Citations
1229 | Tor: The secondgeneration onion router
- Dingledine, Mathewson, et al.
- 2004
(Show Context)
Citation Context ... anonymous and efficient mobile P2P network might not be feasible. However, nodes that are concerned about their anonymity can use external anonymizing services, like onion routing services (e.g. Tor =-=[9]-=-), when using P2P networks. 5 Secure SIP Based MP2P File Sharing We propose security features for our SIP based file-sharing application which enable secure searches and file transfers between peers. ... |
1063 | Freenet: A distributed anonymous information storage and retrieval system
- Clarke, Sandberg, et al.
- 1999
(Show Context)
Citation Context ...bile phone. Memory-use minimization means that we generally have to minimize state information in the application. For example, holding information for hundreds or thousands of peers (like in Freenet =-=[5]-=-) is not a good idea in the mobile application. All in all, use of encryption and other security measures should not increase software’s memory footprint. 2.2 CPU Performance As with the memory, the s... |
303 | An analysis of the skype peer-to-peer internet telephony protocol,”
- Baset, Schulzrinne
- 2006
(Show Context)
Citation Context ... is used by many popular P2P applications, such as Gnutella 0.6 and Kazaa. This architecture is also used by Skype, a massively popular P2P Internet telephony application, developed by the Kazaa team =-=[2]-=-. In hybrid architecture, queries are forwarded from end nodes to the SP. The SPs query each other if any of their ordinary nodes have the searched resource. If there is a match, peers exchange all fu... |
208 | Peer-toPeer Computing”.
- Milojicic, Kalogeraki, et al.
- 2002
(Show Context)
Citation Context ... the same path the request was routed initially. Further communications are directly between the peers or via intermediate nodes, depending whether there is a need for anonymity in the system or not. =-=[16]-=- Flooded searches create a great amount of messaging overhead in pure P2P networks. Thus, pure P2P networks are really not suitable for mobile networks, unless the network size is really small. 3.3 Hy... |
77 | Open problems in data-sharing peer-to-peer systems,” ICDT,
- Daswani, Garcia-Molina, et al.
- 2003
(Show Context)
Citation Context ...e security problems of P2P systems include: authentication, encryption, privacy and confidentiality, and ability to deal with malicious nodes. A bit different categorization is used by Daswani et al. =-=[7]-=-, who organize security issues of P2P data-sharing into four areas: availability, file authenticity, anonymity, and access control. In file P2P sharing environment we can divide security issues by fun... |
61 | Peer-to-peer internet telephony using SIP.
- Singh, Schulzrinne
- 2005
(Show Context)
Citation Context ...f this paper is to propose security measures for this application that can be implemented later this year. TKK T-110.5190 Seminar on Internetworking 2006-05-4/5 4 Security in Hybrid MP2P According to =-=[20]-=-, the security problems of P2P systems include: authentication, encryption, privacy and confidentiality, and ability to deal with malicious nodes. A bit different categorization is used by Daswani et ... |
38 | Query-flood dos attacks in gnutella
- Daswani, Garcia-Molina
- 2002
(Show Context)
Citation Context ...nial of Service (DoS) attacks. Some research has been done considering DoS attacks in decentralized P2P networks; however, this research seems to be concentrating mostly on query-flooding DoS attacks =-=[6]-=-. It is impossible to protect against network level DoS attacks, where node’s network capacity is overflooded. However, it is important to protect against application level DoS attacks, where small to... |
27 |
Security aspects of napster and gnutella
- Bellovin
- 2001
(Show Context)
Citation Context ... searching for content the mobile node has to send the search parameters to the super-peer. These parameters might include file name, file type, file size, or some other relevant parameters. Bellovin =-=[4]-=- describes how both Napster and Gnutella may leak information that users consider private such as search strings. This is one of the major problems with most of modern P2P systems – the search message... |
24 |
kc claffy, and M. Faloutsos. Is P2P dying or just hiding
- Karagiannis, Broido, et al.
(Show Context)
Citation Context ... the fixed Internet. The amount of P2P traffic has far exceeded the amount of any other type of application traffic in the Internet. Some studies suggest that 60 – 80 % of all Internet traffic is P2P =-=[10, 1]-=-. Still, P2P file-sharing has not established itself as the killer application in the mobile domain. This has been largely due to limited capabilities of the mobile devices, such as processing power, ... |
19 |
Secure peer-to-peer networking: The jxta example,”
- Yeager, Williams
- 2002
(Show Context)
Citation Context ...er our SIP based application. JXTA is an open P2P platform which can use Transport Layer Security [8] (TLS) for end-to-end encryption. Authentication in JXTA framework is based on X509v3 certificates =-=[22]-=-. 5.1 Signaling Security Because we are using SIP as the signaling protocol we can use any means of the SIP protocol to provide signaling authenticity, integrity, and confidentiality. Securing signali... |
17 | Experimental analysis of the impact of peer-to-peer applications on traffic
- Azzouna, Guillemin
(Show Context)
Citation Context ... the fixed Internet. The amount of P2P traffic has far exceeded the amount of any other type of application traffic in the Internet. Some studies suggest that 60 – 80 % of all Internet traffic is P2P =-=[10, 1]-=-. Still, P2P file-sharing has not established itself as the killer application in the mobile domain. This has been largely due to limited capabilities of the mobile devices, such as processing power, ... |
14 | K.: Enabling Mobile Peer-to-Peer Networking
- Oberender, Andersen, et al.
- 2005
(Show Context)
Citation Context ...rts, and some of them are available even for public. None of them implements any security measures, such as peer authentication, signaling or content encryption. 3.5.1 Mobile eDonkey Oberender et al. =-=[17]-=- have developed a mobile P2P file transfer architecture based on the eDonkey protocol. Some modifications to the original architecture have been done. This architecture includes modifications to the I... |
7 | Supporting Mobile Devices in Gnutella File Sharing Network with Mobile Agents
- Hu, Thai, et al.
- 2003
(Show Context)
Citation Context ...ures over the traditional Gnutella protocol. The searches are flooded in the network and are visible to intermediate peers, and the file transfers are unencrypted. 3.5.3 Mobile Gnutella Another paper =-=[21]-=- argues that the usual P2P file sharing networks, such as Gnutella, are not suitable for the mobile environment due to their bandwidth consuming broadcast nature. Instead, a modified architecture for ... |
6 |
Design and Implementation of Mobile Peer-to-Peer Application
- Lehtinen
- 2006
(Show Context)
Citation Context ...essing power, storage capacity, and network bandwidth. Also, in mobile networks the shared content is most likely user created, whereas in fixed networks the content is mostly professionally created. =-=[12]-=- Although most of the studies concerning P2P networking have been made with fixed, high capacity networks in mind, research on mobile P2P is slowly emerging. The special requirements and constraints o... |
5 |
Mitigating denial of service attacks with password puzzles
- Ma
(Show Context)
Citation Context ...ing node perform more work than the node it is attacking. This can be accomplished for example by forcing the node to solve a cryptographic puzzle before it can perform the search or download request =-=[13]-=-. 4.4 Anonymity Hybrid P2P networks are not generally able to provide any kind of anonymity because nodes are using same static super-peers to search for files. And because there are no intermediate n... |
4 |
Mobile Peer-to-Peer Content Sharing Services in IMS
- Beijar, Matuszewski, et al.
- 2005
(Show Context)
Citation Context ...orm Resource Identifiers (URIs) as node identifiers. Use of SIP identifiers enables seamless mobility because changes in node IP-addresses are abstracted away using the underlying SIP infrastructure. =-=[15, 3]-=-. Our architecture uses two standard SIP methods to implement all of its functionality: INVITE and MESSAGE. Nodes upload information about the files they are sharing to the super-peer in MESSAGE reque... |
4 |
Mobile Peer-to-Peer Content Sharing Application
- Matuszewski, Beijar, et al.
- 2006
(Show Context)
Citation Context ...orm Resource Identifiers (URIs) as node identifiers. Use of SIP identifiers enables seamless mobility because changes in node IP-addresses are abstracted away using the underlying SIP infrastructure. =-=[15, 3]-=-. Our architecture uses two standard SIP methods to implement all of its functionality: INVITE and MESSAGE. Nodes upload information about the files they are sharing to the super-peer in MESSAGE reque... |
1 | Reliability of Data in Structured Peer-to-Peer Systems
- Rieche, Wehrle, et al.
- 2004
(Show Context)
Citation Context ...way to classify P2P networks is to divide them into structured, unstructured, and centralized architectures. The structured architectures are usually based on distributed hash table (DHT) algorithms. =-=[18]-=- In the structured architectures, content is found by specifying a unique key for the content, be that hash of the file, hash of the filename, or some other unique identifier. There is no way to perfo... |