PJ-Sec: secure node joining in mobile P2P networks
نویسندگان
چکیده
منابع مشابه
Secure Node Localization in Mobile Sensor Networks
Secure node localization in wireless sensor networks (WSN) has become an important research topic. Although, Global Positioning System (GPS) based node localization has got significant attention from researchers, GPS-free node localization trend is evolving in recent times. GPS-free node localization in mobile sensor networks can be constructed in two ways: Beacon based (BB) and Without Beacon ...
متن کاملNode Mobility in Unstructured P2P Networks
P2P networks research is mainly focused on techniques for efficiently finding files to download from the network. Problems like churn and robustness have been thoroughly analyzed. Mobility in P2P networks is still an open topic. In this paper, we address the problem of deciding what to do in the case of node mobility. A node which knows that it is going to move in another part of the network wa...
متن کاملSecure and Mobile P2P File Sharing
In today’s Internet, a major portion of the total traffic is generated by peer-to-peer applications such as Skype and BitTorrent. The amount of this traffic has been increasing since the beginning of this decade. At the same time, mobile use of the Internet has become even more popular. New mobile phones enable people to surf the web and read their mails wherever they are. However, for some rea...
متن کاملTowards secure mobile P2P applications using JXME
Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On tha...
متن کاملSecure Cooperative Caching In Wireless P2P Networks
–Secure cooperative caching , that permits the distributing and synchronization of data among manifold peers, could be employed to augment the functioning competency of the data access in wireless P2P networks. As caching is used, data from the base station is duplicated on the caching peer. In view of the fact that a wireless node might revisit the cached data, or change the direction and move...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: CCF Transactions on Pervasive Computing and Interaction
سال: 2020
ISSN: 2524-521X,2524-5228
DOI: 10.1007/s42486-020-00047-x