Skip to main content

2014 | OriginalPaper | Buchkapitel

Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems

verfasst von : Christian Gottron, Sonja Bergsträßer, Ralf Steinmetz

Erschienen in: Mobile and Ubiquitous Systems: Computing, Networking, and Services

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile Peer-to-Peer architectures provide object and service lookup functionality in absence of a preexisting communication infrastructure. Therefore, those architectures can be harnessed in several application scenarios like disaster relief scenarios where no infrastructure can be assumed and mobility is required. Yet, Mobile Peer-to-Peer architectures inherit the vulnerability to routing attacks from the underlying communication technologies. Further, even though many security mechanisms were developed for traditional Peer-to-Peer architectures, those mechanisms cannot be applied without adaptations to Mobile Peer-to-Peer architectures due to the wireless, mobile underlay network. In this paper, we analyze the vulnerability of the overlays routing algorithm of structured, location aware Mobile Peer-to-Peer architectures against a prominent routing attack. Therefore, we discuss and analyze existing security mechanisms that were developed to ensure a reliable routing process of these architectures. Moreover, we validate and adapt analytic models for the routing algorithm and those previously mentioned security mechanisms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Gottron, C., et al.: A cross-layer approach towards robustness of mobile Peer-to-Peer networks. In: 7th IEEE International Workshop on Wireless and Sensor Networks Security (2011) Gottron, C., et al.: A cross-layer approach towards robustness of mobile Peer-to-Peer networks. In: 7th IEEE International Workshop on Wireless and Sensor Networks Security (2011)
2.
Zurück zum Zitat Sit, E., Morris, R.: Security considerations for Peer-to-Peer distributed hash tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 261–269. Springer, Heidelberg (2002)CrossRef Sit, E., Morris, R.: Security considerations for Peer-to-Peer distributed hash tables. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 261–269. Springer, Heidelberg (2002)CrossRef
3.
Zurück zum Zitat Wang, P., et al.: Myrmic: secure and robust DHT routing. Technical report, University of Minnesota (2006) Wang, P., et al.: Myrmic: secure and robust DHT routing. Technical report, University of Minnesota (2006)
4.
Zurück zum Zitat Needels, K., Kwon, M.: Secure routing in Peer-to-Peer distributed hash tables. In: 24th ACM Symposium on Applied Computing (2009) Needels, K., Kwon, M.: Secure routing in Peer-to-Peer distributed hash tables. In: 24th ACM Symposium on Applied Computing (2009)
5.
Zurück zum Zitat Castro, M., et al.: Secure routing for structured Peer-to-Peer overlay networks. In: Proceedings of 5th Symposium on Operating Systems Design and Implementation (2002) Castro, M., et al.: Secure routing for structured Peer-to-Peer overlay networks. In: Proceedings of 5th Symposium on Operating Systems Design and Implementation (2002)
6.
Zurück zum Zitat Artigas, M.S., et al.: A novel methodology for constructing secure multipath overlays. IEEE Internet Comput. 9(6), 50–57 (2005). (IEEE Press, New York)CrossRef Artigas, M.S., et al.: A novel methodology for constructing secure multipath overlays. IEEE Internet Comput. 9(6), 50–57 (2005). (IEEE Press, New York)CrossRef
7.
Zurück zum Zitat Kapadia, A., Triandopoulos, N.: Halo: high-assurance locate for distributed hash tables. In: 15th Annual Network and Distributed System Security Symposium (2008) Kapadia, A., Triandopoulos, N.: Halo: high-assurance locate for distributed hash tables. In: 15th Annual Network and Distributed System Security Symposium (2008)
8.
Zurück zum Zitat Roh, B.-S., Kwon, O.-H., Je Hong, S., Kim, J.: The exclusion of malicious routing peers in structured P2P systems. In: Joseph, S., Despotovic, Z., Moro, G., Bergamaschi, S. (eds.) AP2PC 2006. LNCS (LNAI), vol. 4461, pp. 43–50. Springer, Heidelberg (2008)CrossRef Roh, B.-S., Kwon, O.-H., Je Hong, S., Kim, J.: The exclusion of malicious routing peers in structured P2P systems. In: Joseph, S., Despotovic, Z., Moro, G., Bergamaschi, S. (eds.) AP2PC 2006. LNCS (LNAI), vol. 4461, pp. 43–50. Springer, Heidelberg (2008)CrossRef
9.
Zurück zum Zitat Sànchez-Artigas, M., García-López, P., Skarmeta, A.F.G.: Secure forwarding in DHTs - is redundancy the key to robustness? In: Luque, E., Margalef, T., Benítez, D. (eds.) Euro-Par 2008. LNCS, vol. 5168, pp. 611–621. Springer, Heidelberg (2008)CrossRef Sànchez-Artigas, M., García-López, P., Skarmeta, A.F.G.: Secure forwarding in DHTs - is redundancy the key to robustness? In: Luque, E., Margalef, T., Benítez, D. (eds.) Euro-Par 2008. LNCS, vol. 5168, pp. 611–621. Springer, Heidelberg (2008)CrossRef
10.
Zurück zum Zitat Marti, S., et al.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th International Conference on Mobile Computing and Networking (2000) Marti, S., et al.: Mitigating routing misbehavior in mobile ad hoc networks. In: 6th International Conference on Mobile Computing and Networking (2000)
11.
Zurück zum Zitat Gottron, C., et al.: A cluster-based locality-aware mobile Peer-to-Peer architecture. In: 8th International Workshop on Mobile Peer-to-Peer Computing (2012) Gottron, C., et al.: A cluster-based locality-aware mobile Peer-to-Peer architecture. In: 8th International Workshop on Mobile Peer-to-Peer Computing (2012)
12.
Zurück zum Zitat Rowstron, A.I.T., Druschel, P.: Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: IFIP/ACM International Conference on Distributed Systems Platforms (2001) Rowstron, A.I.T., Druschel, P.: Pastry: scalable, decentralized object location and routing for large-scale peer-to-peer systems. In: IFIP/ACM International Conference on Distributed Systems Platforms (2001)
13.
Zurück zum Zitat Gottron, C.: Security in mobile Peer-to-Peer architectures - introducing mechanisms to increase the robustness of overlay routing algorithms of Mobile-Peer-to-Peer architectures. Dissertation, Technische Universität Darmstadt (2013) Gottron, C.: Security in mobile Peer-to-Peer architectures - introducing mechanisms to increase the robustness of overlay routing algorithms of Mobile-Peer-to-Peer architectures. Dissertation, Technische Universität Darmstadt (2013)
14.
Zurück zum Zitat Varga, A.: OMNeT++. In: Wehrle, K., Günes, M.M., Gross, J. (eds.) Modeling and Tools for Network Simulation. Springer, Heidelberg (2010) Varga, A.: OMNeT++. In: Wehrle, K., Günes, M.M., Gross, J. (eds.) Modeling and Tools for Network Simulation. Springer, Heidelberg (2010)
15.
Zurück zum Zitat Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRef Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRef
Metadaten
Titel
Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems
verfasst von
Christian Gottron
Sonja Bergsträßer
Ralf Steinmetz
Copyright-Jahr
2014
DOI
https://doi.org/10.1007/978-3-319-11569-6_13