Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks

被引:0
|
作者
Zhang, Ge [1 ]
Fischer-Hubner, Simone [1 ]
机构
[1] Karlstad Univ, Dept Comp Sci, S-65188 Karlstad, Sweden
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, Voice over Internet Protocol (VoIP) which enables voice conversation remotely over packet switched networks gains much attentions for its low costs and flexible services. However, VoIP calling anonymity, particularly to withhold "who called whom", is difficult to achieve since VoIP infrastructures are usually deployed in an open networking environment (e.g., the Internet). Our work studies an anonymisation overlay network (AON) based solution to prevent surveillance from external attackers, who are able to wiretap the communication channels as well as to manipulate voice packets in the channels. However, it has been demonstrated that the VoIP combined with traditional AONs are vulnerable to two attacks, namely watermark attack and complementary matching attack. Taking these two attacks into account, we investigate the "defensive dropping" method in VoIP: A VoIP user-agent sends packets to an AON in a constant rate, but packets during periods of silence are marked. Then, the AON drops some silence packets and forwards the remaining ones to their destinations. The result of our experiments shows that the dropping rate must be carefully selected to counteract both of the two attacks. Finally, we discuss further threats in terms of tins solution.
引用
收藏
页码:130 / 141
页数:12
相关论文
共 50 条
  • [21] Hierarchical architectures in structured peer-to-peer overlay networks
    Korzun, Dmitry
    Gurtov, Andrei
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 359 - 395
  • [22] Enhancing quality of experience using peer-to-peer overlay on device-to-device communications
    Tetarave, Sumit
    Tripathy, Somanath
    Ghosh, Ratan
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (15)
  • [23] Reliable VoIP services using a peer-to-peer intranet
    Fiedler, Jens
    Kupka, Tomas
    Magedanz, Thomas
    Kleis, Michael
    ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 121 - +
  • [24] Cluster Based Peers Configuration using HCNP in Peer-to-Peer Overlay Networks
    Kazmi, Irum
    Aslam, Saira
    Javed, M. Y.
    2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2010, : 158 - 163
  • [25] ALASA: When service overlay networks meet peer-to-peer networks
    Zhou, S
    Hogan, M
    Ardon, S
    Portman, M
    Hu, T
    Wongrujira, K
    Seneviratne, A
    2005 Asia-Pacific Conference on Communications (APCC), Vols 1& 2, 2005, : 1053 - 1057
  • [26] A Stable Hierarchical Peer-to-Peer Overlay for Scale Free Networks
    Li Wen-xiang
    Guo Cheng-cheng
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 692 - 695
  • [27] PLATON: Peer-to-Peer load adjusting tree overlay networks
    Leonidas Lymberopoulos
    Chariklis Pittaras
    Maria Grammatikou
    Symeon Papavassiliou
    Vasilis Maglaris
    Peer-to-Peer Networking and Applications, 2012, 5 : 125 - 142
  • [28] Service oriented trustworthiness of acquaintances in peer-to-peer overlay networks
    Watanabe, Kenichi
    Nakajima, Yoshio
    Hayashibara, Naohiro
    Enokido, Tomoya
    Takizawa, Makoto
    Deen, S. M.
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 3 - +
  • [29] PLATON: Peer-to-Peer load adjusting tree overlay networks
    Lymberopoulos, Leonidas
    Pittaras, Chariklis
    Grammatikou, Maria
    Papavassiliou, Symeon
    Maglaris, Vasilis
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2012, 5 (02) : 125 - 142
  • [30] Game platform using peer-to-peer overlay network
    Yuan, Pingpeng
    Liu, Wei
    Yao, Hong
    Liao, Xiaofei
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2008, 36 (01): : 41 - 43