Journal of Networks, Vol 7, No 2 (2012), 288-299, Feb 2012

Distributed Hash Tables for Peer-to-Peer Mobile Ad-hoc Networks with Security Extensions

Grant Paul Millar, Emmanouil Antionio Panaousis, Christos Politis


Serverless distributed computing, especially Mobile Ad-hoc NETworks (MANETs) have received significant attention from the research community. Peer-to-peer overlay networks have the potential to accommodate large-scale, decentralised applications that can be integrated into a MANET architecture to enable peer-to-peer communication among different mobile peers. These overlay architectures must be very resilient and their utilisation, reliability and availability must satisfy the needs of mobile computing. One must also heed the fact that the wireless nature of the medium introduces security vulnerabilities. The aim of the work described in this paper is twofold. First, we describe our peer-to-peer distributed hash table (DHT) architecture entitled Reliable Overlay Based Utilisation of Services and Topology (ROBUST). This is designed to be efficiently applied to MANETs. We additionally propose security extensions to protect the ROBUST signalling messages against malicious activities. We evaluate the ROBUST performance as well as the security extensions under varying levels of mobility and network sizes by building a custom DHT module for the network simulator ns-2. The outcome of the results show negligible overhead introduced by the extensions giving credence to their application in security sensitive scenarios. 


peer-to-peer; mobile ad-hoc networks; distributed hash tables; security


A. Banerjee and C.-T. King, “Building ring-like overlays on wireless ad hoc and sensor networks,” IEEE Trans. Parall. and Distr. Syst., vol. 20, no. 11, pp. 1553 –1566, nov. 2009.

M. Bisignano, G. Di Modica, O. Tomarchio, and L. Vita, “P2p over manet: a comparison of cross-layer approaches,” Proc. of Database and Expert Systems Applications (DEXA), pp. 814-818, sep. 2007.

H. Pucha, S. M. Das, and Y. C. Hu, “Ekta: An efficient dht substrate for distributed applications in mobile ad hoc networks,” Proc. IEEE WMCSA, pp. 163–173, 2004.

R. Schollmeier, I. Gruber, and F. Niethammer, “Protocol for peer-to-peer networking in mobile environments,” Computer Communications and Networks, 2003. ICCCN 2003. Proceedings. The 12th International Conference on, pp. 121 – 127, oct. 2003.

M. Conti, E. Gregori, and G. Turi, “A cross-layer optimization of gnutella for mobile ad hoc networks,” Proc. ACM MOBIHOC, pp. 343–354, 2005.

B. Tang, Z. Zhou, A. Kashyap, and T. Chiueh, “An integrated approach for p2p file sharing on multi-hop wireless networks,” Proc. of IEEE WIMOB, vol. 3, pp. 268–274, 2005.

T. Zahn and J. Schiller, “Madpastry: A dht substrate for practicably sized manets,” Proc. of ASWN (Applications and Services in Wireless Networks) Conference, June 2005.

D. Chopra, H. Schulzrinne, E. Marocco, and E. Ivov, “Peer-to-peer overlays for real-time communication: security issues and solutions,” IEEE Communications Surveys & Tutorials, vol. 11, no. 1, pp. 4–12, First Quarter 2009.

G. Millar, E. Panaousis, and C. Politis, “Robust: Reliable overlay based utilisation of services and topology for emergency manets,” in Proc. IEEE Future Network and MobileSummit, Florence, Italy, Jun. 2010.

S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz, “Handling churn in a dht,” in Proc. USENIX, ser. ATEC ’04. Berkeley, CA, USA: USENIX Association, 2004.

D. Kim, H. Bae, and C. K. Toh, “Improving tcp-vegas performance over manet routing protocols,” IEEE Trans. on Veh. Techn., vol. 56, no. 1, pp. 372 –377, jan. 2007.

L. Barolli, M. Ikeda, F. Xhafa, and A. Duresi, “A testbed for manets: Implementation, experiences and learned lessons,” Systems Journal, IEEE, vol. 4, no. 2, pp. 243–252, June 2010.

F. Anjum and P. Mouchtaris, Security for wireless Ad hoc networks. Wiley, 2007.

T. Clausen and P. Jacquet, “Rfc 3626: Optimized link state routing protocol (olsr).” [Online]. Available:

Full Text: PDF

Journal of Networks (JNW, ISSN 1796-2056)

Copyright @ 2006-2014 by ACADEMY PUBLISHER – All rights reserved.