Next Article in Journal
Ontology-Based Information Behaviour to Improve Web Search
Next Article in Special Issue
Look-Ahead Strategies Based on Store-Carry and Forward Relaying for Energy Efficient Cellular Communications
Previous Article in Journal
Node Coloring and Color Conflict Detection in Wireless Sensor Networks
Previous Article in Special Issue
Exploiting the In-Network Capabilities of Multicast to Discover Proximate IPTV Channels
Future Internet 2010, 2(4), 505-532; doi:10.3390/fi2040505
Article

A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches

,
 and
Received: 10 September 2010; in revised form: 1 October 2010 / Accepted: 8 October 2010 / Published: 13 October 2010
(This article belongs to the Special Issue Network vs. Application Based Solutions for NGN)
Download PDF [283 KB, updated 18 October 2010; original version uploaded 13 October 2010]
Abstract: Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P) networks share central characteristics such as their distributed and decentralized nature. Combining both networking paradigms results in a Mobile Peer-to-Peer (MP2P) system that operates independently from a preexisting infrastructure. Securing MP2P networks in terms of availability and robustness as basic demands in envisioned application scenarios like first responder operations is a challenging task. In this article, we present a survey of selected threats and of state of the art countermeasures for MANETs and P2P networks. Further, we discuss the efficiency of MANET and P2P security mechanisms when applied in MP2P networks.
Keywords: mobile ad hoc network; peer-to-peer; network security; mobile peer-to-peer mobile ad hoc network; peer-to-peer; network security; mobile peer-to-peer
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Export to BibTeX |
EndNote


MDPI and ACS Style

Gottron, C.; König, A.; Steinmetz, R. A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches. Future Internet 2010, 2, 505-532.

AMA Style

Gottron C, König A, Steinmetz R. A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches. Future Internet. 2010; 2(4):505-532.

Chicago/Turabian Style

Gottron, Christian; König, André; Steinmetz, Ralf. 2010. "A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches." Future Internet 2, no. 4: 505-532.


Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert