[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1626195.1626216acmconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A secure architecture for P2PSIP-based communication systems

Published: 06 October 2009 Publication History

Abstract

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Destination inter-working, etc. We also implement a prototype with 16 Chord Secure Proxys (CSPs) and 496 P2PSIP peers. After that we analyze this system architecture in several aspects: number of hops and delay, trust upgrading, and the protection of security breaches (e.g. malicious or compromised intermediate peer). We take Chord as the P2PSIP overlay as example. However, this system architecture is independent of Chord overlay and could be extended to the other DHT (Distributed Hash Table) technologies.

References

[1]
Kundan, S. and S. Henning, Peer-to-peer internet telephony using SIP, in Proceedings of the international workshop on Network and operating systems support for digital audio and video. 2005, ACM: Stevenson, Washington, USA.
[2]
David A. Bryan, Bruce B. Lowekamp, Cullen Jennings, SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA'05) 2005: p. pp. 42--49.
[3]
P2PSIP. p. http://www.p2psip.org.
[4]
C. Jennings, B. Lowekamp, E. Rescorla, S. Baset, H. Schulzrinne, REsource LOcation And Discovery (RELOAD). draft-bryan-p2psip-reload-04, June, 2008.
[5]
Frank Dabek, Jinyang. L, Emil Sit, James Robertson, M. Frans Kaashoek, Robert Morris, Designing a DHT for low latency and high throughput. NSDI 2004.
[6]
David A. Bryan, P. Matthews, E. Shim, D. Willis, S. Dawkins, Concepts and Terminology for Peer to Peer SIP. draft-ietf-p2psip-concepts-02, July, 2008.
[7]
G. Camarillo, P.Nikander, J. Hautakorpi, HIP BONE: Host Identity Protocol (HIP) Based Overlay Networking Environment. draft-camarillo-hip-bone-01, Feb, 2008.
[8]
David A. Bryan, Bruce B. Lowekamp, Marcia Zangrilli, The Design of a Versatile, Secure P2PSIP Communications Architecture for the Public Internet, in IEEE International Symposium on Parallel and Distributed Processing, IPDPS. April, 2008.
[9]
Marcin Matuszewski, E. Kokkonen, Mobile P2PSIP--Peer-to-Peer SIP Communication in Mobile Communities, in 5th IEEE Consumer Communications and Networking Conference. Jan. 2008.
[10]
David, Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, D. Lewin, Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web, in Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. 1997, ACM: El Paso, Texas, United States.
[11]
Jani, H. and C. Gonzalo, Evaluation of DHTs from the viewpoint of interpersonal communications, in Proceedings of the 6th international conference on Mobile and ubiquitous multimedia. 2007, ACM: Oulu, Finland.
[12]
XingFeng Jiang, H. Zheng, C. Macian, V. Pascual, Service Extensible P2P Peer Protocol. draft-jiang-p2psip-sep-01, Feb, 2008.
[13]
Apache Derby. p. http://db.apache.org/derby/.
[14]
Wireshark: Go deep.: p. http://www.wireshark.org/.
[15]
Audun, J., et al., Trust network analysis with subjective logic, in Proceedings of the 29th Australasian Computer Science Conference--Volume 48. 2006, Australian Computer Society, Inc.: Hobart, Australia.
[16]
Vladimir Oleshchuk, Trust-based Framework for Security Enhancement of Wireless Sensor Networks, in 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS 2007) Sep, 2007.
[17]
Xianghan Zheng, Vladimir Oleshchuk, Trust-based Framework for Security Enhancement of P2PSIP Communications Systems, 4th International Conference for Internet Technology and Secured Transaction (ICITST-2009) Nov, 2009.
[18]
Xianghan Zheng, Vladimir Oleshchuk, Improving Chord lookup protocol for P2PSIP-based Communication Systems, in 2009 International Conference on New Trends in Information and Service Science (3rd NISS). June, 2009: Beijing, P.R China.
[19]
Xianghan Zheng, Vladimir Oleshchuk, Hongzhi Jiao, A System Architecture for SIP/IMS-based Multimedia Services in International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE). Dec, 2007.

Cited By

View all
  • (2013)Digital Identity based VoIP Authentication MechanismProceedings of International Conference on Advances in Mobile Computing & Multimedia10.1145/2536853.2536928(239-243)Online publication date: 2-Dec-2013
  • (2011)Trust enhancement of P2PSIP communication systemsInternational Journal of Internet Technology and Secured Transactions10.1504/IJITST.2011.0397733:2(121-133)Online publication date: 1-Apr-2011
  • (2010)A survey on peer-to-peer SIP based communication systemsPeer-to-Peer Networking and Applications10.1007/s12083-009-0064-43:4(257-264)Online publication date: 23-Jan-2010
  • Show More Cited By

Index Terms

  1. A secure architecture for P2PSIP-based communication systems

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIN '09: Proceedings of the 2nd international conference on Security of information and networks
    October 2009
    322 pages
    ISBN:9781605584126
    DOI:10.1145/1626195
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 October 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. DHT (distributed hash table)
    2. P2PSIP
    3. chord
    4. chord secure proxy
    5. peer-to-peer (P2P)
    6. session initiation protocol (SIP)

    Qualifiers

    • Research-article

    Conference

    SIN '09
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2013)Digital Identity based VoIP Authentication MechanismProceedings of International Conference on Advances in Mobile Computing & Multimedia10.1145/2536853.2536928(239-243)Online publication date: 2-Dec-2013
    • (2011)Trust enhancement of P2PSIP communication systemsInternational Journal of Internet Technology and Secured Transactions10.1504/IJITST.2011.0397733:2(121-133)Online publication date: 1-Apr-2011
    • (2010)A survey on peer-to-peer SIP based communication systemsPeer-to-Peer Networking and Applications10.1007/s12083-009-0064-43:4(257-264)Online publication date: 23-Jan-2010
    • (2010)The design of secure and efficient P2PSIP communication systemsProceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices10.1007/978-3-642-12368-9_20(253-260)Online publication date: 12-Apr-2010

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media