Future Internet | |
A Survey on Security in Mobile Peer-to-Peer Architectures—Overlay-Based vs. Underlay-Based Approaches | |
Christian Gottron1  André König2  | |
[1] Multimedia Communications Lab, TU Darmstadt, Rundeturmstrasse 10, 64283 Darmstadt, Germany; | |
关键词: mobile ad hoc network; peer-to-peer; network security; mobile peer-to-peer; | |
DOI : 10.3390/fi2040505 | |
来源: mdpi | |
![]() |
【 摘 要 】
Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P) networks share central characteristics such as their distributed and decentralized nature. Combining both networking paradigms results in a Mobile Peer-to-Peer (MP2P) system that operates independently from a preexisting infrastructure. Securing MP2P networks in terms of availability and robustness as basic demands in envisioned application scenarios like first responder operations is a challenging task. In this article, we present a survey of selected threats and of state of the art countermeasures for MANETs and P2P networks. Further, we discuss the efficiency of MANET and P2P security mechanisms when applied in MP2P networks.
【 授权许可】
CC BY
© 2010 by the authors; licensee MDPI, Basel, Switzerland.
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO202003190051919ZK.pdf | 282KB | ![]() |