Dealing with sporadic strangers, or the (Un)suitability of trust for mobile P2P security

被引:0
|
作者
Palomar, Esther [1 ]
Tapiador, Juan M. E. [1 ]
Hernandez-Castro, Julio C. [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Avda Univ 30, Madrid 28911, Spain
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulated a general trend towards extending Peer-to-Peer (PY) characteristics to wireless environments. As a result, the P2P paradigm has begun to migrate to pervasive computing scenarios. So far research in this domain has led to some middleware models working over Mobile Ad Hoc Networks (MANETs), which are now viewed as a Mobile-P2P (M-P2P) networks. However, the highly dynamic, decentralized and self-organizing nature of MANETs does not fit well with many approaches developed in the P2P world. In particular it does not seem easy to deploy security solutions for M-P2P due, among other reasons, to the inherent limitations of the peers' devices and their potentially very sporadic interaction with other peers. Under these assumptions, a significant challenge is how to establish a decentralized trust management system. In this paper we first summarize the advances in M-P2P security services and point out potential future applications based on opportunistic interactions. Then, we discuss several kind of threats and attacks, and finally analyze the (un)suitability of employing trust-based systems in some of these environments.
引用
收藏
页码:779 / +
页数:2
相关论文
共 50 条
  • [1] Autonomy, Heterogeneity, Trust, Security, and Privacy in Mobile P2P Environments
    Veijalainen, Jari
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (01): : 57 - 71
  • [2] A P2P Security Model Based on Trust and Availability
    Liu Yihe
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 69 - 72
  • [3] Privacy, security and trust in P2P environments: A perspective
    Mondal, Anirban
    Kitsuregawa, Masaru
    SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, : 682 - +
  • [4] Research on trust model in the mobile P2P network
    Chen, Jiahua
    Guo, Xiaobin
    Li, Zhihuai
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION, CYBERNETICS AND COMPUTATIONAL SOCIAL SYSTEMS (ICCSS), 2017, : 528 - 532
  • [5] Autonomy, heterogeneity and trust in mobile P2P environments
    Veijalainen, Jari
    MUE: 2007 International Conference on Multimedia and Ubiquitous Engineering, Proceedings, 2007, : 41 - 47
  • [6] Analysis on Security Issues for Mobile P2P Networks
    Tang Hong-Bo
    Yang Zhi-Xing
    Chen Long
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [7] A Novel Trust Evaluation Model for Mobile P2P Networks
    Wu, Xu
    NETWORK AND PARALLEL COMPUTING, 2010, 6289 : 210 - 219
  • [8] A distributed trust management model for mobile P2P networks
    Xu Wu
    Peer-to-Peer Networking and Applications, 2012, 5 : 193 - 204
  • [9] A distributed trust management model for mobile P2P networks
    Wu, Xu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2012, 5 (02) : 193 - 204
  • [10] Environmental Context Aware Trust in Mobile P2P Networks
    Rathnayake, Upendra
    Sivaraman, Vijay
    Boreli, Roksana
    2011 IEEE 36TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2011, : 324 - 332