e-Infrastructure and e-Services for Developing Countries. 8th International Conference, AFRICOMM 2016, Ouagadougou, Burkina Faso, December 6-7, 2016, Proceedings

Research Article

SEMOS: A Middleware for Providing Secure and Mobility-Aware Sessions over a P2P Overlay Network

Download
204 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-66742-3_11,
        author={Daouda Ahmat and Mahamat Barka and Damien Magoni},
        title={SEMOS: A Middleware for Providing Secure and Mobility-Aware Sessions over a P2P Overlay Network},
        proceedings={e-Infrastructure and e-Services for Developing Countries. 8th International Conference, AFRICOMM 2016, Ouagadougou, Burkina Faso, December 6-7, 2016, Proceedings},
        proceedings_a={AFRICOMM},
        year={2017},
        month={10},
        keywords={Connectivity Mobility Overlay P2P VPN Security},
        doi={10.1007/978-3-319-66742-3_11}
    }
    
  • Daouda Ahmat
    Mahamat Barka
    Damien Magoni
    Year: 2017
    SEMOS: A Middleware for Providing Secure and Mobility-Aware Sessions over a P2P Overlay Network
    AFRICOMM
    Springer
    DOI: 10.1007/978-3-319-66742-3_11
Daouda Ahmat,*, Mahamat Barka1,*, Damien Magoni2,*
  • 1: University of N’Djamena
  • 2: University of Bordeaux – LaBRI
*Contact email: daouda.ahmat@uvt.td, mahamat.barka@gmail.com, magoni@labri.fr

Abstract

Mobility and security are major features for both current and future network infrastructures. Nevertheless, the integration of mobility in traditional virtual private networks is difficult due to the costs of re-establishing broken secure tunnels and restarting broken connections. Besides session recovery costs, renegotiation steps also present inherent vulnerabilities. In order to address these issues, we propose a new distributed mobile VPN system called SEcured MObile Session (SEMOS). Based upon our CLOAK peer-to-peer overlay architecture, SEMOS provides security services to the application layer connections of mobile users. Secure and resilient sessions allow user connections to survive network failures as opposed to regular transport layer secured connections used by traditional VPN protocols.