Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks

被引:0
|
作者
Zhang, Ge [1 ]
Fischer-Hubner, Simone [1 ]
机构
[1] Karlstad Univ, Dept Comp Sci, S-65188 Karlstad, Sweden
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible services. However, VoIP calling anonymity, particularly to withhold "who called whom", is difficult to achieve since VoIP infrastructures are usually deployed in an open networking environment (e.g., the Internet). Our work studies an anonymisation overlay network (AON) based solution to prevent surveillance from external attackers, who are able to wiretap the communication channels as well as to manipulate voice packets in the channels. However, it has been demonstrated that the VoIP combined with traditional AONs are vulnerable to two attacks, namely watermark attack and complementary matching attack. Taking these two attacks into account, we investigate the "defensive dropping" method in VoIP: A VoIP user-agent sends packets to an AON in a constant rate, but packets during periods of silence are marked. Then, the AON drops some silence packets and forwards the remaining ones to their destinations. The result of our experiments shows that the dropping rate must be carefully selected to counteract both of the two attacks. Finally, we discuss further threats in terms of tins solution.
引用
收藏
页码:130 / 141
页数:12
相关论文
共 50 条
  • [1] Trustworthiness in peer-to-peer overlay networks
    Nakajima, Yoshio
    Watanabe, Kenichi
    Hayashibara, Naohiro
    Enokido, Tomoya
    Takizawa, Makoto
    Deen, S. Misbah
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 86 - +
  • [2] On the connectedness of peer-to-peer overlay networks
    Si, WS
    Li, MC
    11th International Conference on Parallel and Distributed Systems, Vol I, Proceedings, 2005, : 474 - 480
  • [3] A framework for structured peer-to-peer overlay networks
    Alima, LO
    Ghodsi, A
    Haridi, S
    GLOBAL COMPUTING, 2005, 3267 : 223 - 249
  • [4] Trustworthiness of acquaintances in peer-to-peer overlay networks
    Watanabe, Kenichi
    Enokido, Tomoya
    Takizawa, Makoto
    International Journal of High Performance Computing and Networking, 2009, 6 (02) : 160 - 171
  • [5] Ranking Factors in Peer-to-Peer Overlay Networks
    Watanabe, Kenichi
    Nakajima, Yoshio
    Enokido, Tomoya
    Takizawa, Makoto
    ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2007, 2 (03)
  • [6] Deterministic δ-connected overlay for peer-to-peer networks
    Datta, A. K.
    Gradinariu, M.
    Virgillito, A.
    NINTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT AND COMPONENT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 159 - 165
  • [7] Broadcasting in unstructured peer-to-peer overlay networks
    Annexstein, FS
    Berman, KA
    Jovanovic, MA
    THEORETICAL COMPUTER SCIENCE, 2006, 355 (01) : 25 - 36
  • [8] An efficient mechanism for mobility support using peer-to-peer overlay networks
    Le, H
    Hoang, D
    Simmonds, A
    Yousef, B
    Chan, J
    2005 3RD IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2005, : 325 - 330
  • [9] Satistiability and trustworthiness of peers in peer-to-peer overlay networks
    Nakajima, Yoshio
    Watanabe, Kenichi
    Hayashibara, Naohiro
    Enokido, Tomoya
    Takizawa, Makoto
    Deen, S. Misbah
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 42 - +
  • [10] Consistency maintenance in dynamic peer-to-peer overlay networks
    Liu, XT
    Lan, J
    Shenoy, P
    Ramaritham, K
    COMPUTER NETWORKS, 2006, 50 (06) : 859 - 876