A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Peer-to-peer internet telephony using SIP
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
Trust network analysis with subjective logic
ACSC '06 Proceedings of the 29th Australasian Computer Science Conference - Volume 48
SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System
AAA-IDEA '05 Proceedings of the First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications
Trust-Aware Query Processing in Data Intensive Sensor Networks
SENSORCOMM '07 Proceedings of the 2007 International Conference on Sensor Technologies and Applications
A secure architecture for P2PSIP-based communication systems
Proceedings of the 2nd international conference on Security of information and networks
Improving Chord Lookup Protocol for P2PSIP-Based Communication Systems
NISS '09 Proceedings of the 2009 International Conference on New Trends in Information and Service Science
The design of secure and efficient P2PSIP communication systems
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Security challenges for peer-to-peer SIP
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Today, peer-to-peer (P2P) session initiation protocol (SIP)-based communication systems have attracted much attention from both academia and industry. The decentralised nature of P2P might provide the distributed P2P communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g., privacy leaks, unpredictable availability, etc. In this paper, we investigate P2PSIP security issues and propose a subjective logic-based trust model that offers trust-based security services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message routing, and NAT traversal. After that we implement a typical use scenario to show how our model is utilised to offer the trusted session initiation service and protection from malicious or faulty intermediate peers. In the example presented in the paper we use chord as the P2PSIP overlay. However, the system is independent of the chord overlay and is extendable to the other distributed hash table (DHT) technologies.