SIP: understanding the session initiation protocol
SIP: understanding the session initiation protocol
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
SIP Demystified
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
Security Considerations for Peer-to-Peer Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The impact of DHT routing geometry on resilience and proximity
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
The design and implementation of a next generation name service for the internet
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
OpenDHT: a public DHT service and its uses
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
AAA-IDEA '05 Proceedings of the First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications
Fireflies: scalable support for intrusion-tolerant network overlays
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
CoDNS: improving DNS performance and reliability via cooperative lookups
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Security challenges for peer-to-peer SIP
IEEE Network: The Magazine of Global Internetworking
Using game theory to configure P2P SIP
Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications
A virtual and distributed control layer with proximity awareness for group conferencing in P2PSIP
Principles, Systems and Applications of IP Telecommunications
Auto-scaling emergency call centres using cloud resources to handle disasters
Proceedings of the Nineteenth International Workshop on Quality of Service
Hi-index | 0.00 |
Voice over IP (VoIP) has been a promising technology for several years. Although it has become very popular, the vision to substitute the "good old" Public Switched Telephone Network (PSTN) is still far from being true. Several issues, such as security, reliability and emergency calls are slowing down the integration of VoIP. Currently, there is a mixture of technologies where VoIP is often used for reducing costs, while still keeping the PSTN if a reliable communication is needed. Peer-to-Peer (P2P) and overlay networks received a large attention in the research community in the last few years. P2P networks provide self-organization and scalability. Recent work involved P2P-based signaling for lookup services for Voice over IP (VoIP) communication based on the Session Initiation Protocol (SIP). The main motivation behind P2P-basd SIP is to support ad hoc communication, to simplify the configuration of SIP networks, to make SIP networks more scalable and to provide services independently of other network components such as DNS. However, pure P2P networks do not have only their advantages. They create also several security threats which are hard to solve. Some of them, for example, the Sybil attack, have been proven to be unsolvable without centralized authorities or an additional out-of-band mechanism. P2P-based SIP may also create a high potential for Spam over IP Telephony (SPIT). In this paper, we present a hybrid solution for telecommunication networks that fills the gap between centralized (and therefore vulnerable to Denial-of-Service (DoS) attacks) telecommunication infrastructures and pure P2P-based telecommunication networks (which are vulnerable to SPIT, Sybil attacks, eclipse attacks, partition attacks, etc.). Our approach works with a SIP server under normal operation, while SIP User Agents (UAs) organize themselves into a P2P network. In the normal case, SIP UAs can profit from the lookup performance provided by the SIP server, which is usually better than the performance provided by the P2P network. In case of a service interruption of the infrastructure, the SIP network will function further due to the interconnection in the P2P network. Since the server and the P2P network cooperate in order to improve reliability, survivability, performance and security, we call this approach Cooperative SIP (CoSIP). We present our prototype implementation of CoSIP and discuss the potential for improvements compared to server-based SIP and P2P-based SIP.