Security and Performance Evaluation in Peer-To-Peer VoIP Communication

被引:0
|
作者
Sanlioz, Gani [1 ]
Kara, Mustafa [2 ]
Aydin, Muhammed Ali [1 ]
机构
[1] Istanbul Univ Cerrahpasa, Dept Comp Engn, Istanbul, Turkiye
[2] Natl Def Univ, Air Force Acad, Dept Comp Engn, Istanbul, Turkiye
来源
2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024 | 2024年
关键词
VoIP; P2P Communication; Blockchain; Consensus Algorithm;
D O I
10.1109/BLACKSEACOM61746.2024.10646263
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The impact of virtual collaborations and digital transformation has led to a significant increase in the use of VoIP technologies. VoIP, which works on a hierarchical client-server architecture in order to adapt to the old circuit-switched technology, has gradually started to use a P2P architecture over time in parallel with the developments in this architecture. The lack of " peer admission" and "control in call flow" features in pure P2P architecture has resulted in vulnerabilities against some attacks, such as modifying, termination, eavesdropping, and SPIT. Although various studies have been conducted to mitigate these vulnerabilities in P2P systems on other platforms, the literature on P2P VoIP is limited. Studies using distributed blockchains were limited to authentication and could not eliminate the system's centralization by keeping SIP servers in their architecture. In this study, we proposed a P2P VoIP system and assessed the feasibility of managing user data via distributed blockchain technology. Our findings reveals that this approach can enhance security and decentralization in P2P VoIP. Furthermore, a thorough performance and security evaluation is conducted on the blockchain type, consensus algorithm, and several blockchain architectures that will be used to manage this data, offering a promising outlook for the future of P2P VoIP.
引用
收藏
页码:340 / 343
页数:4
相关论文
共 50 条
  • [21] Performance Evaluation of Recommendation Retrieval in Peer-to-Peer Networkss
    Azzedin, Farag
    Ridha, Ahmad
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, : 614 - +
  • [22] Security issues in peer-to-peer systems
    Kim, JT
    Park, HK
    Paik, EH
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 1059 - 1063
  • [23] Security applications of peer-to-peer networks
    Vlachos, V
    Androutsellis-Theotokis, S
    Spinellis, D
    COMPUTER NETWORKS, 2004, 45 (02) : 195 - 205
  • [24] Trust and security in peer-to-peer system
    Kumar, Vijay
    Seventeenth International Conference on Database and Expert Systems Applications, Proceedings, 2006, : 703 - 707
  • [25] The research of Peer-to-Peer network security
    Chen Jinrui
    Li Jianping
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 590 - 592
  • [26] The analysis of peer-to-peer network security
    Zhang, YQ
    Zhang, TJ
    GCA '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON GRID COMPUTING AND APPLICATIONS, 2005, : 131 - 137
  • [27] A modified algorithm for peer-to-peer security
    Akleylek, Sedat
    Emmungil, Levent
    Nuriyev, Urfat
    APPLIED AND COMPUTATIONAL MATHEMATICS, 2007, 6 (02) : 258 - 264
  • [28] Relay Path Selection Approaches in Peer-to-Peer VoIP Systems
    Bui, Quang Duc
    Jennings, Andrew
    ATNAC: 2008 AUSTRALASIAN TELECOMMUNICATION NETWOKS AND APPLICATIONS CONFERENCE, 2008, : 361 - 366
  • [29] Peer-to-Peer Overlays for Real-Time Communication: Security Issues and Solutions
    Chopra, Dhruv
    Schulzrinne, Henning
    Marocco, Enrico
    Ivov, Emil
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (01): : 4 - 12
  • [30] Stability of a Peer-to-Peer Communication System
    Zhu, Ji
    Hajek, Bruce
    PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 321 - 329