(e.g., DHT poisoning and replay attacks). Further-
more, we will include node mobility in the experiment
to provide a simulation more representative of the ac-
tual context. Finally, performing experimental com-
parison between our solution and existing ones would
provide a clearer picture regarding the differences and
their impacts.
ACKNOWLEDGEMENT
Research was sponsored by the Army Research Lab-
oratory/US Army RDECOM-Americas and was ac-
complished under Cooperative Agreement Number
W911NF-16-1-0345. The views and conclusions con-
tained in this document are those of the authors and
should not be interpreted as representing the official
policies, either expressed or implied, of the Army Re-
search Laboratory/US Army RDECOM-Americas or
the U.S. Government. The U.S. Government is au-
thorized to reproduce and distribute reprints for Gov-
ernment purposes notwithstanding any copyright no-
tation herein.
REFERENCES
Androutsellis-Theotokis, S. (2002). A survey of peer-to-
peer file sharing technologies. White paper - athens
university of economics and business.
Banerjee, N., Acharya, A., and Das, S. K. (2004). Peer-
to-peer SIP-based services over wireless ad hoc net-
works. In BROADWIM: Broadband Wireless Multi-
media Workshop.
Banerjee, N., Acharya, A., and Das, S. K. (2005). Enabling
SIP-based session setup in ad hoc networks. In Pro-
ceedings of INFOCOM.
Baumgart, I. (2008). P2pns: A secure distributed name ser-
vice for p2psip. In Pervasive Computing and Com-
munications, 2008. PerCom 2008. Sixth Annual IEEE
International Conference on, pages 480–485. IEEE.
Baumgart, I., Heep, B., and Krause, S. (2007). OverSim:
A flexible overlay network simulation framework. In
Proceedings of 10th IEEE Global Internet Symposium
(GI ’07) in conjunction with IEEE INFOCOM 2007,
Anchorage, AK, USA, pages 79–84.
Bryan, D. A., Lowekamp, B. B., and Zangrilli, M. (2008).
The design of a versatile, secure p2psip communica-
tions architecture for the public internet. In Parallel
and Distributed Processing, 2008. IPDPS 2008. IEEE
International Symposium on, pages 1–8. IEEE.
Clausen, T. and Jacquet, P. (2003). Optimized link state
routing protocol (olsr). RFC 3626.
Douceur, J. R. (2002). The sybil attack. In Peer-to-Peer
Systems, First International Workshop, IPTPS 2002,
Cambridge, MA, USA, March 7-8, 2002, Revised Pa-
pers, pages 251–260.
Fonville, M. (2010). Confidential peer-to-peer file-sharing
using social-network sites. In 13th Twente Student
Conference on IT, Jun, volume 21, page 10.
Freedman, M. J. and Morris, R. (2002). Tarzan: a peer-to-
peer anonymizing network layer. In Proceedings of
the 9th ACM Conference on Computer and Commu-
nications Security, CCS 2002, Washington, DC, USA,
November 18-22, 2002, pages 193–206.
Fudickar, S., Rebensburg, K., and Schnor, B. (2009).
MANETSip - a dependable SIP overlay network for
MANET including presentity service. In Network-
ing and Services, 2009. ICNS ’09. Fifth International
Conference on, pages 314–319.
Giordano, S. et al. (2002). Mobile ad hoc networks.
Handbook of wireless networks and mobile comput-
ing, pages 325–346.
Ismail, H., Germanus, D., and Suri, N. (2015). Detecting
and mitigating P2P eclipse attacks. In 21st IEEE Inter-
national Conference on Parallel and Distributed Sys-
tems, ICPADS 2015, Melbourne, Australia, December
14-17, 2015, pages 224–231.
Jennings, C., Lowekamp, B., Rescorla, E., S.Baset, and
Schulzrinne, H. (2014). REsource LOcation And Dis-
covery (RELOAD) Base Protocol. RFC 6940.
Levine, B. N., Shields, C., and Margolin, N. B. (2006). A
survey of solutions to the sybil attack. Technical Re-
port - University of Massachusetts Amherst.
Li, L. and Lamont, L. (2005). Support real-time interactive
session applications over a tactical mobile ad hoc net-
work. In Military Communications Conference, 2005.
MILCOM 2005. IEEE, pages 2910–2916. IEEE.
O’Driscoll, A., Rea, S., and Pesch, D. (2007). Hierarchi-
cal clustering as an approach for supporting P2P SIP
sessions in ubiquitous environments. In 9th IFIP In-
ternational Conference on Mobile Wireless Communi-
cations Networks, MWCN 2007, Cork, Ireland, 19-21
September, 2007, pages 76–80. IEEE.
Rennhard, M. and Plattner, B. (2002). Introducing mor-
phmix: peer-to-peer based anonymous internet usage
with collusion detection. In Proceedings of the 2002
ACM Workshop on Privacy in the Electronic Society,
WPES 2002, Washington, DC, USA, November 21,
2002, pages 91–102.
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
Peterson, J., Sparks, R., Handley, M., and Schooler, E.
(2002). Sip: session initiation protocol. RFC 3261.
Schollmeier, R. (2001). A definition of peer-to-peer net-
working for the classification of peer-to-peer architec-
tures and applications. In Peer-to-Peer Computing,
2001. Proceedings. First International Conference on,
pages 101–102. IEEE.
Seedorf, J. (2006). Using cryptographically generated sip-
uris to protect the integrity of content in p2p-sip. In
Third Annual VoIP Security Workshop.
Stoica, I., Morris, R., Karger, D., Kaashoek, M. F.,
and Balakrishnan, H. (2001). Chord: A scalable
peer-to-peer lookup service for internet applications.
ACM SIGCOMM Computer Communication Review,
31(4):149–160.
Stuedi, P., Bihr, M., Remund, A., and Alonso, G. (2007).
SIPHoc: Efficient SIP middleware for ad hoc net-
Toward Testing Security Attacks and Defense Mechanisms for P2PSIP in MANETs with a Simulator
53