2015
DOI: 10.1007/s12083-015-0415-2
|View full text |Cite
|
Sign up to set email alerts
|

Darkcube: A k-Hypercube based P2P VoIP protocol

Abstract: We propose a new peer-to-peer voice-over-IP (VoIP) protocol, called Darkcube, which builds upon a k-hypercube topology presenting interesting properties regarding multi-party VoIP conferencing. This new topology is based on multiple hypercubes isolating the speaker nodes into a main high speed hypercube and efficiently retransmitting to the remaining listener nodes guaranteeing a good conversational voice communication quality among all users and achieving a great overall user experience. Standard hypercube to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…In this section, we describe a security model based on the algorithms studied earlier in Section 2 . This framework has been designed to add security to a decentralized or peer-to-peer network of low power autonomous computing nodes (such as smart phones) based on a hypercube topology with multiple applications in real-time streaming, like multi-party audio conferencing (see [ 7 ]), but it can also be adapted to other types of network topologies and node characteristics, since the security model described in the following is flexible enough to be suitable for a wide range of applications (see [ 20 , 21 ]).…”
Section: Security Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we describe a security model based on the algorithms studied earlier in Section 2 . This framework has been designed to add security to a decentralized or peer-to-peer network of low power autonomous computing nodes (such as smart phones) based on a hypercube topology with multiple applications in real-time streaming, like multi-party audio conferencing (see [ 7 ]), but it can also be adapted to other types of network topologies and node characteristics, since the security model described in the following is flexible enough to be suitable for a wide range of applications (see [ 20 , 21 ]).…”
Section: Security Frameworkmentioning
confidence: 99%
“…Once the new credentials are available to the network, then is accepted as a new member by the rest since they can check its signed public key against the repository. Propagation of the repository is performed via system messages within the underlying hypercube topology described in [ 7 ].…”
Section: Security Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…In the implementation described in [7], the type field allows for 2 4 = 16 different types, with 0 indicating a network message and 1 to 15 indicating a specific service, limiting the total number of simultaneous services to 15. This is adequate for most applications but can be adjusted if a different range is needed.…”
Section: Data Encryptionmentioning
confidence: 99%
“…The design of a security framework employing the analyzed primitives, with the aim of adding security to a previously published peer-to-peer audio conferencing protocol over a hypercube topology (see [7]). This framework employs an authentication system inspired by traditional Public Key Infrastructure systems since it is meant for tightly controlled sensor or node networks and is based primarily on the recent FourQ elliptic curve [8,9] and well-known AES cryptosystems due to performance reasons, but other authentication methods and cryptographic primitives are also discussed.…”
mentioning
confidence: 99%