A security layer for JXTA core protocols

被引:2
|
作者
Arnedo-Moreno, Joan [1 ]
Herrera-Joancomarti, Jordi [2 ]
机构
[1] Univ Oberta Catalunya, Rb Poble Nou 156, Barcelona 08018, Spain
[2] Univ Autonoma Barcelona, Escola Tecnica SUper Dinginyeria, E-08193 Barcelona, Spain
关键词
peer-to-peer; security; peer group; JXTA; xmldsig; xmlenc;
D O I
10.1109/CISIS.2009.24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form autonomous peer groups. This paper presents a method that provides security services to the core protocols: privacy, authenticity, integrity and non-repudiation. The presented mechanisms are fully distributed and based on a pure peer-to-peer model, not requiring the arbitration of a trusted third party or a previously established trust relationship between peers, which is one of the main challenges under this kind of environments.
引用
收藏
页码:463 / +
页数:2
相关论文
共 50 条
  • [31] Security protocols and performance
    deCarmo, L
    [J]. DR DOBBS JOURNAL, 2000, 25 (11): : 40 - +
  • [32] Multichannel security protocols
    Wong, Ford Long
    Stajano, Rank
    [J]. IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 31 - 39
  • [33] RFID Security Protocols
    Daou, Hoda
    Kayssi, Ayman
    Chehab, Ali
    [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 233 - 237
  • [34] ON THE SECURITY OF RECENT PROTOCOLS
    CLARK, J
    JACOB, J
    [J]. INFORMATION PROCESSING LETTERS, 1995, 56 (03) : 151 - 155
  • [35] Refining security protocols
    Sprenger, Christoph
    Basin, David
    [J]. JOURNAL OF COMPUTER SECURITY, 2018, 26 (01) : 71 - 120
  • [36] Enterprise strength security on a JXTA P2P network
    Yeager, B
    [J]. THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 7 - 8
  • [37] Secure Dynamic Routing Protocols based on Cross-Layer Network Security Evaluation
    Chuang, I-Hsun
    Su, Wei-Tsung
    Kuo, Yau-Hwang
    [J]. 2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2012, : 303 - 308
  • [38] An enhanced transport layer security protocol to support mutual platform-authentication protocols
    Institute of IOT and IT-Based Industrialization, Xi’an University of Posts and Telecommunications, No. 563, South Chang’an Road, Xi’an, China
    不详
    [J]. ICIC Express Lett., 9 (2369-2374):
  • [39] An experimental study of cross-layer security protocols in public access wireless networks
    Agarwal, AK
    Wang, WY
    McNair, JY
    [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1747 - 1751
  • [40] IoT Security: A review of vulnerabilities and security protocols
    Varma, Ravi Kiran P.
    Priyanka, M.
    Krishna, Vamsi B. S.
    Raju, Subba K., V
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 509 - 520