Peer-to-Peer Systems and Security (IN2194)

Lecturer (assistant)
  • Georg Carle [L]
  • Georg Carle [L]
  • Heiko Niedermayer
  • Sree Harsha Totakura
Duration3 SWS
TermSommersemester 2018
Language of instructionEnglish
Position within curriculaSee TUMonline
DatesSee TUMonline


Admission information

See TUMonline
Note: Registration via TUMonline.


see Module description IN2194


Peer-to-Peer (P2P) systems provide an alternative architecture for networking applications. The main assumption of P2P systems lies in the fact that there are no centralized components. This contrasts with traditional client-server architectures where the servers are centralized and are thus deemed as privileged or central components. This assumption brings many advantages (and disadvantages) to P2P systems. To name a few, without centralized components the applications are more fault tolerant, have no bottlenecks affecting their performance. When designed carefully, they scale better as the implicit fault tolerance also helps for load balancing in the network. Moreover, due to the absence of centralized components, P2P systems are good candidates for providing privacy to the users, which is vital for democratic societies. Naturally, as we thread away from centralization in P2P systems, issues arise which could be efficiently solved by having centralized control. The most pressing issue is that of attackers, who appear as normal/good peers but have malicious intent. This course serves to provide you the knowledge about existing P2P protocols and methods on how to enhance efficiency without sacrificing scalability and security. Briefly, the following topics are treated: * P2P Basics * Unstructured/structured P2P Systems * Distributed Hash Tables * Identities and Authentication * Attacks in P2P * P2P Applications: Multicast, Size Estimation, Botnets, Random Peer Sampling * Anonymity * Cryptocurriences & E-cash


Programming experience in writing Networking Applications

Teaching and learning methods



Klausur und Projekt, 6 ECTS