Abstract
This paper studies the security for Voice over IP in peer-to-peer (P2P) networks. Instead of taking a general approach to security in P2P, we focus on a specific use case, namely private (e.g. military) mobile ad hoc networks. This allows for security measures that are not necessarily applicable to general P2P networks, but elegantly solve the issues in the given context. We propose security measures for two different approaches to the P2P version of the Session Initiation Protocol in such networks, provide their implementations and present results from performing experimentations in a simulator.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
References
Cormier, A., Gagnon, F., Esfandiari, B., Kunz, T.: Toward testing security attacks and defense mechanisms for P2PSIP in MANETs with a simulator. In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 3: DCNET, (ICETE 2017), INSTICC, pp. 43–54. SciTePress (2017)
Varga, A., Hornig, R.: An overview of the OMNeT++ simulation environment. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), p. 60 (2008)
Baumgart, I., Heep, B., Krause, S.: OverSim: a flexible overlay network simulation framework. In: Proceedings of 10th IEEE Global Internet Symposium (GI 2007) in Conjunction with IEEE INFOCOM 2007, Anchorage, AK, USA, pp. 79–84 (2007)
Giordano, S., et al.: Mobile ad hoc networks. In: Handbook of Wireless Networks and Mobile Computing, pp. 325–346 (2002)
Rosenberg, J., et al.: SIP: Session Initiation Protocol. RFC 3261 (2002)
Jennings, C., Lowekamp, B., Rescorla, E., Baset, S., Schulzrinne, H.: REsource LOcation and Discovery (RELOAD) Base Protocol. RFC 6940 (2014)
Schollmeier, R.: A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: First International Conference on Peer-to-Peer Computing, Proceedings, pp. 101–102. IEEE (2001)
Li, L., Lamont, L.: Support real-time interactive session applications over a tactical mobile ad hoc network. In: Military Communications Conference, MILCOM 2005, pp. 2910–2916. IEEE (2005)
Banerjee, N., Acharya, A., Das, S.K.: Peer-to-peer SIP-based services over wireless ad hoc networks. In: BROADWIM: Broadband Wireless Multimedia Workshop (2004)
Yahiaoui, S., Belhoul, Y., Nouali-Taboudjemat, N., Kheddouci, H.: AdSIP: decentralized SIP for mobile ad hoc networks. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 490–495 (2012)
Banerjee, N., Acharya, A., Das, S.K.: Enabling SIP-based session setup in ad hoc networks. In: Proceedings of INFOCOM (2005)
Fudickar, S., Rebensburg, K., Schnor, B.: MANETSip - a dependable SIP overlay network for MANET including presentity service. In: Fifth International Conference on Networking and Services, ICNS 2009, pp. 314–319 (2009)
Aburumman, A., Seo, W.J., Esposito, C., Castiglione, A., Islam, R., et al.: A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy. In: Practice and Experience, Concurrency and Computation (2016)
Wongsaardsakul, T.: P2P SIP over mobile ad hoc networks. Ph.D. thesis, Evry, Institut national des télécommunications (2010)
O’Driscoll, A., Rea, S., Pesch, D.: Hierarchical clustering as an approach for supporting P2P SIP sessions in ubiquitous environments. In: 9th IFIP International Conference on Mobile Wireless Communications Networks, MWCN 2007, Cork, Ireland, 19–21 September 2007, pp. 76–80. IEEE (2007)
Baumgart, I.: P2PNS: a secure distributed name service for P2PSIP. In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008, pp. 480–485. IEEE (2008)
Bryan, D.A., Lowekamp, B.B., Zangrilli, M.: The design of a versatile, secure P2PSIP communications architecture for the public internet. In: IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, pp. 1–8. IEEE (2008)
Seedorf, J.: Using cryptographically generated SIP-URIs to protect the integrity of content in P2P-SIP. In: Third Annual VoIP Security Workshop (2006)
Davoust, A., Gagnon, F., Esfandiari, B., Kunz, T., Cormier, A.: Towards securing peer-to-peer sip in the manet context: existing work and perspectives. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 223–229. IEEE (2017)
Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, 18–22 November 2002, pp. 193–206 (2002)
Rennhard, M., Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection. In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, 21 November 2002, pp. 91–102 (2002)
Wang, Q., Borisov, N.: Octopus: a secure and anonymous DHT lookup. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), pp. 325–334. IEEE (2012)
Fonville, M.: Confidential peer-to-peer file-sharing using social-network sites. In: 13th Twente Student Conference on IT, June, vol. 21, p. 10 (2010)
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Comput. Commun. Rev. 31, 149–160 (2001)
Clausen, T., Jacquet, P.: Optimized Link State Routing Protocol (OLSR). RFC 3626 (2003)
Acknowledgment
The research was sponsored by the Army Research Laboratory/US Army RDECOM-Americas and was accomplished under Cooperative Agreement Number W911NF-16-1-0345. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory/US Army RDECOM-Americas or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Cormier, A., Gagnon, F., Esfandiari, B., Kunz, T. (2019). Approaches to Securing P2PSIP in MANETs. In: Obaidat, M., Cabello, E. (eds) E-Business and Telecommunications. ICETE 2017. Communications in Computer and Information Science, vol 990. Springer, Cham. https://doi.org/10.1007/978-3-030-11039-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-11039-0_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11038-3
Online ISBN: 978-3-030-11039-0
eBook Packages: Computer ScienceComputer Science (R0)