Security and Performance Evaluation in Peer-To-Peer VoIP Communication

被引:0
|
作者
Sanlioz, Gani [1 ]
Kara, Mustafa [2 ]
Aydin, Muhammed Ali [1 ]
机构
[1] Istanbul Univ Cerrahpasa, Dept Comp Engn, Istanbul, Turkiye
[2] Natl Def Univ, Air Force Acad, Dept Comp Engn, Istanbul, Turkiye
来源
2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024 | 2024年
关键词
VoIP; P2P Communication; Blockchain; Consensus Algorithm;
D O I
10.1109/BLACKSEACOM61746.2024.10646263
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The impact of virtual collaborations and digital transformation has led to a significant increase in the use of VoIP technologies. VoIP, which works on a hierarchical client-server architecture in order to adapt to the old circuit-switched technology, has gradually started to use a P2P architecture over time in parallel with the developments in this architecture. The lack of " peer admission" and "control in call flow" features in pure P2P architecture has resulted in vulnerabilities against some attacks, such as modifying, termination, eavesdropping, and SPIT. Although various studies have been conducted to mitigate these vulnerabilities in P2P systems on other platforms, the literature on P2P VoIP is limited. Studies using distributed blockchains were limited to authentication and could not eliminate the system's centralization by keeping SIP servers in their architecture. In this study, we proposed a P2P VoIP system and assessed the feasibility of managing user data via distributed blockchain technology. Our findings reveals that this approach can enhance security and decentralization in P2P VoIP. Furthermore, a thorough performance and security evaluation is conducted on the blockchain type, consensus algorithm, and several blockchain architectures that will be used to manage this data, offering a promising outlook for the future of P2P VoIP.
引用
收藏
页码:340 / 343
页数:4
相关论文
共 50 条
  • [41] Grid security: Lessons for peer-to-peer systems
    Surridge, M
    Upstill, C
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 2 - 6
  • [42] On the security of polling protocols in peer-to-peer systems
    Sieka, B
    Kshemkalyani, AD
    Singhal, M
    FOURTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2004, : 36 - 44
  • [43] Security in a peer-to-peer distributed virtual environment
    Köhnlein, J
    PARALLEL COMPUTING: SOFTWARE TECHNOLOGY, ALGORITHMS, ARCHITECTURES AND APPLICATIONS, 2004, 13 : 587 - 597
  • [44] Secure peer-to-peer Group Communication Framework
    Noda, J
    Taguchi, D
    Tani, M
    Nakamura, N
    NEC RESEARCH & DEVELOPMENT, 2003, 44 (04): : 333 - 339
  • [45] Identification of Peer-to-Peer VoIP Sessions Using Entropy and Codec Properties
    Gomes, Joao V.
    Inacio, Pedro R. M.
    Pereira, Manuela
    Freire, Mario M.
    Monteiro, Paulo P.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (10) : 2004 - 2014
  • [46] Application of peer-to-peer communication for protective relaying
    Yalla, M
    Adamiak, M
    Apostolov, A
    Beatty, J
    Borlase, S
    Bright, J
    Burger, J
    Dickson, S
    Gresco, G
    Hartman, W
    Hohn, J
    Holstein, D
    Kazemi, A
    Michael, G
    Sufana, C
    Tengdin, J
    Thompson, A
    Udren, E
    IEEE TRANSACTIONS ON POWER DELIVERY, 2002, 17 (02) : 446 - 451
  • [47] Securing communication in a peer-to-peer messaging middleware
    Szilagyi, Peter
    2013 15TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2013), 2014, : 329 - 335
  • [48] Symmetric and synchronous communication in peer-to-peer networks
    Witzel, Andreas
    MATHEMATICS OF PROGRAM CONSTRUCTION, PROCEEDINGS, 2008, 5133 : 404 - 421
  • [49] Towards a comprehensive peer-to-peer communication model
    Pajaro, J
    d'Auriol, BJ
    CIC '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN COMPUTING, 2004, : 281 - 287
  • [50] The Missing Piece Syndrome in Peer-to-Peer Communication
    Hajek, Bruce
    Zhu, Ji
    2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 1748 - 1752