Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Moderately hard, memory-bound functions
ACM Transactions on Internet Technology (TOIT)
Peer-to-peer internet telephony using SIP
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
Hi-index | 0.00 |
With the increasing popularity of Voice over IP (VoIP) the threat of "vamming" or VoIP spam calls is looming large over the telecom industry. This threat arises out of the "openness" of the IP-based network such as the Internet, which enables anyone to join the network without proving reasonable trustworthiness. Although this problem could be solved satisfactorily in managed networks, it proves to be a nightmare in distributed, unmanaged peer-to-peer (p2p) networks. A possible approach to solve this problem, at least to a certain extent, is to associate some level of trust with each p2p entity. In this paper, we propose a trust enforcement framework consisting of computation and memory bound functions that associate trust implicitly to the p2p VoIP entities. Based on this trust, one can judiciously decide whether a call from a p2p VoIP entity could be accepted or not, thus implementing a preliminary screening mechanism for malicious callers.