Abstract
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasingly popular, proliferation of spam calls is only a matter of time. As SIP identity scheme is practically similar to email, those share the same threats. We utilized Host Identity Protocol (HIP) to provide basic security, such as end-to-end encryption. To provide call filtering, however, other tools are needed. In this paper, we suggest applying trust paths familiar from the PGP web of trust to prevent unwanted communication in P2PSIP communities.
The goal is to provide trust visibility beyond the first hop without requiring people to openly share private data such as contact lists. Since our distributed environment limits global solutions, our proposal bases on scale-free distributed nodes which provide service to the social trust neighborhood. We have implemented the service as a freely deployable stand-alone HTTP server, which can be either independent or a part of the P2P overlay. We have evaluated the performance of the path finding algorithm using the social network data from the PGP web of trust.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Messaging Anti-Abuse Working Group: Email metrics program: the network operator’s perspective, report #7 (2008)
spamhaus.org: Effective spam filtering, http://www.spamhaus.org/effective_filtering.html (Referenced: 2008-08-06)
spamunit.com: Spam Statistics, http://www.spamunit.com/spam-statistics/ (Referenced: 2008-08-06)
Croft, N.J., Olivier, M.S.: A Model for Spam Prevention in IP Telephony Networks using Anonymous Verifying Authorities, University of Pretoria (2005)
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (Proposed Standard) (2002)
IETF P2PSIP WG, http://www.ietf.org/html.charters/p2psip-charter.html
Koskela, J.: A HIP-based peer-to-peer communication system. In: Proceedings of the 15th International Conference on Telecommunications (2008)
Moskowitz, R., Nikander, P.: Host Identity Protocol (HIP) Architecture, RFC 4423, Informational (2006)
HIP for Linux, http://hipl.hiit.fi (Referenced: 2008-08-06)
Altman, I.: The environment and social behaviour: Privacy, personal space, territory, crowding, Brooks/Cole Pub. Co. (1975)
Palen, L., Dourish, P.: Unpacking privacy for a networked world. CHI Letters 5(1) (2003)
Zimmermann, P.: PGP User’s Guide, Volume I: Essential topics (1994), http://www.pa.msu.edu/reference/pgpdoc1.html
Penning, H.P., Feisthammel, P.: PGP pathfinder and statistics, http://pgp.cs.uu.nl/ (Referenced: 2008-08-25)
Barabasi, A.-L.: Linked: How Everything Is Connected to Everything Else and What It Means for Business, Science, and Everyday Life, Plume Books (2003)
Yu, H., Kaminsky, P., Gibbons, P., Flaxman, A.: SybilGuard: Defending Against Sybil Attacks via Social Networks. In: Proceedings of the ACM SIGCOMM 2006 (2006)
Aura, T.: Fast access control decisions from delegation certificate databases. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, p. 284. Springer, Heidelberg (1998)
Wikipedia, Bloom filter, http://en.wikipedia.org/wiki/Bloom_filter (Referenced: 2008-08-14)
Koskela, J., Heikkila, J., Gurtov, A.: A secure P2P SIP system with SPAM prevention. In: Poster in Mobicom 2008 (2008)
http://www.lysator.liu.se/~jc/wotsap/ (Referenced: 2008-08-14)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Heikkilä, J., Gurtov, A. (2009). Filtering SPAM in P2PSIP Communities with Web of Trust. In: Schmidt, A.U., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04434-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-04434-2_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04433-5
Online ISBN: 978-3-642-04434-2
eBook Packages: Computer ScienceComputer Science (R0)