Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions

Serverless distributed computing, especially Mobile Ad-hoc NETworks (MANETs) have received significant attention from the research community. Peer-to-peer overlay networks have the potential to accommodate largescale, decentralised applications that can be integrated into a MANET architecture to ena...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of networks Jg. 7; H. 2; S. 288
Hauptverfasser: Millar, Grant Paul, Panaousis, Emmanouil Antionio, Politis, Christos
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Oulu Academy Publisher 01.02.2012
Schlagworte:
ISSN:1796-2056, 1796-2056
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Serverless distributed computing, especially Mobile Ad-hoc NETworks (MANETs) have received significant attention from the research community. Peer-to-peer overlay networks have the potential to accommodate largescale, decentralised applications that can be integrated into a MANET architecture to enable peer-to-peer communication among different mobile peers. These overlay architectures must be very resilient and their utilisation, reliability and availability must satisfy the needs of mobile computing. One must also heed the fact that the wireless nature of the medium introduces security vulnerabilities. The aim of the work described in this paper is twofold. First, we describe our peer-to-peer distributed hash table (DHT) architecture entitled Reliable Overlay Based Utilisation of Services and Topology (ROBUST). This is designed to be efficiently applied to MANETs. We additionally propose security extensions to protect the ROBUST signalling messages against malicious activities. We evaluate the ROBUST performance as well as the security extensions under varying levels of mobility and network sizes by building a custom DHT module for the network simulator ns-2. The outcome of the results show negligible overhead introduced by the extensions giving credence to their application in security sensitive scenarios. Index Terms-peer-to-peer, mobile ad-hoc networks, distributed hash tables, security
Bibliographie:SourceType-Scholarly Journals-1
ObjectType-General Information-1
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
ISSN:1796-2056
1796-2056
DOI:10.4304/jnw.7.2.288-299