Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the other 'side' properties that transform an experimental application into a service. Research on security for P2P streaming started to flourish, but no comprehensive security analysis over the current P2P solutions has yet been attempted. There are no best practices in system design, no (widely) accepted attack models, no measurementbased studies on security threats to P2P streaming, nor even general surveys investigating specific security aspects for these systems. This paper addresses this last aspect. Starting from existing analyses and security models in the related literature, we give an overview on security and privacy considerations for P2P streaming systems. Our analysis emphasizes two major facts: (i) the Byzantine-Altruistic-Rational (BAR) model offers stronger security guarantees compared to other approaches, at the cost of higher complexity and overhead; and (ii) the general perception (not necessarily the truth, but a commonplace belief) that it is necessary to sacrifice accuracy or performance in order to tolerate faults or misbehaviors, is not always true.
OverviewPeer-to-peer systems have gained more and more momentum over the last years as a means to access multimedia contents, albeit initially in form of file downloads. The evolution to streaming and multicast (e.g., TV) was just a consequence. Their power to accommodate large amounts of users, together with their resilience to churn, reliability, and low cost are some of the reasons why they are preferred over dedicated servers or content distribution networks solutions. In spite of these advantages, or maybe because of them, some P2P features make these systems more difficult to defend against some classes of attacks.Security-wise, P2P streaming systems are more challenging than other P2P applications because they are more vulnerable to QoS fluctuations. Live streaming protocols, and TV in particular, are most sensitive to delay and delay jitter: it is enough for a host to be prevented from receiving some packets in time, and the user may grow dissatisfied with the quality of the delivery and leave the system altogether. If some other peers are connected to that machine, they will be damaged as well. From the watcher's viewpoint, even slight quality fluctuations, or choppiness, cause the viewing experience to loose appeal and the user to drop the service (or switch channels if others offer better quality). Worse, the quality of the user experience is unrecoverable: if some packets are lost during live broadcast, they are lost for good because recovering them afterwards brings no utility to the user.
Peer-to-Peer Netw ApplApart from their time-sensitive nature and bandwidth dependency, P2P streaming are susceptible to manipulation and threats at the transport and network layers. Clever attacks can compromise selectively the guarantees that a streaming sessio...