Analysis on Security Issues for Mobile P2P Networks

被引:0
|
作者
Tang Hong-Bo [1 ]
Yang Zhi-Xing [1 ]
Chen Long [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol R&D Ct, Zhengzhou, Peoples R China
来源
2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM) | 2012年
关键词
mobile peer-to-peer networks; malicious behaviors; security; reputation systems; attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless access technology and mobile computing, mobile P2P networks are supposed to thrive in file-sharing, streaming media, electronic commerce and other applications. However, due to the concepts of decentralization and multi-hop transmission, mobile P2P networks are suffering from attacks launched by malicious members. Aiming at guarding MP2P networks, this paper analyzes the challenges and attacks for MP2P networks, and gives possible countermeasures to defend the threats. Also, current reputation systems are discussed in detail, including potential threats they are facing with and so on. Furthermore, considerations on how to construct robust reputation systems are given.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Security and privacy issues in P2P streaming systems: A survey
    Gabriela Gheorghe
    Renato Lo Cigno
    Alberto Montresor
    Peer-to-Peer Networking and Applications, 2011, 4 : 75 - 91
  • [2] Security and privacy issues in P2P streaming systems: A survey
    Gheorghe, Gabriela
    Lo Cigno, Renato
    Montresor, Alberto
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (02) : 75 - 91
  • [3] Autonomy, Heterogeneity, Trust, Security, and Privacy in Mobile P2P Environments
    Veijalainen, Jari
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (01): : 57 - 71
  • [4] Intelligent query processing in P2P networks: semantic issues and routing algorithms
    Nicolini, A. L.
    Lorenzetti, C. M.
    Maguitman, A. G.
    Chesnevar, C. I.
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2019, 16 (02) : 409 - 442
  • [5] A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks
    Jeong, Yoon-Su
    Kim, Yong-Tae
    Shin, Seung-Soo
    Lee, Sang-Ho
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (04): : 923 - 948
  • [6] PJ-Sec: secure node joining in mobile P2P networks
    Tetarave, Sumit Kumar
    Tripathy, Somanath
    CCF TRANSACTIONS ON PERVASIVE COMPUTING AND INTERACTION, 2021, 3 (01) : 13 - 24
  • [7] Analysis of Malicious Peers in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [8] Trusted Architecture for Mobile P2P Systems
    Wu, Xu
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [9] A Novel Multi-level Trust Model to Improve the Security of P2P Networks
    Zuo, Cuihua
    Zhou, Jianfang
    Feng, Hongcai
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 100 - 104
  • [10] Distributed Approach for the Security of P2P Wireless Network
    Yin, Chunyong
    Stacey, Nimenya
    Beita, Tatiana Moreira
    Wang, Jin
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 915 - 919