A security layer for JXTA core protocols

被引:2
|
作者
Arnedo-Moreno, Joan [1 ]
Herrera-Joancomarti, Jordi [2 ]
机构
[1] Univ Oberta Catalunya, Rb Poble Nou 156, Barcelona 08018, Spain
[2] Univ Autonoma Barcelona, Escola Tecnica SUper Dinginyeria, E-08193 Barcelona, Spain
关键词
peer-to-peer; security; peer group; JXTA; xmldsig; xmlenc;
D O I
10.1109/CISIS.2009.24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form autonomous peer groups. This paper presents a method that provides security services to the core protocols: privacy, authenticity, integrity and non-repudiation. The presented mechanisms are fully distributed and based on a pure peer-to-peer model, not requiring the arbitration of a trusted third party or a previously established trust relationship between peers, which is one of the main challenges under this kind of environments.
引用
收藏
页码:463 / +
页数:2
相关论文
共 50 条
  • [1] Link layer security for SAHN protocols
    Islam, MM
    Pose, R
    Kopp, C
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, WORKSHOPS, 2005, : 279 - 283
  • [2] A survey on security in JXTA applications
    Arnedo-Moreno, Joan
    Herrera-Joancomarti, Jordi
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (09) : 1513 - 1525
  • [3] Trust management and network layer security protocols
    Blaze, M
    Ioannidis, J
    Keromytis, AD
    [J]. SECURITY PROTOCOLS, 2000, 1796 : 103 - 108
  • [4] Trust management and network layer security protocols
    Blaze, M
    Anderson, R
    Roe, M
    Lee, S
    Gligor, V
    Christianson, B
    [J]. SECURITY PROTOCOLS, 2000, 1796 : 109 - 118
  • [5] A Security Framework for JXTA-Overlay
    Arnedo-Moreno, Joan
    Matsuo, Keita
    Barolli, Leonard
    Xhafa, Fatos
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 212 - +
  • [6] Persistent interoperable security for JXTA advertisements
    Arnedo-Moreno, Joan
    Herrera-Joancomarti, Jordi
    [J]. CISIS 2008: THE SECOND INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, PROCEEDINGS, 2008, : 354 - 359
  • [7] Cryptographic Protocols' Performance and Network Layer Security of RSMAD
    Sokol, Marcin
    Gajewski, Slawomir
    Gajewska, Malgorzata
    [J]. 2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 9 - 13
  • [8] Security in the Internet of Things: A Survey on Application Layer Protocols
    Nastase, Lavinia
    [J]. 2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 659 - 666
  • [9] Security of IoT Application Layer Protocols: Challenges and Findings
    Nebbione, Giuseppe
    Calzarossa, Maria Carla
    [J]. FUTURE INTERNET, 2020, 12 (03):
  • [10] Security issues in routing protocols in MANETs at network layer
    Joshi, Praveen
    [J]. WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3