2012 IEEE International Conference on Pervasive Computing and Communications Workshops 2012
DOI: 10.1109/percomw.2012.6197612
|View full text |Cite
|
Sign up to set email alerts
|

Malicious threats and novel security extensions in P2PSIP

Abstract: P2PSIP is a protocol for managing multimedia sessions in a distributed architecture, where all participating nodes share and manage network resources like bandwidth and disk space. This paper presents threats associated with P2PSIP protocol and proposes protocol enhancement to mitigate possible attacks. These extensions have been designed for the leading draft of P2PSIP overlay management protocol, RELOAD.. This paper proposes the use of Public key cryptography communication encryption, while symmetric cryptog… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0
1

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 12 publications
0
5
0
1
Order By: Relevance
“…The creation of Sybils is considered the most harmful behavior on a P2P system [ 54 ], as it offsets the network’s redundancy property [ 81 ]. Sybil attacks occur in a P2P network, when the reputation mechanisms are compromised [ 72 ], secure authentication mechanisms are not implemented (eg, no proof of identification is required for registration in the P2P session initiation protocol network [ 106 ]), or verification of a client’s IP address and its maximum number of connections per ID is not implemented (eg, Kad network [ 98 ]). Limiting the number of connections per IP address (eg, in eDonkey [ 84 ]) does not prevent Sybil attacks because attackers can bypass this by having many virtual IP addresses.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The creation of Sybils is considered the most harmful behavior on a P2P system [ 54 ], as it offsets the network’s redundancy property [ 81 ]. Sybil attacks occur in a P2P network, when the reputation mechanisms are compromised [ 72 ], secure authentication mechanisms are not implemented (eg, no proof of identification is required for registration in the P2P session initiation protocol network [ 106 ]), or verification of a client’s IP address and its maximum number of connections per ID is not implemented (eg, Kad network [ 98 ]). Limiting the number of connections per IP address (eg, in eDonkey [ 84 ]) does not prevent Sybil attacks because attackers can bypass this by having many virtual IP addresses.…”
Section: Resultsmentioning
confidence: 99%
“…An eclipse attack is a large-scale man-in-the-middle (MitM) attack that is commonly executed at the P2P network level [ 54 , 92 ]; routing, sniffing, and traffic analysis attacks are variants [ 56 , 79 , 81 , 93 , 105 , 106 , 115 , 116 ]. An eclipse attack aims to separate the entire network into 2 or more partitions ( Figure 7 ) by placing malicious nodes in a strategic routing path of the P2P network [ 105 , 106 , 108 ] to surround benign nodes with malicious neighbors [ 77 ]. In most cases, the routing mechanisms are attacked [ 47 ].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Its distributed nature originates on the fact that it is divided into several parts each located inside an overlay peer and stores the physical addresses of all participating nodes in order to use them for resource availability lookup. Each node that receives a query for the address of a certain node searches its DHT fraction and if it contains the requested info, it returns it to the node that posted the query, otherwise it forwards the request to its logical neighbors [10].…”
Section: Peer-to-peer Manetsmentioning
confidence: 99%
“…Το βασικό πρωτόκολλο (σε επίπεδο Εφαρμογής) για επικοινωνία φωνής μεταξύ ομότιμων κόμβων είναι το Peer-to-Peer Session Initiation Protocol (P2PSIP) [30] το οποίο αναπτύσσεται στα πλαίσια ειδικής ομάδας εργασίας από την IETF [31]. Παρόλο που ενσωματώνει ορισμένους βασικούς μηχανισμούς ασφάλειας, παρουσιάζει συγκεκριμένες αδυναμίες [32] [33]. Το πρωτόκολλο που περιγράφηκε στην προηγούμενη παράγραφο αποτέλεσε για εμάς αφετηρία για την ανάπτυξη δύο νέων πρωτοκόλλων, εναλλακτικών ή συμπληρωματικών ως προς το υπάρχον πρωτόκολλο που καθορίζεται από το P2PSIP Working Group.…”
Section: 16unclassified