STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Peer-to-peer internet telephony using SIP
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
Trust network analysis with subjective logic
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
AAA-IDEA '05 Proceedings of the First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications
Designing a DHT for low latency and high throughput
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Evaluation of DHTs from the viewpoint of interpersonal communications
Proceedings of the 6th international conference on Mobile and ubiquitous multimedia
Improving Chord Lookup Protocol for P2PSIP-Based Communication Systems
NISS '09 Proceedings of the 2009 International Conference on New Trends in Information and Service Science
Trust enhancement of P2PSIP communication systems
International Journal of Internet Technology and Secured Transactions
The design of secure and efficient P2PSIP communication systems
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Digital Identity based VoIP Authentication Mechanism
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 0.00 |
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Destination inter-working, etc. We also implement a prototype with 16 Chord Secure Proxys (CSPs) and 496 P2PSIP peers. After that we analyze this system architecture in several aspects: number of hops and delay, trust upgrading, and the protection of security breaches (e.g. malicious or compromised intermediate peer). We take Chord as the P2PSIP overlay as example. However, this system architecture is independent of Chord overlay and could be extended to the other DHT (Distributed Hash Table) technologies.