Inicio  /  Future Internet  /  Vol: 2 Par: 4 (2010)  /  Artículo
ARTÍCULO
TITULO

A Survey on Security in Mobile Peer-to-Peer Architectures?Overlay-Based vs. Underlay-Based Approaches

Christian Gottron    
André König and Ralf Steinmetz    

Resumen

Mobile Ad hoc networks (MANET) and Peer-to-Peer (P2P) networks share central characteristics such as their distributed and decentralized nature. Combining both networking paradigms results in a Mobile Peer-to-Peer (MP2P) system that operates independently from a preexisting infrastructure. Securing MP2P networks in terms of availability and robustness as basic demands in envisioned application scenarios like first responder operations is a challenging task. In this article, we present a survey of selected threats and of state of the art countermeasures for MANETs and P2P networks. Further, we discuss the efficiency of MANET and P2P security mechanisms when applied in MP2P networks.

 Artículos similares

       
 
Emmanuel Effah, Ousmane Thiare and Alexander M. Wyglinski    
This paper presents an in-depth contextualized tutorial on Agricultural IoT (Agri-IoT), covering the fundamental concepts, assessment of routing architectures and protocols, and performance optimization techniques via a systematic survey and synthesis of... ver más
Revista: IoT

 
Ryandika, Meifrinaldi, Krishna Suryanto Pribadi, Igor Martek, Toong Khuan Chan    
This study explores the impact of the COVID-19 pandemic on formal and informal workers in the Indonesian construction industry. Based on a questionnaire survey of workers in the province of West Java, it aims to test the view that informal workers are mo... ver más

 
Duc-Thinh Ngo, Ons Aouedi, Kandaraj Piamrat, Thomas Hassan and Philippe Raipin-Parvédy    
As the complexity and scale of modern networks continue to grow, the need for efficient, secure management, and optimization becomes increasingly vital. Digital twin (DT) technology has emerged as a promising approach to address these challenges by provi... ver más
Revista: Future Internet

 
Ricardo Martins Gonçalves, Miguel Mira da Silva and Paulo Rupino da Cunha    
The immutability of data stored in a blockchain is a crucial pillar of trust in this technology, which has led to its increasing adoption in various use cases. However, there are situations where the inability to change or delete data may be illegal. Eur... ver más
Revista: Future Internet

 
Brent Pethers and Abubakar Bello    
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigat... ver más
Revista: Future Internet