End-to-End Key Exchange through Disjoint Paths in P2P Networks
نویسندگان
چکیده
Due to their inherent features, P2P networks have proven to be effective in the exchange of data between autonomous peers. Unfortunately, these networks are subject to various security threats that cannot be addressed readily since traditional security infrastructures, which are centralized, cannot be applied to them. Furthermore, communication reliability across the Internet is threatened by various attacks, including usurpation of identity, eavesdropping or traffic modification. Thus, in order to overcome these security issues and allow peers to securely exchange data, we propose a new key management scheme over P2P networks. Our approach introduces a new method that enables a secret key exchange through disjoint paths in the absence of a trusted central coordination point which would be required in traditional centralized security systems.
منابع مشابه
The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks
Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...
متن کاملMultipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
In recent years, routing has been the most focused area in ad hoc networks research. On-demand routing in particular, is widely developed in bandwidth constrained mobile wireless ad hoc networks because of its effectiveness and efficiency. Most proposed on-demand routing protocols are built and relied on single route for each data session. Whenever there is a link disconnection on the active ro...
متن کاملMultipath Routing in Ad Hoc Wireless Networks with Omni Directional and Directional Antenna: A Comparative Study
Several routing schemes have been proposed in the context of mobile ad hoc network. Some of them use multiple paths simultaneously by splitting the information among multitude of paths, as it may help to reduce end-to-end delay and perform load balancing. Multipath routing also diminishes the effects of unreliable wireless links in the constantly changing topology of ad hoc networks to a large ...
متن کاملReducing End-to-End Delay in Multi-path Routing Algorithms for Mobile Ad Hoc Networks
Some of the routing algorithms in mobile ad hoc networks use multiple paths simultaneously. These algorithms can attempt to find nodedisjoint paths to achieve higher fault tolerance capability. By using nodedisjoint paths, it is expected that the end-to-end delay in each path should be independent of each other. However, because of natural properties of wireless media and medium access mechanis...
متن کاملPairwise Key Establishment Scheme for Hypercube-based Wireless Sensor Networks
-When designing wireless sensor networks, the process of establishing and distributing the secret keys securely and efficiently is very challenging due to the unpredictable network topology. Recently, hypercube virtual backbone approach has been used to provide efficient data gathering schemes for the wireless sensor networks. The hypercube attractive structure and topological properties provid...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- ICST Trans. Security Safety
دوره 2 شماره
صفحات -
تاریخ انتشار 2015