Dealing with sporadic strangers, or the (Un)suitability of trust for mobile P2P security

被引:0
|
作者
Palomar, Esther [1 ]
Tapiador, Juan M. E. [1 ]
Hernandez-Castro, Julio C. [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Avda Univ 30, Madrid 28911, Spain
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulated a general trend towards extending Peer-to-Peer (PY) characteristics to wireless environments. As a result, the P2P paradigm has begun to migrate to pervasive computing scenarios. So far research in this domain has led to some middleware models working over Mobile Ad Hoc Networks (MANETs), which are now viewed as a Mobile-P2P (M-P2P) networks. However, the highly dynamic, decentralized and self-organizing nature of MANETs does not fit well with many approaches developed in the P2P world. In particular it does not seem easy to deploy security solutions for M-P2P due, among other reasons, to the inherent limitations of the peers' devices and their potentially very sporadic interaction with other peers. Under these assumptions, a significant challenge is how to establish a decentralized trust management system. In this paper we first summarize the advances in M-P2P security services and point out potential future applications based on opportunistic interactions. Then, we discuss several kind of threats and attacks, and finally analyze the (un)suitability of employing trust-based systems in some of these environments.
引用
收藏
页码:779 / +
页数:2
相关论文
共 50 条
  • [41] Structured Topology for Trust in P2P Network
    Cai Biao
    Li Zhishu
    Fu Die
    Cheng Liangyin
    Luo Sida
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 652 - +
  • [42] Simulating trust overlay in P2P networks
    Zhang, Yan
    Wang, Wei
    Lu, Shunying
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 1, PROCEEDINGS, 2007, 4487 : 632 - +
  • [43] A trust management mechanism in unstructured P2P
    Jia, Zhaoqing
    Xue, Guangtao
    Tang, Xinhuai
    Zhang, Pengzhu
    You, Jinyuan
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (04): : 645 - 652
  • [44] TACS, a Trust Model for P2P Networks
    Félix Gómez Mármol
    Gregorio Martínez Pérez
    Antonio F. Gómez Skarmeta
    Wireless Personal Communications, 2009, 51 : 153 - 164
  • [45] TACS, a Trust Model for P2P Networks
    Gomez Marmol, Felix
    Martinez Perez, Gregorio
    Gomez Skarmeta, Antonio F.
    WIRELESS PERSONAL COMMUNICATIONS, 2009, 51 (01) : 153 - 164
  • [46] A trust evolution model for P2P networks
    Wang, Yuan
    Tao, Ye
    Yu, Ping
    Xu, Feng
    Lue, Jian
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 216 - +
  • [47] A Novel Trust Model for P2P Networks
    Ma, Yi
    Wang, Dongqi
    2016 12TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2016, : 1969 - 1973
  • [48] Trust based incentive in P2P network
    Tang, YB
    Wang, HM
    Dou, W
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY FOR DYNAMIC E-BUSINESS, 2004, : 302 - 305
  • [49] Overlays in mobile P2P networks
    Zhang, G.-Y. (zhangguoyin@hrbeu.edu.cn), 1600, Chinese Academy of Sciences (24):
  • [50] Mobile agents in a P2P world
    Weckerle, C
    Strick, L
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 1876 - 1881