Analysis on Security Issues for Mobile P2P Networks

被引:0
|
作者
Tang Hong-Bo [1 ]
Yang Zhi-Xing [1 ]
Chen Long [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol R&D Ct, Zhengzhou, Peoples R China
来源
2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM) | 2012年
关键词
mobile peer-to-peer networks; malicious behaviors; security; reputation systems; attacks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless access technology and mobile computing, mobile P2P networks are supposed to thrive in file-sharing, streaming media, electronic commerce and other applications. However, due to the concepts of decentralization and multi-hop transmission, mobile P2P networks are suffering from attacks launched by malicious members. Aiming at guarding MP2P networks, this paper analyzes the challenges and attacks for MP2P networks, and gives possible countermeasures to defend the threats. Also, current reputation systems are discussed in detail, including potential threats they are facing with and so on. Furthermore, considerations on how to construct robust reputation systems are given.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Preserving Receiver's Anonymity for Circular Structured P2P networks
    Naghizadeh, Alireza
    Berenjian, Samaneh
    Razeghi, Behrooz
    Shahanggar, Saghi
    Pour, Nima Razagh
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 71 - 76
  • [42] Research on hierarchical P2P based RFID code resolution network and its security
    Zhao, Wen
    Liu, Xueyang
    Li, Xinpeng
    Liu, Dianxing
    Zhang, Shikun
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 103 - 111
  • [43] Byzantine generals problem in the light of P2P computing
    Fedotova, Natalya
    Veltri, Luca
    2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 312 - +
  • [44] A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks
    Swain, Jhum
    Pattanayak, Binod Kumar
    Pati, Bibudhendu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (02) : 38 - 45
  • [45] SECURITY IN FUTURE MOBILE SENSOR NETWORKS Issues and Challenges
    Stavrou, Eliana
    Pitsillides, Andreas
    Hadjichristofi, George
    Hadjicostis, Christoforos
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 278 - 286
  • [46] Security Constrained P2P Energy Trading in Distribution Network: An Integrated Transaction and Operation Model
    Jia, Yanbo
    Wan, Can
    Yu, Peng
    Song, Yonghua
    Ju, Ping
    IEEE TRANSACTIONS ON SMART GRID, 2022, 13 (06) : 4773 - 4786
  • [47] LLCPS: A New Security Framework Based On TLS For NFC P2P Applications In The Internet Of Things
    Urien, Pascal
    2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 845 - 846
  • [48] Incentivising honest behaviour in P2P networks using blockchain-based reputation
    Sarros, Christos-Alexandros
    Kapetanidou, Ioanna Angeliki
    Tsaoussidis, Vassilis
    2021 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2021, : 132 - 137
  • [49] Structural-based tunneling: preserving mutual anonymity for circular P2P networks
    Naghizadeh, A.
    Berenjian, S.
    Meamari, E.
    Atani, R. Ebrahimi
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (03) : 602 - 619
  • [50] Securing network coding against pollution attacks in P2P converged ubiquitous networks
    He, Ming
    Gong, Zhenghu
    Chen, Lin
    Wang, Hong
    Dai, Fan
    Liu, Zhihong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (04) : 642 - 650