The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
File-sharing is one of the main applications in P2P technology. JXTA is the most representative development platform for P2P. According to the research and analysis of the current P2P technologies and JXTA platform, we implemented a P2P file-sharing system based on JXTA. The system realized the basic functions of file-sharing and also improved its security. We propose three kinds of security strategy,...
In previous work, we designed a distributed AAA framework for MANETs for which we defined a simple and robust AAA authentication and authorization protocol whose specification carries some implementation latitude. The protocol, therefore, offers several options. In this paper, we propose some of the possible implementation options for which we conducted an analytical study and computationally intensive...
In this paper, we develop a trust based security protocol based on a MAC-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, we design a trust based packet forwarding scheme for detecting and isolating the malicious nodes using the routing layer information. It uses trust values to favor packet forwarding...
A mobile ad hoc network (MANET) is a collection of mobile nodes that communicate with each other by forming a multi-hop radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Design of an efficient and...
JXME is the JXTA protocols implementation for mobile devices using J2ME. Two different flavors of JXME have been implemented, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default...
Many applications in Dynamic Peer Group are becoming increasing popular nowadays. There is a need for security services to provide group-oriented communication privacy and data integrity. To provide this form of group communication privacy, it is important that members of the group can establish a common secret key for encrypting group communication data. A secure distributed group key agreement and...
Recently the problem of providing effective and appropriate healthcare to elderly and disable people is an important field in relative to the aging of population problems. The objective of information and communication technologies (ICT) is to focus on the new technologies the medical environments, so that it can provide management to accelerate and improve the clinical process. Our contribution is...
Many emerging network applications are based upon a group communication model. In a peer-to-peer or ad-hoc network which do not have a previously agreed upon common secret key, communication is susceptible to eavesdropping, Hence a secure distributed group key agreement is required to establish and authenticate a common group key for secure and private communication. This paper presents an authenticated...
The trend on the proliferation of handheld devices triggered an increase on the development of pervasive and personalized mobile applications that exploit and support peer-to-peer/ad-hoc networks. This creates the conditions and motivation for a mobile electronic ID system, preferably one which provides a friendly privacy solution. The existing mobile identification solutions place the interviewer...
Despite extensive research on flat ad hoc networks, meeting satisfactory security levels in sensor networks presents many problems. The main reason is that these networks are typically designed based on hierarchal structures. In this paper, we propose an efficient scheme for authentication and key management in hierarchical ad hoc sensor networks using symmetric polynomials. In the proposed method,...
Multicast services raise significant operational and security challenges not only when deployed on the Internet layer, but also in overlay networks. Large P2P groups as emerging from IPTV applications may be abused by unwanted traffic or denial of service attacks through amplified flooding. In this paper, we introduce a distributed, autonomously verifiable scheme for multicast sender authentication,...
Presented in this paper a preliminary proposal of a security framework for delivering security properties to Trust and Reputation management systems in decentralized networks. When TR metrics are used in this framework, nodes can be held responsible for their actions and identity spoofing is prevented. By protecting trust reply messages and/or the interaction with trust holding agents, false reporting...
Identity based cryptography (IBC) was introduced into peer-to-peer (P2P) networks recently for identity verification and authentication purposes. However, current IBC-based solutions could not address the problem of secure private key issuing. In this paper we propose SKIP: a novel secure key issuing scheme for P2P networks using IBC. We present an IBC infrastructure setup phase, a peer registration...
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based trust management system (TMS). Most of previous work concentrates on how to rate peerspsila behaviors with the trust mechanism and how to establish the reputation-based...
It cannot satisfy higher levels of security requirements of the space network that just implement protection in only one protocol layer. But, most space mission cannot simultaneously carry on the security in the multiple layers, because of that is easy to have the repetition induction, and introduce shortage of security, and increase development and the operating cost. In this paper, we proposed the...
This paper presents a distributed authentication architecture based on peer-to-peer networking paradigms to minimise the delays in authenticating and authorising mobile nodes roaming across different wireless networks. The fundamental principle is to provide a mechanism to shift elements required for authentication closer to the mobile node's current point of access thus reducing the need for interaction...
In this paper, we propose an anonymous protocol to secure nodes which have important roles in the network. We focus in the clustering approach to secure the mobile ad hoc networks (MANETs). In each cluster, a confident node is selected to ensure the certification authority (CA) roles; however, the cluster security depends in the security of the CA node. Therefore, we present an anonymous dynamic demilitarized...
Peer-to-peer based live stream sharing platform is a novel technique for distributing visual data. Because of developments in computer equipment and network service, viewers can watch shows via the Internet rather than through the conventional broadcasted manner. Although data access via the Internet is more convenient, it is more difficult to manage the data transmission, and issues such as copyrighting...
Adhoc networks are self-configurable networks with dynamic topologies. All involved nodes in the network are responsible for management activities. In multihop adhoc environment, it is difficult to maintain paths through intermediate nodes, due to the mobility of nodes, nature of radio transmission etc. In the absence of an authentication mechanism, malicious nodes can easily corrupt route tables,...
Most of the current trust models in peer-to-peer (P2P) networks are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. In addition, the conventional access control mechanism is not suitable because the P2P networks is decentralize and dynamic one. We propose a neighborhood key method, authentication scheme base on zero-knowledge proof...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.