Dealing with sporadic strangers, or the (Un)suitability of trust for mobile P2P security

被引:0
|
作者
Palomar, Esther [1 ]
Tapiador, Juan M. E. [1 ]
Hernandez-Castro, Julio C. [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Avda Univ 30, Madrid 28911, Spain
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulated a general trend towards extending Peer-to-Peer (PY) characteristics to wireless environments. As a result, the P2P paradigm has begun to migrate to pervasive computing scenarios. So far research in this domain has led to some middleware models working over Mobile Ad Hoc Networks (MANETs), which are now viewed as a Mobile-P2P (M-P2P) networks. However, the highly dynamic, decentralized and self-organizing nature of MANETs does not fit well with many approaches developed in the P2P world. In particular it does not seem easy to deploy security solutions for M-P2P due, among other reasons, to the inherent limitations of the peers' devices and their potentially very sporadic interaction with other peers. Under these assumptions, a significant challenge is how to establish a decentralized trust management system. In this paper we first summarize the advances in M-P2P security services and point out potential future applications based on opportunistic interactions. Then, we discuss several kind of threats and attacks, and finally analyze the (un)suitability of employing trust-based systems in some of these environments.
引用
收藏
页码:779 / +
页数:2
相关论文
共 50 条
  • [31] A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P
    Hwan-Seok Yang
    Jae-Hoon Sun
    Peer-to-Peer Networking and Applications, 2016, 9 : 578 - 587
  • [32] Network Security Technology in P2P
    Zhang, Pengwei
    Jiao, Xiaojing
    Zhou, Ruijin
    ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, 2011, 153 : 145 - 149
  • [33] Ad hoc and P2P security
    Shieh, SW
    Wallach, DS
    IEEE INTERNET COMPUTING, 2005, 9 (06) : 14 - 15
  • [34] A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P
    Yang, Hwan-Seok
    Sun, Jae-Hoon
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (03) : 578 - 587
  • [35] Dealing with Incompleteness and Inconsistency in P2P Deductive Databases
    Caroprese, Luciano
    Zumpano, Ester
    PROCEEDINGS OF THE 18TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM (IDEAS14), 2014, : 124 - 131
  • [36] Nonmonotonic Trust Management for P2P Applications
    Czenko, Marcin
    Ha Tran
    Doumen, Jeroen
    Etalle, Sandro
    Hartel, Pieter
    den Hartog, Jerry
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 157 (03) : 113 - 130
  • [37] Impact of feedback on trust in P2P networks
    Huang, Zhihua
    Lu, Songnian
    Zhang, Aixin
    Gu, Jie
    Journal of Networks, 2012, 7 (08) : 1182 - 1188
  • [38] A P2P trust model based on preference
    Yu, Zhen
    Zheng, Xue-feng
    Wang, Shao-jie
    Li, Ming-xiang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4778 - 4781
  • [39] Trust model based on P2P network
    Ouyang, Guang
    Chen, Xiang
    Journal of Networks, 2013, 8 (09) : 2013 - 2020
  • [40] A dynamic trust metric for P2P systems
    Chang, Junsheng
    Wang, Huaimin
    Gang, Yin
    GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, 2006, : 117 - +