Mobile and Ubiquitous Systems: Computing, Networking, and Services. 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013, Revised Selected Papers

Research Article

Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems

Download
474 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-11569-6_13,
        author={Christian Gottron and Sonja Bergstr\aa{}\`{a}er and Ralf Steinmetz},
        title={Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems},
        proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013,  Revised Selected Papers},
        proceedings_a={MOBIQUITOUS},
        year={2014},
        month={12},
        keywords={Mobile Peer-to-Peer Security Routing},
        doi={10.1007/978-3-319-11569-6_13}
    }
    
  • Christian Gottron
    Sonja Bergsträßer
    Ralf Steinmetz
    Year: 2014
    Robust Overlay Routing in Structured, Location Aware Mobile Peer-to-Peer Systems
    MOBIQUITOUS
    Springer
    DOI: 10.1007/978-3-319-11569-6_13
Christian Gottron1,*, Sonja Bergsträßer1,*, Ralf Steinmetz1,*
  • 1: TU Darmstadt
*Contact email: cgottron@kom.tu-darmstadt.de, bergstr@kom.tu-darmstadt.de, ralf.steinmetz@kom.tu-darmstadt.de

Abstract

Mobile Peer-to-Peer architectures provide object and service lookup functionality in absence of a preexisting communication infrastructure. Therefore, those architectures can be harnessed in several application scenarios like disaster relief scenarios where no infrastructure can be assumed and mobility is required. Yet, Mobile Peer-to-Peer architectures inherit the vulnerability to routing attacks from the underlying communication technologies. Further, even though many security mechanisms were developed for traditional Peer-to-Peer architectures, those mechanisms cannot be applied without adaptations to Mobile Peer-to-Peer architectures due to the wireless, mobile underlay network. In this paper, we analyze the vulnerability of the overlays routing algorithm of structured, location aware Mobile Peer-to-Peer architectures against a prominent routing attack. Therefore, we discuss and analyze existing security mechanisms that were developed to ensure a reliable routing process of these architectures. Moreover, we validate and adapt analytic models for the routing algorithm and those previously mentioned security mechanisms.