The Community for Technology Leaders
Pervasive Computing and Communications Workshops, IEEE International Conference on (2012)
Lugano, Switzerland
Mar. 19, 2012 to Mar. 23, 2012
ISBN: 978-1-4673-0905-9
pp: 746-751
Ch. Tselios , Wireless Telecommunications Laboratory, University of Patras, Patras, Greece
K. Birkos , Wireless Telecommunications Laboratory, University of Patras, Patras, Greece
P. Galiotos , Wireless Telecommunications Laboratory, University of Patras, Patras, Greece
S. Kotsopoulos , Wireless Telecommunications Laboratory, University of Patras, Patras, Greece
T. Dagiuklas , Depart. of Telecommunication Systems and Networks, Technological Educational Institute of Messolonghi, Nafpaktos, Greece
ABSTRACT
P2PSIP is a protocol for managing multimedia sessions in a distributed architecture, where all participating nodes share and manage network resources like bandwidth and disk space. This paper presents threats associated with P2PSIP protocol and proposes protocol enhancement to mitigate possible attacks. These extensions have been designed for the leading draft of P2PSIP overlay management protocol, RELOAD. This paper proposes the use of Public key cryptography communication encryption, while symmetric cryptography is only used for peer authentication. The Public/Private Key (PPK) pair of each peer is refreshed based on a timer threshold, for the system to become even more robust. Through experimentation from a testbed, it is demonstrated that the overhead in terms of CPU load didn't exceed 3% in both peak and average evaluation cases.
INDEX TERMS
CITATION

S. Kotsopoulos, P. Galiotos, C. Tselios, T. Dagiuklas and K. Birkos, "Malicious threats and novel security extensions in P2PSIP," 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)(PERCOM WORKSHOPS), Lugano, 2012, pp. 746-751.
doi:10.1109/PerComW.2012.6197612
165 ms
(Ver 3.3 (11022016))