Analysis on Security Issues for Mobile P2P Networks

被引:0
|
作者
Tang Hong-Bo [1 ]
Yang Zhi-Xing [1 ]
Chen Long [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol R&D Ct, Zhengzhou, Peoples R China
来源
2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM) | 2012年
关键词
mobile peer-to-peer networks; malicious behaviors; security; reputation systems; attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless access technology and mobile computing, mobile P2P networks are supposed to thrive in file-sharing, streaming media, electronic commerce and other applications. However, due to the concepts of decentralization and multi-hop transmission, mobile P2P networks are suffering from attacks launched by malicious members. Aiming at guarding MP2P networks, this paper analyzes the challenges and attacks for MP2P networks, and gives possible countermeasures to defend the threats. Also, current reputation systems are discussed in detail, including potential threats they are facing with and so on. Furthermore, considerations on how to construct robust reputation systems are given.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] The Research of Security of P2P Network File Sharing System
    Li, Shaojing
    Su, Wanli
    Li, Haoling
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS WAINA 2015, 2015, : 250 - 254
  • [22] A Preventing Fraud Trust Model in P2P Networks
    Liu, Siming
    Yu, Yang
    Xu, Jiaxing
    Huang, Zhenguang
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 2305 - 2311
  • [23] A distributed certification system for structured P2P networks
    Leseuer, Francois
    Me, Ludovic
    Tong, Valerie Viet Triem
    RESILIENT NETWORKS AND SERVICES, 2008, 5127 : 40 - 52
  • [24] A Sybilproof Distributed Identity Management for P2P Networks
    Lesueur, Francois
    Me, Ludovic
    Tong, Valerie Viet Triem
    2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 684 - 691
  • [25] Evaluating P2P Networks against Eclipse Attacks
    de Asis Lopez-Fuentes, Francisco
    Eugui-De-Alba, Inaki
    Ortiz-Ruiz, Otoniel M.
    2012 IBEROAMERICAN CONFERENCE ON ELECTRONICS ENGINEERING AND COMPUTER SCIENCE, 2012, 3 : 61 - 68
  • [26] P2P Attack Taxonomy and relationship Analysis
    Yue, Xiaowen
    Qiu, Xiaofeng
    Ji, Yang
    Zhang, Chunhong
    11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1207 - 1210
  • [27] SPTM: A Security Protocol for Protecting the P2P Trust Information Management
    Hu, Jianli
    Wu, Quanyuan
    Zhou, Bin
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 56 - 60
  • [28] File Management in a Mobile DHT-based P2P Environment
    Ashraf, Khalid
    Anane, Rachid
    Bordbar, Behzad
    2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, : 415 - 422
  • [29] Scalable Secure Routing for Heterogeneous Unstructured P2P Networks
    Kraxberger, Stefan
    PROCEEDINGS OF THE 19TH INTERNATIONAL EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING, 2011, : 619 - 626
  • [30] Secure Digital Contents Distributing System on P2P Networks
    Ing-Chau Chang
    Hung-Wen Yang
    Journal of Electronic Science and Technology, 2012, (03) : 263 - 268