Dealing with sporadic strangers, or the (Un)suitability of trust for mobile P2P security

被引:0
|
作者
Palomar, Esther [1 ]
Tapiador, Juan M. E. [1 ]
Hernandez-Castro, Julio C. [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Avda Univ 30, Madrid 28911, Spain
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulated a general trend towards extending Peer-to-Peer (PY) characteristics to wireless environments. As a result, the P2P paradigm has begun to migrate to pervasive computing scenarios. So far research in this domain has led to some middleware models working over Mobile Ad Hoc Networks (MANETs), which are now viewed as a Mobile-P2P (M-P2P) networks. However, the highly dynamic, decentralized and self-organizing nature of MANETs does not fit well with many approaches developed in the P2P world. In particular it does not seem easy to deploy security solutions for M-P2P due, among other reasons, to the inherent limitations of the peers' devices and their potentially very sporadic interaction with other peers. Under these assumptions, a significant challenge is how to establish a decentralized trust management system. In this paper we first summarize the advances in M-P2P security services and point out potential future applications based on opportunistic interactions. Then, we discuss several kind of threats and attacks, and finally analyze the (un)suitability of employing trust-based systems in some of these environments.
引用
收藏
页码:779 / +
页数:2
相关论文
共 50 条
  • [21] Trust Model for P2P Networks
    Ma, Yi
    Wang, Dongqi
    Chen, Dongming
    INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND INTELLECTUALIZATION (ICEITI 2016), 2016, : 562 - 568
  • [22] Study on Trust Model in P2P
    Gan Zhi-gang
    INNOVATIVE COMPUTING AND INFORMATION, ICCIC 2011, PT I, 2011, 231 : 295 - 301
  • [23] An improved trust model in P2P
    Ren, Xiaohui
    Li, Kenli
    Renfa-Li
    Yang, Lei
    APSCC: 2006 IEEE ASIA-PACIFIC CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2006, : 76 - +
  • [24] P2P Recommendation Trust Model
    Wang, Xuan
    Wang, Lei
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 591 - 595
  • [25] Trust Evaluation for P2P Systems
    Wang Liang
    Guo Yajun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12592 - 12595
  • [26] Time self-decay trust management algorithm for P2P computing security
    National Engineering Center for Fundamental Software, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2007, 1 (1-10): : 1 - 10
  • [27] P2P access control research based on interest classification, trust and security grade
    Liu, Yi-He
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 674 - 678
  • [28] A Novel Multi-level Trust Model to Improve the Security of P2P Networks
    Zuo, Cuihua
    Zhou, Jianfang
    Feng, Hongcai
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 100 - 104
  • [29] P2P soft security: On evolutionary dynamics of P2P incentive mechanism
    Wang, Yufeng
    Nakao, Akihiro
    Vasilakos, Athanasios V.
    Ma, Jianhua
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 241 - 249
  • [30] Trust Similarity Measure in Trust Model for P2P Networks
    Ren, Yizhi
    Li, Mingchu
    Guo, Cheng
    Cui, Yongrui
    Sakurai, Kouichi
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 107 - +