A cooperative SIP infrastructure for highly reliable telecommunication services
Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications
Lawful Interception in P2P-Based VoIP Systems
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Using game theory to configure P2P SIP
Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications
A Survey of Voice over IP Security Research
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Extending P2PSIP VoIP communication for ad hoc networks
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM
Principles, Systems and Applications of IP Telecommunications
Trust enhancement of P2PSIP communication systems
International Journal of Internet Technology and Secured Transactions
Detection and classification of peer-to-peer traffic: A survey
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Recent research activities have proposed using a peer-to-peer network for user registration and user location in session initiation protocol (SIP)-based voice-over-IP (VoIP) networks. The main motivation for peer-to-peer (P2P) SIP is higher robustness as well as easy configuration and maintenance (compared to client-server SIP). However, these advantages come at the price of security. In this article the security challenges of using a P2P network as a substrate for SIP communication are explored. After a short introduction to SIP and structured P2P networks, the different approaches that have been proposed for using P2P technology in conjunction with SIP are compared. We focus on design issues that affect security in order to identify the security implications of using a structured overlay network for SIP registration and location lookup. Finally, possible solutions for securing P2P SIP are examined and explicit suggestions on how to improve the security of P2P SIP are given