Future Internet 2010, 2(4), 505-532; doi:10.3390/fi2040505
Article

A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches

Received: 10 September 2010; in revised form: 1 October 2010 / Accepted: 8 October 2010 / Published: 13 October 2010
(This article belongs to the Special Issue Network vs. Application Based Solutions for NGN)
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract: Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P) networks share central characteristics such as their distributed and decentralized nature. Combining both networking paradigms results in a Mobile Peer-to-Peer (MP2P) system that operates independently from a preexisting infrastructure. Securing MP2P networks in terms of availability and robustness as basic demands in envisioned application scenarios like first responder operations is a challenging task. In this article, we present a survey of selected threats and of state of the art countermeasures for MANETs and P2P networks. Further, we discuss the efficiency of MANET and P2P security mechanisms when applied in MP2P networks.
Keywords: mobile ad hoc network; peer-to-peer; network security; mobile peer-to-peer
PDF Full-text Download PDF Full-Text [283 KB, Updated Version, uploaded 18 October 2010 10:45 CEST]
The original version is still available [285 KB, uploaded 13 October 2010 14:56 CEST]

Export to BibTeX |
EndNote


MDPI and ACS Style

Gottron, C.; König, A.; Steinmetz, R. A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches. Future Internet 2010, 2, 505-532.

AMA Style

Gottron C, König A, Steinmetz R. A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches. Future Internet. 2010; 2(4):505-532.

Chicago/Turabian Style

Gottron, Christian; König, André; Steinmetz, Ralf. 2010. "A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches." Future Internet 2, no. 4: 505-532.

Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert