A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Chord: a scalable peer-to-peer lookup protocol for internet applications
IEEE/ACM Transactions on Networking (TON)
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Peer-to-peer internet telephony using SIP
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
Defending against eclipse attacks on overlay networks
Proceedings of the 11th workshop on ACM SIGOPS European workshop
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
AAA-IDEA '05 Proceedings of the First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications
P2PNS: A Secure Distributed Name Service for P2PSIP
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Availability for DHT-based overlay networks with unidirectional routing
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Tapestry: a resilient global-scale overlay for service deployment
IEEE Journal on Selected Areas in Communications
Security challenges for peer-to-peer SIP
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Lawful Interception of Voice-over-IP communications is technically more challenging than Lawful Interception in the PSTN. Currently, Lawful Interception for Voice-over-IP traffic is being standardised with respect to VoIP service architectures where central entities are on the signalling path, as this is the way VoIP is being deployed today. However, future types of VoIP service architectures may be characterised by a higher degree of decentralisation. In the extreme case, there is no central entity in the network through which signalling will pass. As an example for such a highly decentralised VoIP system, several proposals have suggested to use a P2P-network for VoIP signalling in conjunction with the Session Initiation Protocol (SIP), commonly referred to as P2PSIP. This paradigm change to P2P-based signalling has significant implications for authorised interception of communications. In this paper, we analyse the problem of applying Lawful Interception to P2P-based Voice-over-IP systems technically, highlighting the characteristic properties of such an approach and the corresponding implications that complicate Lawful Interception. Further, we inspect potential solutions for implementing Lawful Interception in a P2PSIP system in general and discuss advantages and drawbacks of such solutions.