2009
DOI: 10.1109/surv.2009.090102
|View full text |Cite
|
Sign up to set email alerts
|

Peer-to-peer overlays for real-time communication: security issues and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
2

Year Published

2009
2009
2016
2016

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 19 publications
0
13
0
2
Order By: Relevance
“…These SIP ordinary peers can typically send malicious registration messages to SIP super peers in order to pollute the DHT. As highlighted in [5] major risks in a P2PSIP network are denial of service (DoS) and call hijacking. In the context of our work, we will focus on two attack scenarios corresponding to the first category.…”
Section: A Attack Sources and Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…These SIP ordinary peers can typically send malicious registration messages to SIP super peers in order to pollute the DHT. As highlighted in [5] major risks in a P2PSIP network are denial of service (DoS) and call hijacking. In the context of our work, we will focus on two attack scenarios corresponding to the first category.…”
Section: A Attack Sources and Scenariosmentioning
confidence: 99%
“…We can typically consider (1) attacks targeting the P2P overlay network, such as sybil attacks, routing attacks and eclipse attacks, (2) attacks related to the signaling protocol, such as caller ID spoofing, call hijacking, and SPIT attacks, and (3) attacks targeting the media transport protocols, such as eavesdropping attacks. A large variety of techniques has already been proposed for dealing with them [5]. In the area of P2P overlay networks, several work target identity assignment attacks in DHTs.…”
Section: A Attack Sources and Scenariosmentioning
confidence: 99%
“…Thus, P2P-based voice and video streaming applications impose some novel security research challenges. While there exist quite a few works on securing P2P-networks in general, only very few papers consider the unique security challenges for running real-time communication applications over a P2P-substrate [12] [27].…”
Section: Motivationmentioning
confidence: 99%
“…Furthermore, a (MIX-like) pseudonimity service is envisioned to protect the privacy of callers. Similarly, Chopra et al provide a survey on security aspects for P2P-based VoIP applications and briefly discuss potential solutions on a general level [12]. Besides the approaches already mentioned in [27], they regard a PGP-like web-of-trust among users and SIP end-to-end encryption as promising approaches but do not present detailed algorithms.…”
Section: Existing Security Approachesmentioning
confidence: 99%
“…Peer-to-Peer (P2P) networks, grid networks, and cloud computing using overlay technology are particularly essential today. Internet telephony, file sharing, and IPTV services have been deployed based on the P2P technologies [2], [3] while large-scale computing relies on the grid computing and cloud computing technologies [4], [5].…”
Section: Introductionmentioning
confidence: 99%