A security infrastructure and methods are presented that inhibit the ability
of
a malicious node from disrupting the normal operations of a peer-to-peer network.
The methods of the invention allow both secure and insecure identities to be used
by nodes by making them self-verifying. When necessary or opportunistic, ID ownership
is validated by piggybacking the validation on existing messages. The probability
of connecting initially to a malicious node is reduced by randomly selecting to
which node to connect. Further, information from malicious nodes is identified
and can be disregarded by maintaining information about prior communications that
will require a future response. Denial of service attacks are inhibited by allowing
the node to disregard requests when its resource utilization exceeds a predetermined
limit. The ability for a malicious node to remove a valid node is reduced by requiring
that revocation certificates be signed by the node to be removed.