A Tool Supported Methodology for Developing Secure Mobile P2P Systems

A Tool Supported Methodology for Developing Secure Mobile P2P Systems

James Walkerdine (Lancaster University, UK), Peter Phillips (Lancaster University, UK) and Simon Lock (Lancaster University, UK)
DOI: 10.4018/978-1-60566-715-7.ch013
OnDemand PDF Download:
$37.50

Abstract

The growth of mobile devices with near PC equivalent capabilities has brought with it the possibility of mobile Peer-to-Peer (P2P) systems. However, the unique nature of mobile devices introduces new challenges that need to be considered during the development process, especially when considering critical aspects such as system security. This chapter presents the PEPERS Development Methodology (PDM), a tool-supported methodology that aims to assist designers in developing secure mobile P2P systems, and encourages them to consider specific mobile P2P design issues from an early stage. The PDM is demonstrated within the context of a real-world case study of a system developed for a security company.
Chapter Preview
Top

Introduction

The rapid growth in availability of mobile devices with ever increasing functionality has brought with it the possibility of mobile Peer-to-Peer (P2P) systems. More recently, advances in wireless networking and mobile computing technologies, such as wireless LANs, wireless mesh networks and 3G cellular networks have further facilitated the migration of the P2P paradigm into wireless mobile computing. The combination of mobile and P2P technologies could be ideal for organisations that possess characteristics such as, decentralised management styles, geographically dispersed or highly mobile workforces, a wide range of computing and communications devices, etc.

However in developing real-world mobile P2P systems, designers can face a new set of development challenges - particularly when it comes to providing security and privacy. Ensuring such characteristics exist within a system is of particular importance in an environment that, by its very nature, is ad-hoc and heterogeneous.

The issue is complicated, however, by the fact that the P2P approaches used and the underlying mobile technologies will also have an impact on a system’s characteristics (Walkerdine, 2001). For example, the choice of P2P topology can significantly impact on how well a system can provide security. Decentralised P2P systems are likely to be better suited for handling denial of service attacks; the central authority provided by semi-centralised P2P systems would be better suited for handling authentication. Likewise the resource constraints (e.g. memory, battery life) of mobile devices can limit the amount of computation that can be performed or the level of communication between devices.

Such issues are important, and necessary to consider when developing a secure mobile P2P system. Having a development method to accommodate them is vital but, unfortunately, is something which is currently lacking within the domain. This chapter presents the PEPERS Development Methodology (PDM), a tool-supported methodology that provides such development assistance. The PDM encourages designers to consider the issues that are central to mobile P2P system development (for example, identifying security concerns, considering mobility and technical constraints, and making architectural design decisions) from an early stage. It supports the designer throughout the development cycle, from initial requirements elicitation through to the final implementation - ensuring that security and mobile concerns are properly addressed throughout. In particular, it assists developers in determining the most suitable P2P topologies and application reference architectures for their design, based on the system, security and mobility requirements that they have identified. The PDM comes with tool support and this is also illustrated within this chapter.

The PDM was developed as part of the EU funded PEPERS (PEPERS, 2006) project that has developed an infrastructure to support the design, development and operational deployment of secure mobile P2P applications. The outcomes of the project have been utilised and evaluated by industrial user partners within their own business domains, as well as a number of mobile software development companies. In order to help illustrate the use of the PDM and support tool, a real-life case study is provided that involves one of these industrial systems.

This chapter begins by discussing some of the key issues that need to be considered when developing a secure mobile P2P system. An overview of the PDM is then provided, along with a description of the case study and developed tool support. The PDM is then described in detail, referring to the case study to demonstrate each stage in use.

Complete Chapter List

Search this Book:
Reset
Editorial Advisory Board
Table of Contents
Acknowledgment
Boon-Chong Seet
Chapter 1
Raphaël Kummer, Peter Kropf, Pascal Felber
The most important characteristics of mobile ad-hoc networks (MANETs) such as broadcast and multihop communication, limited resources (particularly... Sample PDF
P2P Information Lookup, Collection, and Distribution in Mobile Ad-Hoc Networks
$37.50
Chapter 2
Thomas Repantis, Vana Kalogeraki
In this chapter the authors study the problems of data dissemination and query routing in mobile peerto- peer networks. They provide a taxonomy and... Sample PDF
Data Dissemination and Query Routing in Mobile Peer-to-Peer Networks
$37.50
Chapter 3
Jie Feng, Lisong Xu, Byrav Ramamurthy
With the evolution of wireless technologies, mobile networks can provide much more interesting services and resources to users than before.... Sample PDF
Overlay Construction in Mobile Peer-to-Peer Networks
$37.50
Chapter 4
Thomas Kunz, Abdulbaset Gaddah, Li Li
Peer-to-Peer computing is a popular, relatively new, distributed computing paradigm. It allows for a flexible set of participants to coordinate... Sample PDF
Mobility Support in a P2P System for Publish/Subscribe Applications
$37.50
Chapter 5
Leonardo B. Oliveira, Isabela G. Siqueira, Daniel F. Macedo, José M. Nogueira, Antonio A.F. Loureiro
Both Mobile Ad hoc Networks (MANETs) and Peer-to-Peer (P2P) networks are decentralized self-organizing networks with a dynamic topology, used to... Sample PDF
P2P over MANETs: Application and Network Layers' Routing Assessment
$37.50
Chapter 6
Fotis Loukos, Helen Karatza
Mobile Peer-to-Peer networks are an emerging topic in networking. One of the major usages is the cooperation between peers. The aim of this chapter... Sample PDF
Enabling Cooperation in MANET-Based Peer-to-Peer Systems
$37.50
Chapter 7
Tobias Hoßfeld, Daniel Schlosser, Kurt Tutschku, Phuoc Tran-Gia
The performance of P2P content distribution in cellular networks depends highly on the cooperation and coordination of heterogeneous and often... Sample PDF
Cooperation Strategies for P2P Content Distribution in Cellular Mobile Networks: Considering Selfishness and Heterogeneity
$37.50
Chapter 8
Tobias Hoßfeld, Michael Duelli, Dirk Staehle, Phuoc Tran-Gia
The performance of P2P content distribution in cellular networks depends highly on the cooperation and coordination of heterogeneous and often... Sample PDF
Cooperation Strategies for P2P Content Distribution in Cellular Mobile Networks: Considering Mobility and Heterogeneity
$37.50
Chapter 9
Wei Wu, Kian-Lee Tan
Caching and prefetching are two effective ways for mobile peers to improve access latency in mobile environments. With short-range communication... Sample PDF
Peer-Based Collaborative Caching and Prefetching in Mobile Broadcast
$37.50
Chapter 10
Mark Kai-Ho Yeung, Yu-Kwong Kwok
The widespread deployment of competing wireless technologies has created new research opportunities. In particular, the authors consider media... Sample PDF
Wireless Peer-to-Peer Media Streaming: Incentives and Resource Management Issues
$37.50
Chapter 11
Panayotis Antoniadis
The goal of this chapter is to analyze the incentive issues that arise in multi-hop ad hoc networks when their nodes are potentially mobile devices... Sample PDF
Incentives for Resource Sharing in Ad Hoc Networks: Going Beyond Rationality
$37.50
Chapter 12
Johann van der Merwe, Dawoud Dawoud
Group communication in mobile ad hoc networks (MANETs) generally occurs in the form of dynamic peer groups (DPGs). This chapter reviews the existing... Sample PDF
Key Management for Dynamic Peer Groups in Mobile Ad Hoc Networks
$37.50
Chapter 13
James Walkerdine, Peter Phillips, Simon Lock
The growth of mobile devices with near PC equivalent capabilities has brought with it the possibility of mobile Peer-to-Peer (P2P) systems. However... Sample PDF
A Tool Supported Methodology for Developing Secure Mobile P2P Systems
$37.50
Chapter 14
Spyridon L. Tompros
Enabled by the emergence of high-speed Internet access in last mile communications, P2P systems have witnessed significant growth in the recent... Sample PDF
Integration and Interworking of Fixed and Mobile P2P Systems
$37.50
Chapter 15
Erkki Harjula, Jani Hautakorpi, Nicklas Beijar, Mika Ylianttila
Due to the increasing popularity of Peer-to-Peer (P2P) computing, the information technology industry and standardization organizations have started... Sample PDF
Peer-to-Peer SIP for Mobile Computing: Challenges and Solutions
$37.50
Chapter 16
Kurt Tutschku, Andreas Berl, Tobias Hossfeld, Hermann de Meer
The telecommunication industry has recently seen two areas with very high growth rates: cellular networks, for example, GSM (Global System for... Sample PDF
Mobile P2P in Cellular Mobile Networks: Architecture and Performance
$37.50
Chapter 17
Norihiro Ishikawa, Hiromitsu Sumino, Takeshi Kato, Johan Hjelm, Shingo Murakami, Kazuhiro Kitagawa, Nobuo Saito
Compared with traditional Internet technologies, peer-to-peer technologies has functions to realize resource discovery, resource sharing, and load... Sample PDF
Peer-to-Peer Networking Platform and Its Applications for Mobile Phones
$37.50
Chapter 18
Raphaël Kummer, Peter Kropf, Jean-Frédéric Wagen, Timothée Maret
Many innovative P2P algorithms designed for mobile ad-hoc networks (MANETs) have been designed to scale smoothly when handling a very large number... Sample PDF
Evaluation Platform for Large Scale P2P Mobile Ad-hoc Networks
$37.50
Chapter 19
Alf Inge Wang
This chapter presents the Peer2Me mobile peer-to-peer framework, Peer2Me applications, and discusses the experiences from using the Peer2Me... Sample PDF
Mobile Peer-to-Peer Collaborative Framework and Applications
$37.50
Chapter 20
Antônio Tadeu A. Gomes, Artur Ziviani, Luciana S. Lima, Markus Endler
This chapter surveys the approaches to service discovery that are relevant to mobile peer-to-peer systems in a variety of scenarios. More... Sample PDF
Service Discovery Approaches to Mobile Peer-to-Peer Computing
$37.50
Chapter 21
Marco Conti, Franca Delmastro, Andrea Passarella
Recently, the popularity of p2p computing paradigm has been increasing, especially in the mobile environments, due to the large use of mobile... Sample PDF
Context-Aware P2P Over Opportunistic Networks
$37.50
About the Contributors