Skip to main content
Log in

Key exchange process of PIM-SM-based for Multiple Group Communication in P2P

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Recently, as the P2P service environment repeats evolution, its usage in mobile is rapidly increasing. Applications are being developed in various mobile environments. However, there are still a lot of vulnerability in security service. It needs to guarantee important security elements including authentication and confidentiality between users, that is, between sender and receiver. In this study, I analyzed security service for secure multiple communication in P2P, and proposed key exchange process that provides PIM-SM-based authentication and confidentiality to security join multiple communication service in P2P. I could attempt more specific encryption by using public key in all encryption procedures, but I used public key crypto system only in the initial process for group join, because it needs complicated key distribution and a massive amount of key database construction. The proposed key exchange process is applied to execution of P2P service and shows security for authentication and confidentiality. In the future, it is needed to develop secure access platform to which key exchange process, proposed as the subject of study, is applied.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Wi-Fi Alliance (2010) Wi-Fi certified Wi-Fi direct. White paper

  2. Wi-Fi Alliance (2010) Wi-Fi peer-to-peer(P2P) technical specification version 1.1

  3. Wi-Fi Alliance (2011) Wi-Fi simple configuration protocol and usability best practices for the Wi-Fi protected setup program version 2.0.1

  4. ISO/IEC 20002 (2012) Managed P2P: framework

  5. ISO/IEC JTC1/SC6, 6N15355 (2012) Proposed NP text on functional architecture and protocols for managed P2P communications

  6. El-Ansary S, Haridi S (2005) An overview of structured P2P overlay networks. IEEE Commun Surv Tutor

  7. Lua EK, Crowcroft J, Pias M, Sharma R, Lim S (2004) A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutor 7(2):72–93

    Google Scholar 

  8. Vishnumurthy V, Francis P (2007) A comparison of structured and unstructured P2P approaches to heterogeneous random peer selection. 2007 USENIX Annual Technical Conference, pp 309–322

  9. Shin W, Rhee K-H (2012) Risk analysis on vulnerabilities and threats for domestic P2P service environments. J Korea Inf Commun Soc 16(7):7447–7454

    Google Scholar 

  10. Lee S-H (2009) A design of mobile agent support system in hybrid P2P environment

  11. He H, Li R, Xu Z, Xiao W (2013) An efficient ECC-based mechanism for securing network coding-based P2P content distribution. Peer-to-Peer Netw Appl. doi:10.1007/s12083-013-0239-x

  12. Hübsch C, Waldhorst OP, Hock M (2012) Distributed WiFi detection and integration in dense urban mobile Peer-to-Peer networks. Peer-to-Peer Netw Appl 5(4):323–339

    Article  Google Scholar 

  13. Wu S, Pu Q, Kang F (2013) Practical authentication scheme for SIP. Peer-to-Peer Netw Appl 6(1):61–74

    Article  Google Scholar 

  14. Liaoa Y-P, Wanga S-S (2010) A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Comput Commun 33(3):372–380

    Article  Google Scholar 

  15. Kong J, Cai W, Wang L, Zhao Q (2010) A study of pollution on BitTorrent. Proc. The 2nd International Conference on Computer and Automation Engineering, Singapore

  16. Lee T-F, Hwanga T (2010) Simple password-based three-party authenticated key exchange without server public keys. Inf Sci 180(9):1702–1714

    Article  MATH  Google Scholar 

  17. Yoon E-J, Yoo K-Y (2011) Cryptanalysis of a simple three-party password-based key exchange protocol. Int J Commun Syst 24(4):532–542

    Article  Google Scholar 

  18. Magharei N, Rejaie R (2007) Peer-to-peer receiver-driven mesh-based streaming. IEEE INFOCOM 2007

  19. Zhang M, Sun L, Fang Y, Yang S (2010) The system to provide low delay peer-to-peer live streaming service over internet. Peer-to-Peer Netw Appl 3(3):175–185

    Article  MATH  Google Scholar 

  20. Zhang X, Liu J, Li B, Yum T-SP (2005) A data-driven overlay network for peer-to-peer live media streaming. IEEE Conf Comput Commun (INFOCOM) 3:2102–2111

    Google Scholar 

  21. Jia D, Yee WG, Nguyen LT (2008) Ophir Frieder. Distributed, automatic file descriptor tuning in P2P file-sharing systems. Vol. 1, Issue 2, pp 148–161

  22. Cuenca-Acuna FM, Nguyen TD (2005) Text-based content search and retrieval in ad hoc P2P communities. In Proc. Intl. Workshop Peer-to-Peer Comp. Springer, London, pp 220–234

  23. Yee WG, Nguyen LT, Frieder O (2007) Masked queries for search accuracy in peer-to-peer file-sharing systems. In Parallel and distributed processing symposium, IPDPS 2007. IEEE International, pp. 1–10

  24. Sarshar N, Roychowdhury VP (2008) SUPNET: an end-to-end solution to scalable unstructured P2P networking. Peer-to-Peer Netw Applic 1(2):122–138

    Article  Google Scholar 

  25. Doulkeridis C, Vlachou A, Nørvåg K, Kotidis Y, Vazirgiannis M (2010) 79 Efficient search based on content similarity over self-organizing P2P networks. Peer-to-Peer Netw Applic 3(1):67–79

    Article  Google Scholar 

  26. Karagiannis T, Broido A, Faloutsos M, Claffy Kc (2004) Transport layer identification of P2P traffic. In: Proceedings of IMC, pp 121–13

  27. Song M, Shetty S, Jiang W, Park EK (2011) Special issue on information dissemination and new services in P2P systems. Peer-to-Peer Netw Appl 4(1):1–2

    Article  Google Scholar 

  28. Holbrook H, Handley M, Holbrook H, Kouvelas I (2006) Protocol independent multicast sparse mode (PIM-SM): protocol specification (Revised). RFC 4601, http://www.rfc-editor.org/pdfrfc/rfc4601.txt.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bong-Han Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, SJ., Kim, BH. Key exchange process of PIM-SM-based for Multiple Group Communication in P2P. Peer-to-Peer Netw. Appl. 8, 587–595 (2015). https://doi.org/10.1007/s12083-014-0274-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-014-0274-2

Keywords

Navigation