Abstract
Mobile Peer-to-Peer architectures provide object and service lookup functionality in absence of a preexisting communication infrastructure. Therefore, those architectures can be harnessed in several application scenarios like disaster relief scenarios where no infrastructure can be assumed and mobility is required. Yet, Mobile Peer-to-Peer architectures inherit the vulnerability to routing attacks from the underlying communication technologies. Further, even though many security mechanisms were developed for traditional Peer-to-Peer architectures, those mechanisms cannot be applied without adaptations to Mobile Peer-to-Peer architectures due to the wireless, mobile underlay network. In this paper, we analyze the vulnerability of the overlays routing algorithm of structured, location aware Mobile Peer-to-Peer architectures against a prominent routing attack. Therefore, we discuss and analyze existing security mechanisms that were developed to ensure a reliable routing process of these architectures. Moreover, we validate and adapt analytic models for the routing algorithm and those previously mentioned security mechanisms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gottron, C., et al.: A cross-layer approach towards robustness of mobile Peer-to-Peer networks. In: 7th IEEE International Workshop on Wireless and Sensor Networks Security (2011)
Sit, E., Morris, R.: Security considerations for Peer-to-Peer distributed hash tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 261–269. Springer, Heidelberg (2002)
Wang, P., et al.: Myrmic: secure and robust DHT routing. Technical report, University of Minnesota (2006)
Needels, K., Kwon, M.: Secure routing in Peer-to-Peer distributed hash tables. In: 24th ACM Symposium on Applied Computing (2009)
Castro, M., et al.: Secure routing for structured Peer-to-Peer overlay networks. In: Proceedings of 5th Symposium on Operating Systems Design and Implementation (2002)
Artigas, M.S., et al.: A novel methodology for constructing secure multipath overlays. IEEE Internet Comput. 9(6), 50–57 (2005). (IEEE Press, New York)
Kapadia, A., Triandopoulos, N.: Halo: high-assurance locate for distributed hash tables. In: 15th Annual Network and Distributed System Security Symposium (2008)
Roh, B.-S., Kwon, O.-H., Je Hong, S., Kim, J.: The exclusion of malicious routing peers in structured P2P systems. In: Joseph, S., Despotovic, Z., Moro, G., Bergamaschi, S. (eds.) AP2PC 2006. LNCS (LNAI), vol. 4461, pp. 43–50. Springer, Heidelberg (2008)
Sànchez-Artigas, M., García-López, P., Skarmeta, A.F.G.: Secure forwarding in DHTs - is redundancy the key to robustness? In: Luque, E., Margalef, T., Benítez, D. (eds.) Euro-Par 2008. LNCS, vol. 5168, pp. 611–621. Springer, Heidelberg (2008)
Marti, S., et al.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th International Conference on Mobile Computing and Networking (2000)
Gottron, C., et al.: A cluster-based locality-aware mobile Peer-to-Peer architecture. In: 8th International Workshop on Mobile Peer-to-Peer Computing (2012)
Rowstron, A.I.T., Druschel, P.: Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: IFIP/ACM International Conference on Distributed Systems Platforms (2001)
Gottron, C.: Security in mobile Peer-to-Peer architectures - introducing mechanisms to increase the robustness of overlay routing algorithms of Mobile-Peer-to-Peer architectures. Dissertation, Technische Universität Darmstadt (2013)
Varga, A.: OMNeT++. In: Wehrle, K., Günes, M.M., Gross, J. (eds.) Modeling and Tools for Network Simulation. Springer, Heidelberg (2010)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Gottron, C., Bergsträßer, S., Steinmetz, R. (2014). Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems. In: Stojmenovic, I., Cheng, Z., Guo, S. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 131. Springer, Cham. https://doi.org/10.1007/978-3-319-11569-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-11569-6_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11568-9
Online ISBN: 978-3-319-11569-6
eBook Packages: Computer ScienceComputer Science (R0)