Skip to main content

Filtering SPAM in P2PSIP Communities with Web of Trust

  • Conference paper
Security and Privacy in Mobile Information and Communication Systems (MobiSec 2009)

Abstract

Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasingly popular, proliferation of spam calls is only a matter of time. As SIP identity scheme is practically similar to email, those share the same threats. We utilized Host Identity Protocol (HIP) to provide basic security, such as end-to-end encryption. To provide call filtering, however, other tools are needed. In this paper, we suggest applying trust paths familiar from the PGP web of trust to prevent unwanted communication in P2PSIP communities.

The goal is to provide trust visibility beyond the first hop without requiring people to openly share private data such as contact lists. Since our distributed environment limits global solutions, our proposal bases on scale-free distributed nodes which provide service to the social trust neighborhood. We have implemented the service as a freely deployable stand-alone HTTP server, which can be either independent or a part of the P2P overlay. We have evaluated the performance of the path finding algorithm using the social network data from the PGP web of trust.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Messaging Anti-Abuse Working Group: Email metrics program: the network operator’s perspective, report #7 (2008)

    Google Scholar 

  2. spamhaus.org: Effective spam filtering, http://www.spamhaus.org/effective_filtering.html (Referenced: 2008-08-06)

  3. spamunit.com: Spam Statistics, http://www.spamunit.com/spam-statistics/ (Referenced: 2008-08-06)

  4. Croft, N.J., Olivier, M.S.: A Model for Spam Prevention in IP Telephony Networks using Anonymous Verifying Authorities, University of Pretoria (2005)

    Google Scholar 

  5. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (Proposed Standard) (2002)

    Google Scholar 

  6. IETF P2PSIP WG, http://www.ietf.org/html.charters/p2psip-charter.html

  7. Koskela, J.: A HIP-based peer-to-peer communication system. In: Proceedings of the 15th International Conference on Telecommunications (2008)

    Google Scholar 

  8. Moskowitz, R., Nikander, P.: Host Identity Protocol (HIP) Architecture, RFC 4423, Informational (2006)

    Google Scholar 

  9. HIP for Linux, http://hipl.hiit.fi (Referenced: 2008-08-06)

  10. Altman, I.: The environment and social behaviour: Privacy, personal space, territory, crowding, Brooks/Cole Pub. Co. (1975)

    Google Scholar 

  11. Palen, L., Dourish, P.: Unpacking privacy for a networked world. CHI Letters 5(1) (2003)

    Google Scholar 

  12. Zimmermann, P.: PGP User’s Guide, Volume I: Essential topics (1994), http://www.pa.msu.edu/reference/pgpdoc1.html

  13. Penning, H.P., Feisthammel, P.: PGP pathfinder and statistics, http://pgp.cs.uu.nl/ (Referenced: 2008-08-25)

  14. Barabasi, A.-L.: Linked: How Everything Is Connected to Everything Else and What It Means for Business, Science, and Everyday Life, Plume Books (2003)

    Google Scholar 

  15. Yu, H., Kaminsky, P., Gibbons, P., Flaxman, A.: SybilGuard: Defending Against Sybil Attacks via Social Networks. In: Proceedings of the ACM SIGCOMM 2006 (2006)

    Google Scholar 

  16. http://www.python.org/

  17. Aura, T.: Fast access control decisions from delegation certificate databases. In: Boyd, C., Dawson, E. (eds.) ACISP 1998. LNCS, vol. 1438, p. 284. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  18. Wikipedia, Bloom filter, http://en.wikipedia.org/wiki/Bloom_filter (Referenced: 2008-08-14)

  19. Koskela, J., Heikkila, J., Gurtov, A.: A secure P2P SIP system with SPAM prevention. In: Poster in Mobicom 2008 (2008)

    Google Scholar 

  20. http://www.lysator.liu.se/~jc/wotsap/ (Referenced: 2008-08-14)

  21. http://www.facebook.com/

  22. http://www.linkedin.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Heikkilä, J., Gurtov, A. (2009). Filtering SPAM in P2PSIP Communities with Web of Trust. In: Schmidt, A.U., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04434-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04434-2_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04433-5

  • Online ISBN: 978-3-642-04434-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics