Trust-based framework for security enhancement of P2PSIP communication systems

Xianghan Zheng, V. Oleshchuk
{"title":"Trust-based framework for security enhancement of P2PSIP communication systems","authors":"Xianghan Zheng, V. Oleshchuk","doi":"10.1109/ICITST.2009.5402533","DOIUrl":null,"url":null,"abstract":"Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a subjective based trust model that offers trust services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message routing, and NAT traversal. After that we implement a typical use scenario to show how our model is exploited to offer the trusted session initiation service and protects the security breaches through the malicious or faulty intermediate peers. We take Chord as the P2PSIP overlay for example in this paper. However, the system is independent of the Chord overlay and is extendable to the other DHT (Distributed Hash Table) technologies.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2009.5402533","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a subjective based trust model that offers trust services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, data confidentiality and integrity, message routing, and NAT traversal. After that we implement a typical use scenario to show how our model is exploited to offer the trusted session initiation service and protects the security breaches through the malicious or faulty intermediate peers. We take Chord as the P2PSIP overlay for example in this paper. However, the system is independent of the Chord overlay and is extendable to the other DHT (Distributed Hash Table) technologies.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于信任的P2PSIP通信系统安全增强框架
目前,基于点对点SIP的通信系统已经引起了学术界和工业界的广泛关注。P2P的分散性可以在没有传统SIP服务器帮助的情况下提供分布式点对点通信系统。然而,它的代价是可信度降低,并可能导致安全问题,例如隐私泄露、不可预测的可用性等。本文研究了P2PSIP的安全问题,提出了一种基于主观的信任模型,在P2PSIP会话建立过程中提供信任服务。该模型考虑的主要问题包括意见计算、意见维护、数据机密性和完整性、消息路由和NAT遍历。之后,我们将实现一个典型的使用场景,以展示如何利用我们的模型提供可信会话发起服务,并通过恶意或错误的中间对等点保护安全漏洞。本文以Chord作为P2PSIP叠加为例。然而,该系统是独立于Chord覆盖的,并且可以扩展到其他DHT(分布式哈希表)技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Usability driven website design — An equine sports case study Grasping contextual awareness inside aworkspace at the entrance to support group interaction Towards security goals in summative e-assessment security Cloud Computing: The impact on digital forensic investigations Evaluation of question classification systems using differing features
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1