Overlay Protocol Prototype

Student: Aľchimionak Mikita
Student e-mail: alkhimionak1@uniba.sk
Supervisor: Janáček Jaroslav
Supervisor e-mail: jaroslav.janacek@uniba.sk

Short project description

This project implements a minimal, self-contained overlay network prototype. The goal is to demonstrate the core building blocks required for a decentralized, end-to-end encrypted peer network that does not rely on a central authority for node identity. The prototype focuses on the essential primitives that allow nodes to authenticate each other and to test connectivity across NATs. Full production-grade security hardening is outside the scope of the year project; the prototype focuses on concepts and a minimal working pipeline.

Core components (what I will implement)

  1. Node-master key generation
  2. Challenge–response tables
  3. Security primitives
  4. NAT check & NAT check server
  5. Poor man’s VPN (optional, for testing)

Optional / further possibilities

As a possible extension (not mandatory for the year project), the system could provide a TUN-based tunnel between points so that arbitrary traffic (IPv6/IPv4) may flow over the overlay. This "poor man’s VPN" makes sense conceptually, but it increases implementation scope significantly. This is described here as a possible further option so the project will remain manageable if time runs short.


Short glossary:
Node master key — long-term key that identifies a node (requires PoW).
Node — an individual identity signed by a node master.
Challenge–response table — precomputed pairs used to force expensive computation on a challenger and avoid DoS.
TUN — a kernel virtual network device used to route IP packets through user-space programs.