Abstract
P2P computing offers a new interesting field for security researchers. Being highly distributed and lacking centralised, trusted entities for bootstrapping security mechanisms, these systems demand novel approaches for decentralised security solutions.
Recently, a new class of P2P-applications has arisen: P2P-based voice and video streaming systems. The properties of these novel applications impose new, interesting security challenges which have only been started to be addressed by researchers. This paper presents a summary of existing work in the area, derives and discusses open research problems, and finally outlines approaches towards potential solutions for securing P2P-based voice and video streaming applications.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Abeni, L., Kiraly, C., Lo Cigno, R.: On the Optimal Scheduling of Streaming Applications in Unstructured Meshes, ifip Networking 2009 (May 2009)
Babelgum, http://www.babelgum.com
Balasubramaniyan, V.A., Ahamad, M., Park, H.: CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation. In: CEAS 2007 Fourth Conference on Email and AntiSpam (2007)
Baset, S.: P2PP prototype implementation, http://www1.cs.columbia.edu/~salman/peer/
Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The Secure Real-time Transport Protocol (SRTP), RFC 3711 (Draft Standard) (March 2004), http://www.ietf.org/rfc/rfc3711.txt
Baset, S., Schulzrinne, H.: An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. In: Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM 2006 (April 2006)
Baumgart, I.: P2PNS: A Secure Distributed Name Service for P2PSIP. In: Proceedings of the 5th IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P 2008) in conjunction with IEEE PerCom 2008, Hong Kong, China, March 2008, pp. 480–485 (2008)
Biondi, P., Desclaux, F.: Silver Needle in the Skype, BlackHat Europe 2006 (March 2006), http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/bh-eu-06-biondi-up_OnlinePDF.pdf
Bonald, T., Massoulie, L., Mathieu, F., Perino, D., Twigg, A.: Epidemic live streaming: optimal performance trade-offs. In: International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS (2008)
Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. In: Proceedings of SIGCOMM 2007 (2007)
Castro, M., Druschel, P., Kermarrec, A.-M., Rowstron, A.: Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE Journal on Selected Areas in Communications 20(8) (October 2002)
Chopra, D., Schulzrinne, H., Marocco, E., Ivov, E.: Peer-to-Peer Overlays for Real-Time Communication: Security Issues and Solutions. IEEE Communications Surveys & Tutorials 11(1) (January 2009)
Condie, T., Kacholia, V., Sankararaman, S., Maniatis, P., Hellerstein, J.M.: Maelstrom: Churn as Shelter, University of California at Berkeley Technical Report No. UCB/EECS-2005-11 (November 2005)
Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R.: Sybil resistant DHT routing. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 305–318. Springer, Heidelberg (2005)
Dhungel, P., Hei, X., Ross, K.W., Saxena, N.: The pollution attack in P2P live video streaming: measurement results and defenses. In: Proceedings of the 2007 Workshop on Peer-to-peer Streaming and IPTV 2007, pp. 323–328 (2007)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Hei, X., Liu, Y., Ross, K.: IPTV over P2P streaming networks: the mesh-pull approach. IEEE JCommunications Magazine 46(2), 86–92 (2008)
Jennings, C., Lowekamp, B., Rescorla, E., Baset, S., Schulzrinne, H.: REsource LOcation And Discovery (RELOAD) Base Protocol, draft-ietf-p2psip-base-02, internet draft (work in progress), http://tools.ietf.org/html/draft-ietf-p2psip-base
Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A Survey and Comparison of Peer-to-Peer Overlay Network Schemes. IEEE Communications Surveys and Tutorials 7(2), 72–93 (2005)
Marti, S., Ganesan, P., Garcia-Molina, H.: DHT Routing Using Social Links. In: 3rd International Workshop on Peer-to-Peer Systems, IPTPS (2004)
P2PSIP Status Pages: Peer-to-Peer Session Initiation Protocol (Active WG), http://tools.ietf.org/wg/p2psip/
PPLive, http://www.pplive.com
Quittek, J., Niccolini, S., Tartarelli, S., Schlegel, R.: On Spam over Internet Telephony (SPIT) Prevention. IEEE Communications Magazine 22(5) (2008)
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (2002)
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)
Seedorf, J.: Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP. In: 3rd Annual VoIP Security Wksp., Berlin, Germany (June 2006)
Seedorf, J.: Security Challenges for P2P-SIP. IEEE Network Special Issue on Securing Voice over IP 20(5), 38–45 (2006)
Seedorf, J.: Lawful Interception in P2P-Based VoIP Systems. In: Schulzrinne, H., State, R., Niccolini, S. (eds.) IPTComm 2008. LNCS, vol. 5310, pp. 217–235. Springer, Heidelberg (2008)
Seedorf, J., Ruwolt, F., Stiemerling, M., Niccolini, S.: Evaluating P2PSIP under Attack: An Emulative Study. In: IEEE Globecom 2008 (November 2008)
Singh, K., Schulzrinne, H.: Peer-to-Peer Internet Telephony using SIP. In: Int. Wksp. on Network and Operating Systems Support for Digital Audio and Video, pp. 63–68 (2005)
SIPDHT: http://sipdht.sourceforge.net
Skype: Make the most of Skype - free internet calls and great value calls, http://www.skype.com
SopCast - Free P2P internet TV – live football, NBA, cricket, http://www.sopcast.com
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Transactions on Networking 11(1) (Febuary 2003)
TVANTS p2p, http://www.tvants.com
TVU Networks, http://www.tvunetworks.com
Zattoo: TV meets PC, http://www.zattoo.com
Zimmermann, P., Johnston, A., Callas, J.: ZRTP: Media Path Key Agreement for Secure RTP, Internet-Draft (work in progress) (February 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Seedorf, J. (2009). Security Issues for P2P-Based Voice- and Video-Streaming Applications. In: Camenisch, J., Kesdogan, D. (eds) iNetSec 2009 – Open Research Problems in Network Security. 2009. IFIP Advances in Information and Communication Technology, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05437-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-05437-2_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05436-5
Online ISBN: 978-3-642-05437-2
eBook Packages: Computer ScienceComputer Science (R0)