scholarly journals Peer to Peer Secure Communication in Mobile Environment: A Novel Approach

2012 ◽  
Vol 52 (9) ◽  
pp. 24-29 ◽  
Author(s):  
A. K.Singh ◽  
Shubham Maheshwari ◽  
Shekhar Verma
2011 ◽  
Vol 2 (2) ◽  
pp. 77 ◽  
Author(s):  
Hailong Sun ◽  
Jinpeng Huai ◽  
Xudong Liu ◽  
Jing Li
Keyword(s):  

Author(s):  
C. Chow ◽  
H. Leong ◽  
A. Chan

An infrastructure-based mobile environment is formed with a wireless network connecting mobile hosts (MHs) and mobile support stations (MSSs). MHs are clients equipped with portable devices, such as laptops, personal digital assistants, cellular phones, and so on, while MSSs are stationary servers providing information access for the MHs residing in their service areas. With the recent widespread deployment of contemporary peer-to-peer (known as P2P throughout this chapter) wireless communication technologies, such as IEEE 802.11 (IEEE Standard 802-11, 1997) and Bluetooth (Bluetooth SIG, 2004), coupled with the fact that the computation power and storage capacity of most portable devices have been improving at a fast pace, a new information sharing paradigm known as P2P information access has rapidly taken shape. The MHs can share information among themselves rather than having to rely solely on their connections to the MSS. This article reviews a hybrid communication framework - that is, mobile cooperative caching - which combines the P2P information access paradigm into the infrastructure-based mobile environment.


2018 ◽  
Vol 9 (1) ◽  
pp. 19-42 ◽  
Author(s):  
Mohammad Yamin ◽  
Adnan Ahmed Abi Sen

Location Based Services (LBS) expose user data to malicious attacks. Approaches, evolved, so far, for preserving privacy and security, suffer from one or more anomalies, and hence the problem of securing LBS data is far from being resolved. In particular, accuracy of results vs. privacy degree, privacy vs. performance, and trust between users are open problems. In this article, we present a novel approach by integration of peer-to-peer (P2P) with the caching technique and dummies from real queries. Our approach increases efficiency, leads to improved performance, and provides solutions to many problems that have existed in the past. In addition, we offer an improved way of managing cache. Simulation demonstrates superiority of our approach over earlier ones dealing with both the ratio of privacy and that of performance.


Sign in / Sign up

Export Citation Format

Share Document