Distributed Approach for the Security of P2P Wireless Network

  • Chunyong YinEmail author
  • Nimenya Stacey
  • Tatiana Moreira Beita
  • Jin Wang
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)


Security for mobile P2P networks represents an open research and a main challenge regarding to their vulnerability and convenience to different security attacks such as Sybil attacks, black holes, etc. In this paper, we propose a solution based on a modification of the AODV routing protocol, taking into account the behavior of each node participating in the network solution. The benefits of our proposal are evaluated by simulation.


P2P Wireless mobile network Security Black hole AODV 



This work was funded by the National Natural Science Foundation of China (61772282, 61373134, and 61402234). It was also supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD), Postgraduate Research & Practice Innovation Program of Jiangsu Province (KYCX17_0901) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET). We declare that we do not have any conflicts of interest to this work.


  1. 1.
    Androutsellis-Theotokis, S., Spinellis, D.: A survey of peer-to-peer content distribution technologies. ACM Comput. Surv. (CSUR) 36(4), 335–371 (2004)CrossRefGoogle Scholar
  2. 2.
    King, R.A., Hameurlain, A., Morvan, F.: Query routing and processing in peer-to-peer data sharing systems. arXiv preprint arXiv:1005.5438 (2010)
  3. 3.
    Letort, V.: Adaptation du modèle de croissance GreenLab aux plantes à architecture complexe et analyse multi-échelle des relations source-puits pour l’identification paramétrique. Diss. Châtenay-Malabry, Ecole Centrale de Paris (2008)Google Scholar
  4. 4.
    Kumar, R.M., et al.: 4G–fourth generation wireless systems requirements and technical challenges. J. Theor. Appl. Inf. Technol. 31(1), 29–35 (2011)MathSciNetGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Chunyong Yin
    • 1
    Email author
  • Nimenya Stacey
    • 1
  • Tatiana Moreira Beita
    • 1
  • Jin Wang
    • 2
  1. 1.School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment TechnologyNanjing University of Information Science & TechnologyNanjingChina
  2. 2.College of Information EngineeringYangzhou UniversityYangzhouChina

Personalised recommendations