Share This Article:

A Framework for Security-Enhanced Peer-to-Peer Applications in Mobile Cellular Networks

Abstract Full-Text HTML Download Download as PDF (Size:324KB) PP. 456-463
DOI: 10.4236/ijcns.2011.47055    3,511 Downloads   6,543 Views  

ABSTRACT

Due to the dual trends of increasing cellular network transmission capacity and coverage as well as improving computational capacity, storage and intelligence of mobile handsets, mobile peer-to-peer (MP2P) networking is emerging an attractive research field in recent years. However, these trends have not been clearly articulated in perspective of both technology and business. In this paper, we propose a novel MP2P framework that is based on existing cellular network architecture to provide secure and efficient P2P file sharing for 3G and future 4G systems. Our framework, which is built on P2P over Session Initiation Protocol (SIP) mechanism, provides to network operators and P2P service providers efficient data transmission in cellular networks. With a secure enhancement using identity-based cryptography, the framework also provides desirable support for security, group management, mobility, and chargeability to meet business requirements.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

S. Liu, S. Zhao and W. Jiang, "A Framework for Security-Enhanced Peer-to-Peer Applications in Mobile Cellular Networks," International Journal of Communications, Network and System Sciences, Vol. 4 No. 7, 2011, pp. 456-463. doi: 10.4236/ijcns.2011.47055.

References

[1] N. B. Azzouna and F. Guillemin, “Experimental Analysis of the Impact of Peer-to-Peer Applications on Traffic in Commercial IP Networks,” European Transactionson Telecommunications, Special Issue on P2PNetworking and P2P Services, Vol. 15, No. 6, November-December 2004, pp. 511-522.
[2] T. Karagiannis, A. Broido, N. Brownlee, K. C. Claffy and M. Faloutsos, “Is P2P Dying or Just Hiding?” Proceeding s of IEEE Global Telecommunications Conference, Dallas, Vol. 3, 29 November-3 December 2004, pp. 1532-1538.
[3] K. Singh and H. Schulzrinne, “Peer-to-peer Internet Telephony using SIP,” Columbia University Technical Report, CUCS-044-04, New York, October 2004.
[4] J. Yang, Y. P. Zhong and S.Y. Zhang, “An Effcient Interest-Group Based Search Mechanism in Unstructured Peer-to-Peer Networks,” Proceddings of the International Conference on Computer Networks and Mobile Computing, Shanghai, 20-23 October 2003, pp. 247-252.
[5] H. C. Hsiao and C. T. King, “Bristle: A Mobile Structured Peer-to-Peer Architecture,” Proceeding of International Parallel and Distributed Processing Symposium, Nice, 22-26 April 2003, pp. 33-40.
[6] T. H.-T. Hu, B. Thai and A. Seneviratne, “Supporting Mobile Devices in Gnutella File Sharing Network with Mobile Agents,” Proceedings of the 8th IEEE International Symposium on Computers and Communications, Kemer-Antalya, 28 June-1 July 2004, pp. 25-30.
[7] S. Liu, W. Jiang and J. Li, “Architecture and Performance Evaluation for P2P Application in 3G Mobile Cellular Systems”, Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, 21-25 September 2007, pp. 914-917. doi:10.1109/WICOM.2007.235
[8] 3GPP TS 23.002 v5.12.0 3rd Generation Partnership Project; Technical Speci_cation Group Services and Systems Aspects Network architecture (Release 5). Sep. 2003.
[9] G. Camarillo and M. A. Garcia Martin, “The 3G IP Multimedia Subsystem,” John Wiley & Sons, Hoboken, ISBN 0470 871563, 2004.
[10] D. Wagner, “GSM Cloning,” June 2010 http://www.isaac.cs.berkeley.edu/isaac/gsm.html
[11] A. Biryukov, A. Shamir and D. Wagner, “Real Time Cryptanalysis of A5/1 on a PC,” Proceedings of the 7th International Workshop on Fast Software Encryption, 2000, pp. 1-18.
[12] G. Koien, “An Introduction to Access Security in UMTS,” IEEE Wireless Communications, Vol. 11, No. 1, 2004, pp. 8-18. doi:10.1109/MWC.2004.1269712
[13] Gupta, Gupta, Chang, and Stebila, “Performance Analysis of Elliptic Curve Cryptography for SSL,” Proceedings of the ACM Workshop on Wireless Security, Atlanta, September 2002, pp. 87-94.
[14] D. Boneh and M. Franklin, “Identity-Based Encryption From The Weil Pairing,” Proceedings of Cryptology, Lecture Notes in Computer Science, Vol. 2139, Springer, 2001, pp. 213-219.
[15] S. Zhao, A. Aggarwal and S. Liu, “Building Secure User-to-User Messaging in Mobile Telecommunication Networks,” Proceedings of Wireless Telecomunications Symposium, Pomona, 24-26 April 2008, pp. 151-157. doi:10.1109/WTS.2008.4547559
[16] K. Hoeper and G. Gong “Preventing or Utilising Key Escrow in Identity-Based Schemes Employed in Mobile Ad Hoc Networks,” International Journal of Security and Networks, Vol. 2, No. ?, 2007, pp. 239-250.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.