Title :
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
Author :
Palomar, Esther ; Tapiador, Juan M E ; Hernandez-Castro, Julio C. ; Ribagorda, Arturo
Author_Institution :
Carlos III Univ. of Madrid, Madrid
Abstract :
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulated a general trend towards extending peer-to-peer (P2P) characteristics to wireless environments. As a result, the P2P paradigm has begun to migrate to pervasive computing scenarios. So far, research in this domain has led to some middleware models working over mobile ad hoc networks (MANETs), which are now viewed as a mobile-P2P (M-P2P) networks. However, the highly dynamic, decentralized and self-organizing nature of MANETs does not fit well with many approaches developed in the P2P world. In particular, it does not seem easy to deploy security solutions for M-P2P due, among other reasons, to the inherent limitations of the peers´ devices and their potentially very sporadic interaction with other peers. Under these assumptions, a significant challenge is how to establish a decentralized trust management system. In this paper, we first summarize the advances in M-P2P security services and point out potential future applications based on opportunistic interactions. Then, we discuss several kind of threats and attacks, and finally analyze the (un)suitability of employing trust-based systems in some of these environments.
Keywords :
middleware; mobile computing; peer-to-peer computing; security of data; 3G services; decentralized trust management system; middleware models; mobile P2P security; mobile ad hoc networks; mobile devices; peer-to-peer characteristics; sporadic strangers; trust-based systems; wireless networks; Application software; Collaboration; Computer science; Data security; Databases; Expert systems; Information security; Mobile ad hoc networks; Peer to peer computing; Wireless networks; Mobile P2P; Security; Threats and Attacks; Trust;
Conference_Titel :
Database and Expert Systems Applications, 2007. DEXA '07. 18th International Workshop on
Conference_Location :
Regensburg
Print_ISBN :
978-0-7695-2932-5
DOI :
10.1109/DEXA.2007.103