1
Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations
5 Conventions
6 Concepts of P2P communications
6.1 Basic P2P service concept
6.2 Unstructured and structured P2P communications
7 Service scenarios of P2P communications
7.1 Information sharing and contents distribution
7.2 Communication platform
7.3 Groupware (Collaboration)
7.4 Distributed computing
8 Characteristics of P2P communications
9 Security threats to P2P communications
9.1 Eavesdropping
9.2 Communication jamming
9.3 Injection and modification of data
9.4 Unauthorized access
9.5 Repudiation
9.6 Man-in-the-middle attack
9.7 Sybil attack
10 Security requirements for P2P communications
10.1 User authentication
10.2 Anonymity
10.3 Privacy
10.4 Data integrity
10.5 Data confidentiality
10.6 Access control
10.7 Non-repudiation
10.8 Usability
10.9 Availability
10.10 Traceability
10.11 Traffic control
10.12 Relationship between security requirements and security threats
11 Security functions for satisfying security requirements of P2P
communications
11.1 Encipherment
11.2 Key exchange
11.3 Digital signature
11.4 Trust management
11.5 Access control
11.6 Data integrity mechanism
11.7 Authentication exchange
11.8 Notarization
11.9 Secure routing
11.10 Traffic control mechanism
11.11 ID assignment
11.12 Relationship between security requirements and functions
Bibliography