Injectionandmodificationofdata
9.4Unauthorizedaccess
9.5Repudiation
9.6Man-in-the-middleattack
9.7Sybilattack
10SecurityrequirementsforP2Pcommunications
10.1Userauthentication
10.2Anonymity
10.3Privacy
10.4Dataintegrity
10.5Dataconfidentiality
10.6Accesscontrol
10.7Non-repudiation
10.8Usability
10.9Availability
10.10Traceability
10.11Trafficcontrol
10.12Relationshipbetweensecurityrequirementsand
securitythreats
11Securityfunctionsforsatisfyingsecurityrequirements
ofP2Pcommunications
11.1Encipherment
11.2Keyexchange
11.3Digitalsignature
11.4Trustmanagement
11.5Accesscontrol
11.6Dataintegritymechanism
11.7Authenticationexchange
11.8Notarization
11.9Securerouting
11.10Trafficcontrolmechanism
11.11IDassignment
11.12Relationshipbetweensecurityrequirementsand
functions
Bibliography Abstract
Specifies security threats and security requirements to the peer-to-peer (P2P) communications based on the service scenarios and characteristics of P2P communications.