Malicious threats and novel security extensions in P2PSIP

Ch Tselios, K. Birkos, P. Galiotos, S. Kotsopoulos, T. Dagiuklas

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

P2PSIP is a protocol for managing multimedia sessions in a distributed architecture, where all participating nodes share and manage network resources like bandwidth and disk space. This paper presents threats associated with P2PSIP protocol and proposes protocol enhancement to mitigate possible attacks. These extensions have been designed for the leading draft of P2PSIP overlay management protocol, RELOAD. This paper proposes the use of Public key cryptography communication encryption, while symmetric cryptography is only used for peer authentication. The Public/Private Key (PPK) pair of each peer is refreshed based on a timer threshold, for the system to become even more robust. Through experimentation from a testbed, it is demonstrated that the overhead in terms of CPU load didn't exceed 3% in both peak and average evaluation cases.

Original languageEnglish
Title of host publication2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012
Pages746-751
Number of pages6
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012 - Lugano, Switzerland
Duration: 19 Mar 201223 Mar 2012

Publication series

Name2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012

Conference

Conference2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012
Country/TerritorySwitzerland
CityLugano
Period19/03/1223/03/12

Keywords

  • P2PSIP
  • P2PSIP Security Extensions
  • RELOAD

Cite this