Abstract
Recently, as the P2P service environment repeats evolution, its usage in mobile is rapidly increasing. Applications are being developed in various mobile environments. However, there are still a lot of vulnerability in security service. It needs to guarantee important security elements including authentication and confidentiality between users, that is, between sender and receiver. In this study, I analyzed security service for secure multiple communication in P2P, and proposed key exchange process that provides PIM-SM-based authentication and confidentiality to security join multiple communication service in P2P. I could attempt more specific encryption by using public key in all encryption procedures, but I used public key crypto system only in the initial process for group join, because it needs complicated key distribution and a massive amount of key database construction. The proposed key exchange process is applied to execution of P2P service and shows security for authentication and confidentiality. In the future, it is needed to develop secure access platform to which key exchange process, proposed as the subject of study, is applied.
Similar content being viewed by others
References
Wi-Fi Alliance (2010) Wi-Fi certified Wi-Fi direct. White paper
Wi-Fi Alliance (2010) Wi-Fi peer-to-peer(P2P) technical specification version 1.1
Wi-Fi Alliance (2011) Wi-Fi simple configuration protocol and usability best practices for the Wi-Fi protected setup program version 2.0.1
ISO/IEC 20002 (2012) Managed P2P: framework
ISO/IEC JTC1/SC6, 6N15355 (2012) Proposed NP text on functional architecture and protocols for managed P2P communications
El-Ansary S, Haridi S (2005) An overview of structured P2P overlay networks. IEEE Commun Surv Tutor
Lua EK, Crowcroft J, Pias M, Sharma R, Lim S (2004) A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutor 7(2):72–93
Vishnumurthy V, Francis P (2007) A comparison of structured and unstructured P2P approaches to heterogeneous random peer selection. 2007 USENIX Annual Technical Conference, pp 309–322
Shin W, Rhee K-H (2012) Risk analysis on vulnerabilities and threats for domestic P2P service environments. J Korea Inf Commun Soc 16(7):7447–7454
Lee S-H (2009) A design of mobile agent support system in hybrid P2P environment
He H, Li R, Xu Z, Xiao W (2013) An efficient ECC-based mechanism for securing network coding-based P2P content distribution. Peer-to-Peer Netw Appl. doi:10.1007/s12083-013-0239-x
Hübsch C, Waldhorst OP, Hock M (2012) Distributed WiFi detection and integration in dense urban mobile Peer-to-Peer networks. Peer-to-Peer Netw Appl 5(4):323–339
Wu S, Pu Q, Kang F (2013) Practical authentication scheme for SIP. Peer-to-Peer Netw Appl 6(1):61–74
Liaoa Y-P, Wanga S-S (2010) A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Comput Commun 33(3):372–380
Kong J, Cai W, Wang L, Zhao Q (2010) A study of pollution on BitTorrent. Proc. The 2nd International Conference on Computer and Automation Engineering, Singapore
Lee T-F, Hwanga T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inf Sci 180(9):1702–1714
Yoon E-J, Yoo K-Y (2011) Cryptanalysis of a simple three-party password-based key exchange protocol. Int J Commun Syst 24(4):532–542
Magharei N, Rejaie R (2007) Peer-to-peer receiver-driven mesh-based streaming. IEEE INFOCOM 2007
Zhang M, Sun L, Fang Y, Yang S (2010) The system to provide low delay peer-to-peer live streaming service over internet. Peer-to-Peer Netw Appl 3(3):175–185
Zhang X, Liu J, Li B, Yum T-SP (2005) A data-driven overlay network for peer-to-peer live media streaming. IEEE Conf Comput Commun (INFOCOM) 3:2102–2111
Jia D, Yee WG, Nguyen LT (2008) Ophir Frieder. Distributed, automatic file descriptor tuning in P2P file-sharing systems. Vol. 1, Issue 2, pp 148–161
Cuenca-Acuna FM, Nguyen TD (2005) Text-based content search and retrieval in ad hoc P2P communities. In Proc. Intl. Workshop Peer-to-Peer Comp. Springer, London, pp 220–234
Yee WG, Nguyen LT, Frieder O (2007) Masked queries for search accuracy in peer-to-peer file-sharing systems. In Parallel and distributed processing symposium, IPDPS 2007. IEEE International, pp. 1–10
Sarshar N, Roychowdhury VP (2008) SUPNET: an end-to-end solution to scalable unstructured P2P networking. Peer-to-Peer Netw Applic 1(2):122–138
Doulkeridis C, Vlachou A, Nørvåg K, Kotidis Y, Vazirgiannis M (2010) 79 Efficient search based on content similarity over self-organizing P2P networks. Peer-to-Peer Netw Applic 3(1):67–79
Karagiannis T, Broido A, Faloutsos M, Claffy Kc (2004) Transport layer identification of P2P traffic. In: Proceedings of IMC, pp 121–13
Song M, Shetty S, Jiang W, Park EK (2011) Special issue on information dissemination and new services in P2P systems. Peer-to-Peer Netw Appl 4(1):1–2
Holbrook H, Handley M, Holbrook H, Kouvelas I (2006) Protocol independent multicast sparse mode (PIM-SM): protocol specification (Revised). RFC 4601, http://www.rfc-editor.org/pdfrfc/rfc4601.txt.pdf
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, SJ., Kim, BH. Key exchange process of PIM-SM-based for Multiple Group Communication in P2P. Peer-to-Peer Netw. Appl. 8, 587–595 (2015). https://doi.org/10.1007/s12083-014-0274-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-014-0274-2