Skip to main content

Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems

  • Conference paper
  • First Online:
Mobile and Ubiquitous Systems: Computing, Networking, and Services (MobiQuitous 2013)

Abstract

Mobile Peer-to-Peer architectures provide object and service lookup functionality in absence of a preexisting communication infrastructure. Therefore, those architectures can be harnessed in several application scenarios like disaster relief scenarios where no infrastructure can be assumed and mobility is required. Yet, Mobile Peer-to-Peer architectures inherit the vulnerability to routing attacks from the underlying communication technologies. Further, even though many security mechanisms were developed for traditional Peer-to-Peer architectures, those mechanisms cannot be applied without adaptations to Mobile Peer-to-Peer architectures due to the wireless, mobile underlay network. In this paper, we analyze the vulnerability of the overlays routing algorithm of structured, location aware Mobile Peer-to-Peer architectures against a prominent routing attack. Therefore, we discuss and analyze existing security mechanisms that were developed to ensure a reliable routing process of these architectures. Moreover, we validate and adapt analytic models for the routing algorithm and those previously mentioned security mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gottron, C., et al.: A cross-layer approach towards robustness of mobile Peer-to-Peer networks. In: 7th IEEE International Workshop on Wireless and Sensor Networks Security (2011)

    Google Scholar 

  2. Sit, E., Morris, R.: Security considerations for Peer-to-Peer distributed hash tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 261–269. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Wang, P., et al.: Myrmic: secure and robust DHT routing. Technical report, University of Minnesota (2006)

    Google Scholar 

  4. Needels, K., Kwon, M.: Secure routing in Peer-to-Peer distributed hash tables. In: 24th ACM Symposium on Applied Computing (2009)

    Google Scholar 

  5. Castro, M., et al.: Secure routing for structured Peer-to-Peer overlay networks. In: Proceedings of 5th Symposium on Operating Systems Design and Implementation (2002)

    Google Scholar 

  6. Artigas, M.S., et al.: A novel methodology for constructing secure multipath overlays. IEEE Internet Comput. 9(6), 50–57 (2005). (IEEE Press, New York)

    Article  Google Scholar 

  7. Kapadia, A., Triandopoulos, N.: Halo: high-assurance locate for distributed hash tables. In: 15th Annual Network and Distributed System Security Symposium (2008)

    Google Scholar 

  8. Roh, B.-S., Kwon, O.-H., Je Hong, S., Kim, J.: The exclusion of malicious routing peers in structured P2P systems. In: Joseph, S., Despotovic, Z., Moro, G., Bergamaschi, S. (eds.) AP2PC 2006. LNCS (LNAI), vol. 4461, pp. 43–50. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. Sànchez-Artigas, M., García-López, P., Skarmeta, A.F.G.: Secure forwarding in DHTs - is redundancy the key to robustness? In: Luque, E., Margalef, T., Benítez, D. (eds.) Euro-Par 2008. LNCS, vol. 5168, pp. 611–621. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  10. Marti, S., et al.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th International Conference on Mobile Computing and Networking (2000)

    Google Scholar 

  11. Gottron, C., et al.: A cluster-based locality-aware mobile Peer-to-Peer architecture. In: 8th International Workshop on Mobile Peer-to-Peer Computing (2012)

    Google Scholar 

  12. Rowstron, A.I.T., Druschel, P.: Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: IFIP/ACM International Conference on Distributed Systems Platforms (2001)

    Google Scholar 

  13. Gottron, C.: Security in mobile Peer-to-Peer architectures - introducing mechanisms to increase the robustness of overlay routing algorithms of Mobile-Peer-to-Peer architectures. Dissertation, Technische Universität Darmstadt (2013)

    Google Scholar 

  14. Varga, A.: OMNeT++. In: Wehrle, K., Günes, M.M., Gross, J. (eds.) Modeling and Tools for Network Simulation. Springer, Heidelberg (2010)

    Google Scholar 

  15. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christian Gottron .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Gottron, C., Bergsträßer, S., Steinmetz, R. (2014). Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems. In: Stojmenovic, I., Cheng, Z., Guo, S. (eds) Mobile and Ubiquitous Systems: Computing, Networking, and Services. MobiQuitous 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 131. Springer, Cham. https://doi.org/10.1007/978-3-319-11569-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11569-6_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11568-9

  • Online ISBN: 978-3-319-11569-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics