Due to the global increase in mobile devices and cellular networks such as 3G, 4G, or LTE-A networks, the concept of the interpenetration of peer-to-peer (P2P) overlay networks in cellular environments has gained immense popularity among mobile users. P2P networks allow users to share their computing resources efficiently with the advantages of fault tolerance, robust connectivity, load balancing, and easy maintenance. The ability of a peer to connect to another peer depends on the distinguishing features of the overlay networks. For connection, network routing tables are maintained by each peer in the network to construct the P2P overlay on the Internet. This construction renders the P2P networks vulnerable to the existing attacks using the Internet. Some of these attack models have been proposed in the past using botnets. However, models using botnets do not accommodate the advanced attacks that can infect the majority of the entries in the routing table. In this paper, we propose a model to analyze the impacts of routing table poisoning attacks on the P2P botnet (rBot) architecture. We present the security analysis of the proposed epidemic model for state-of-the-art rBots. The obtained results were effective for attacks on the unstructured P2P static and mobile environments. INDEX TERMS Decentralized botnet, epidemic model, P2P overlay, routing table poisoning, mobility.
The advancement of portable mobile wireless devices such as smart-phones, brought mobile peer-to-peer (P2P) as an extension of traditional P2P networks to provide efficient, low-cost communication among them in a cellular network. Assigning a unique identifier to each mobile node is a challenging issue. An adversary can target to disrupt the P2P system by carefully selecting user identifications (IDs) or obtaining many pseudo-IDs. This work proposes a secure node ID-assignment mechanism in the mobile P2P system, called PJ-Sec (Secure Peer Joining). PJ-Sec allows us to join a peer and generate node ID by a collaborative effort of an existing peer (within the vicinity) and pre-selected vicinity head. PJ-Sec is formally analyzed using the AVISPA model checker and found to be attack resistant. The complete mechanism has been implemented on mobile phones and observed that a complete round execution of node joining consumes approx 0.5 mAh amount of energy.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.