Abstract
P2P computing offers a new interesting field for security researchers. Being highly distributed and lacking centralised, trusted entities for bootstrapping security mechanisms, these systems demand novel approaches for decentralised security solutions.
Recently, a new class of P2P-applications has arisen: P2P-based voice and video streaming systems. The properties of these novel applications impose new, interesting security challenges which have only been started to be addressed by researchers. This paper presents a summary of existing work in the area, derives and discusses open research problems, and finally outlines approaches towards potential solutions for securing P2P-based voice and video streaming applications.
Chapter PDF
References
Abeni, L., Kiraly, C., Lo Cigno, R.: On the Optimal Scheduling of Streaming Applications in Unstructured Meshes, ifip Networking 2009 (May 2009)
Babelgum, http://www.babelgum.com
Balasubramaniyan, V.A., Ahamad, M., Park, H.: CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation. In: CEAS 2007 Fourth Conference on Email and AntiSpam (2007)
Baset, S.: P2PP prototype implementation, http://www1.cs.columbia.edu/~salman/peer/
Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The Secure Real-time Transport Protocol (SRTP), RFC 3711 (Draft Standard) (March 2004), http://www.ietf.org/rfc/rfc3711.txt
Baset, S., Schulzrinne, H.: An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol. In: Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM 2006 (April 2006)
Baumgart, I.: P2PNS: A Secure Distributed Name Service for P2PSIP. In: Proceedings of the 5th IEEE International Workshop on Mobile Peer-to-Peer Computing (MP2P 2008) in conjunction with IEEE PerCom 2008, Hong Kong, China, March 2008, pp. 480–485 (2008)
Biondi, P., Desclaux, F.: Silver Needle in the Skype, BlackHat Europe 2006 (March 2006), http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/bh-eu-06-biondi-up_OnlinePDF.pdf
Bonald, T., Massoulie, L., Mathieu, F., Perino, D., Twigg, A.: Epidemic live streaming: optimal performance trade-offs. In: International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS (2008)
Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. In: Proceedings of SIGCOMM 2007 (2007)
Castro, M., Druschel, P., Kermarrec, A.-M., Rowstron, A.: Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE Journal on Selected Areas in Communications 20(8) (October 2002)
Chopra, D., Schulzrinne, H., Marocco, E., Ivov, E.: Peer-to-Peer Overlays for Real-Time Communication: Security Issues and Solutions. IEEE Communications Surveys & Tutorials 11(1) (January 2009)
Condie, T., Kacholia, V., Sankararaman, S., Maniatis, P., Hellerstein, J.M.: Maelstrom: Churn as Shelter, University of California at Berkeley Technical Report No. UCB/EECS-2005-11 (November 2005)
Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R.: Sybil resistant DHT routing. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 305–318. Springer, Heidelberg (2005)
Dhungel, P., Hei, X., Ross, K.W., Saxena, N.: The pollution attack in P2P live video streaming: measurement results and defenses. In: Proceedings of the 2007 Workshop on Peer-to-peer Streaming and IPTV 2007, pp. 323–328 (2007)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Hei, X., Liu, Y., Ross, K.: IPTV over P2P streaming networks: the mesh-pull approach. IEEE JCommunications Magazine 46(2), 86–92 (2008)
Jennings, C., Lowekamp, B., Rescorla, E., Baset, S., Schulzrinne, H.: REsource LOcation And Discovery (RELOAD) Base Protocol, draft-ietf-p2psip-base-02, internet draft (work in progress), http://tools.ietf.org/html/draft-ietf-p2psip-base
Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A Survey and Comparison of Peer-to-Peer Overlay Network Schemes. IEEE Communications Surveys and Tutorials 7(2), 72–93 (2005)
Marti, S., Ganesan, P., Garcia-Molina, H.: DHT Routing Using Social Links. In: 3rd International Workshop on Peer-to-Peer Systems, IPTPS (2004)
P2PSIP Status Pages: Peer-to-Peer Session Initiation Protocol (Active WG), http://tools.ietf.org/wg/p2psip/
PPLive, http://www.pplive.com
Quittek, J., Niccolini, S., Tartarelli, S., Schlegel, R.: On Spam over Internet Telephony (SPIT) Prevention. IEEE Communications Magazine 22(5) (2008)
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (2002)
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, p. 329. Springer, Heidelberg (2001)
Seedorf, J.: Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP. In: 3rd Annual VoIP Security Wksp., Berlin, Germany (June 2006)
Seedorf, J.: Security Challenges for P2P-SIP. IEEE Network Special Issue on Securing Voice over IP 20(5), 38–45 (2006)
Seedorf, J.: Lawful Interception in P2P-Based VoIP Systems. In: Schulzrinne, H., State, R., Niccolini, S. (eds.) IPTComm 2008. LNCS, vol. 5310, pp. 217–235. Springer, Heidelberg (2008)
Seedorf, J., Ruwolt, F., Stiemerling, M., Niccolini, S.: Evaluating P2PSIP under Attack: An Emulative Study. In: IEEE Globecom 2008 (November 2008)
Singh, K., Schulzrinne, H.: Peer-to-Peer Internet Telephony using SIP. In: Int. Wksp. on Network and Operating Systems Support for Digital Audio and Video, pp. 63–68 (2005)
SIPDHT: http://sipdht.sourceforge.net
Skype: Make the most of Skype - free internet calls and great value calls, http://www.skype.com
SopCast - Free P2P internet TV – live football, NBA, cricket, http://www.sopcast.com
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Transactions on Networking 11(1) (Febuary 2003)
TVANTS p2p, http://www.tvants.com
TVU Networks, http://www.tvunetworks.com
Zattoo: TV meets PC, http://www.zattoo.com
Zimmermann, P., Johnston, A., Callas, J.: ZRTP: Media Path Key Agreement for Secure RTP, Internet-Draft (work in progress) (February 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Seedorf, J. (2009). Security Issues for P2P-Based Voice- and Video-Streaming Applications. In: Camenisch, J., Kesdogan, D. (eds) iNetSec 2009 – Open Research Problems in Network Security. 2009. IFIP Advances in Information and Communication Technology, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05437-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-05437-2_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05436-5
Online ISBN: 978-3-642-05437-2
eBook Packages: Computer ScienceComputer Science (R0)