6533b7defe1ef96bd1275b6f

RESEARCH PRODUCT

A secure architecture for P2PSIP-based communication systems

Xianghan ZhengVladimir A. Oleshchuk

subject

PastryComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer securitycomputer.software_genreCommunications systemEncryptionDistributed hash tableContent addressable networkDistributed System Security ArchitectureSystems architecturebusinessChord (peer-to-peer)computerComputer network

description

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Destination inter-working, etc. We also implement a prototype with 16 Chord Secure Proxys (CSPs) and 496 P2PSIP peers. After that we analyze this system architecture in several aspects: number of hops and delay, trust upgrading, and the protection of security breaches (e.g. malicious or compromised intermediate peer). We take Chord as the P2PSIP overlay as example. However, this system architecture is independent of Chord overlay and could be extended to the other DHT (Distributed Hash Table) technologies.

https://doi.org/10.1145/1626195.1626216