Advertisement

Security Issues for P2P-Based Voice- and Video-Streaming Applications

  • Jan Seedorf
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 309)

Abstract

P2P computing offers a new interesting field for security researchers. Being highly distributed and lacking centralised, trusted entities for bootstrapping security mechanisms, these systems demand novel approaches for decentralised security solutions.

Recently, a new class of P2P-applications has arisen: P2P-based voice and video streaming systems. The properties of these novel applications impose new, interesting security challenges which have only been started to be addressed by researchers. This paper presents a summary of existing work in the area, derives and discusses open research problems, and finally outlines approaches towards potential solutions for securing P2P-based voice and video streaming applications.

Keywords

Session Initiation Protocol Video Streaming Open Research Problem Pollution Attack Live Video Streaming 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Abeni, L., Kiraly, C., Lo Cigno, R.: On the Optimal Scheduling of Streaming Applications in Unstructured Meshes, ifip Networking 2009 (May 2009)Google Scholar
  2. 2.
  3. 3.
    Balasubramaniyan, V.A., Ahamad, M., Park, H.: CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation. In: CEAS 2007 Fourth Conference on Email and AntiSpam (2007)Google Scholar
  4. 4.
    Baset, S.: P2PP prototype implementation,http://www1.cs.columbia.edu/~salman/peer/
  5. 5.
    Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The Secure Real-time Transport Protocol (SRTP), RFC 3711 (Draft Standard) (March 2004), http://www.ietf.org/rfc/rfc3711.txt
  6. 6.
    Baset, S., Schulzrinne, H.: An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. In: Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM 2006 (April 2006)Google Scholar
  7. 7.
    Baumgart, I.: P2PNS: A Secure Distributed Name Service for P2PSIP. In: Proceedings of the 5th IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P 2008) in conjunction with IEEE PerCom 2008, Hong Kong, China, March 2008, pp. 480–485 (2008)Google Scholar
  8. 8.
    Biondi, P., Desclaux, F.: Silver Needle in the Skype, BlackHat Europe 2006 (March 2006), http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/bh-eu-06-biondi-up_OnlinePDF.pdf
  9. 9.
    Bonald, T., Massoulie, L., Mathieu, F., Perino, D., Twigg, A.: Epidemic live streaming: optimal performance trade-offs. In: International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS (2008)Google Scholar
  10. 10.
    Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. In: Proceedings of SIGCOMM 2007 (2007)Google Scholar
  11. 11.
    Castro, M., Druschel, P., Kermarrec, A.-M., Rowstron, A.: Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE Journal on Selected Areas in Communications 20(8) (October 2002)Google Scholar
  12. 12.
    Chopra, D., Schulzrinne, H., Marocco, E., Ivov, E.: Peer-to-Peer Overlays for Real-Time Communication: Security Issues and Solutions. IEEE Communications Surveys & Tutorials 11(1) (January 2009)Google Scholar
  13. 13.
    Condie, T., Kacholia, V., Sankararaman, S., Maniatis, P., Hellerstein, J.M.: Maelstrom: Churn as Shelter, University of California at Berkeley Technical Report No. UCB/EECS-2005-11 (November 2005)Google Scholar
  14. 14.
    Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R.: Sybil resistant DHT routing. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 305–318. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  15. 15.
    Dhungel, P., Hei, X., Ross, K.W., Saxena, N.: The pollution attack in P2P live video streaming: measurement results and defenses. In: Proceedings of the 2007 Workshop on Peer-to-peer Streaming and IPTV 2007, pp. 323–328 (2007)Google Scholar
  16. 16.
    Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  17. 17.
    Hei, X., Liu, Y., Ross, K.: IPTV over P2P streaming networks: the mesh-pull approach. IEEE JCommunications Magazine 46(2), 86–92 (2008)CrossRefGoogle Scholar
  18. 18.
    Jennings, C., Lowekamp, B., Rescorla, E., Baset, S., Schulzrinne, H.: REsource LOcation And Discovery (RELOAD) Base Protocol, draft-ietf-p2psip-base-02, internet draft (work in progress), http://tools.ietf.org/html/draft-ietf-p2psip-base
  19. 19.
    Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A Survey and Comparison of Peer-to-Peer Overlay Network Schemes. IEEE Communications Surveys and Tutorials 7(2), 72–93 (2005)CrossRefGoogle Scholar
  20. 20.
    Marti, S., Ganesan, P., Garcia-Molina, H.: DHT Routing Using Social Links. In: 3rd International Workshop on Peer-to-Peer Systems, IPTPS (2004)Google Scholar
  21. 21.
    P2PSIP Status Pages: Peer-to-Peer Session Initiation Protocol (Active WG), http://tools.ietf.org/wg/p2psip/
  22. 22.
  23. 23.
    Quittek, J., Niccolini, S., Tartarelli, S., Schlegel, R.: On Spam over Internet Telephony (SPIT) Prevention. IEEE Communications Magazine 22(5) (2008)Google Scholar
  24. 24.
    Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (2002)Google Scholar
  25. 25.
    Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  26. 26.
    Seedorf, J.: Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP. In: 3rd Annual VoIP Security Wksp., Berlin, Germany (June 2006)Google Scholar
  27. 27.
    Seedorf, J.: Security Challenges for P2P-SIP. IEEE Network Special Issue on Securing Voice over IP 20(5), 38–45 (2006)Google Scholar
  28. 28.
    Seedorf, J.: Lawful Interception in P2P-Based VoIP Systems. In: Schulzrinne, H., State, R., Niccolini, S. (eds.) IPTComm 2008. LNCS, vol. 5310, pp. 217–235. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  29. 29.
    Seedorf, J., Ruwolt, F., Stiemerling, M., Niccolini, S.: Evaluating P2PSIP under Attack: An Emulative Study. In: IEEE Globecom 2008 (November 2008)Google Scholar
  30. 30.
    Singh, K., Schulzrinne, H.: Peer-to-Peer Internet Telephony using SIP. In: Int. Wksp. on Network and Operating Systems Support for Digital Audio and Video, pp. 63–68 (2005)Google Scholar
  31. 31.
  32. 32.
    Skype: Make the most of Skype - free internet calls and great value calls, http://www.skype.com
  33. 33.
    SopCast - Free P2P internet TV – live football, NBA, cricket, http://www.sopcast.com
  34. 34.
    Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Transactions on Networking 11(1) (Febuary 2003)Google Scholar
  35. 35.
  36. 36.
  37. 37.
    Zattoo: TV meets PC, http://www.zattoo.com
  38. 38.
    Zimmermann, P., Johnston, A., Callas, J.: ZRTP: Media Path Key Agreement for Secure RTP, Internet-Draft (work in progress) (February 2009)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2009

Authors and Affiliations

  • Jan Seedorf
    • 1
  1. 1.NEC Laboratories EuropeHeidelbergGermany

Personalised recommendations