Research Article
Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems
@INPROCEEDINGS{10.1007/978-3-319-11569-6_13, author={Christian Gottron and Sonja Bergstr\aa{}\`{a}er and Ralf Steinmetz}, title={Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems}, proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013, Revised Selected Papers}, proceedings_a={MOBIQUITOUS}, year={2014}, month={12}, keywords={Mobile Peer-to-Peer Security Routing}, doi={10.1007/978-3-319-11569-6_13} }
- Christian Gottron
Sonja Bergsträßer
Ralf Steinmetz
Year: 2014
Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems
MOBIQUITOUS
Springer
DOI: 10.1007/978-3-319-11569-6_13
Abstract
Mobile Peer-to-Peer architectures provide object and service lookup functionality in absence of a preexisting communication infrastructure. Therefore, those architectures can be harnessed in several application scenarios like disaster relief scenarios where no infrastructure can be assumed and mobility is required. Yet, Mobile Peer-to-Peer architectures inherit the vulnerability to routing attacks from the underlying communication technologies. Further, even though many security mechanisms were developed for traditional Peer-to-Peer architectures, those mechanisms cannot be applied without adaptations to Mobile Peer-to-Peer architectures due to the wireless, mobile underlay network. In this paper, we analyze the vulnerability of the overlays routing algorithm of structured, location aware Mobile Peer-to-Peer architectures against a prominent routing attack. Therefore, we discuss and analyze existing security mechanisms that were developed to ensure a reliable routing process of these architectures. Moreover, we validate and adapt analytic models for the routing algorithm and those previously mentioned security mechanisms.