Mobility

Evaluating P2PSIP Under Attack: An Emulative Study

Free registration required

Executive Summary

Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP and technically based on a Distributed Hash Table (DHT). P2P networks are advantageous with respect to reliability and scalability. However, securing DHTs against adversary nodes which intentionally interrupt functionality of the network remains a major research problem. In particular, even if a trusted enrollment server is used for secure identifier assignment of participating nodes, attacks on overlay routing by malicious nodes that have successfully joined the network can still severely degrade the lookup service of the DHT.

  • Format: PDF
  • Size: 529.27 KB