Security Enhancement of Peer-to-Peer Session Initiation

Security Enhancement of Peer-to-Peer Session Initiation

Author: 
Oleshchuk, Vladimir
Place: 
Hershey, PA
Publisher: 
IGI Global
Date published: 
2012
Responsibility: 
Zheng, Xianghan, jt. author
Editor: 
Gupta, Manish
Source: 
Threats, Countermeasures, and Advances in Applied Information Security
Abstract: 

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advantages and disadvantages. After that, we study appropriate combination of these two approaches to get optimized protection. Our design is independent of the DHT (Distributed Hash Table) overlay technology. We take the Chord overlay as the example, and then, analyze the system in several aspects: security & privacy, number-of the hops, message flows, etc.

Series: 
Advances in Information Security, Privacy, and Ethics

CITATION: Oleshchuk, Vladimir. Security Enhancement of Peer-to-Peer Session Initiation edited by Gupta, Manish . Hershey, PA : IGI Global , 2012. Threats, Countermeasures, and Advances in Applied Information Security - Available at: https://library.au.int/security-enhancement-peer-peer-session-initiation