Next Article in Journal
Next Article in Special Issue
Previous Article in Journal
Previous Article in Special Issue
Future Internet 2010, 2(4), 505-532; doi:10.3390/fi2040505
Article

A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches

,
 and
Received: 10 September 2010; in revised form: 1 October 2010 / Accepted: 8 October 2010 / Published: 13 October 2010
(This article belongs to the Special Issue Network vs. Application Based Solutions for NGN)
Download PDF [283 KB, updated 18 October 2010; original version uploaded 13 October 2010]
Abstract: Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P) networks share central characteristics such as their distributed and decentralized nature. Combining both networking paradigms results in a Mobile Peer-to-Peer (MP2P) system that operates independently from a preexisting infrastructure. Securing MP2P networks in terms of availability and robustness as basic demands in envisioned application scenarios like first responder operations is a challenging task. In this article, we present a survey of selected threats and of state of the art countermeasures for MANETs and P2P networks. Further, we discuss the efficiency of MANET and P2P security mechanisms when applied in MP2P networks.
Keywords: mobile ad hoc network; peer-to-peer; network security; mobile peer-to-peer mobile ad hoc network; peer-to-peer; network security; mobile peer-to-peer
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Export to BibTeX |
EndNote


MDPI and ACS Style

Gottron, C.; König, A.; Steinmetz, R. A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches. Future Internet 2010, 2, 505-532.

AMA Style

Gottron C, König A, Steinmetz R. A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches. Future Internet. 2010; 2(4):505-532.

Chicago/Turabian Style

Gottron, Christian; König, André; Steinmetz, Ralf. 2010. "A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches." Future Internet 2, no. 4: 505-532.

Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert