Secure peerTalk Using PEERT System
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Secure peerTalk Using PEERT System

Authors: Nebu Tom John, N. Dhinakaran

Abstract:

Multiparty voice over IP (MVoIP) systems allows a group of people to freely communicate each other via the internet, which have many applications such as online gaming, teleconferencing, online stock trading etc. Peertalk is a peer to peer multiparty voice over IP system (MVoIP) which is more feasible than existing approaches such as p2p overlay multicast and coupled distributed processing. Since the stream mixing and distribution are done by the peers, it is vulnerable to major security threats like nodes misbehavior, eavesdropping, Sybil attacks, Denial of Service (DoS), call tampering, Man in the Middle attacks etc. To thwart the security threats, a security framework called PEERTS (PEEred Reputed Trustworthy System for peertalk) is implemented so that efficient and secure communication can be carried out between peers.

Keywords: Key management system, peer-to-peer voice streaming, reputed trust management system, voice-over-IP.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1075216

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1881

References:


[1] Xiaohui Gu, Zhen Wen, Philip S.Yu, Zon-Yin Shae , PeerTalk: A peerto- peer multiparty Voice-over-IP System. IEEE transactions on parallel and distributed systems , April 2008
[2] Vulnerabilities and Security Threats in Structured Peer-to-Peer Systems: A Quantitative Analysis.Madhukar srivastava and Ling Liu .
[3] Sufficiently secure peer- to-peer networks. Ruper Gatti, Stephen Lewis, Andy ozment,Thierry Raynal, Andrei Serjantov.
[4] A Node Misbehaviour Detection Mechanism for Mobile Ad-hoc Networks, Tarag Fahad & Robert Askwith.
[5] A survey of solutions to the Sybil attack. Brian Neil, Levine Clay Shields, N. Boris Margolin.
[6] Defending the sybila attack in P2P network: Taxonamy, challenges and a proposal for self registrtation. Jochen Dinger, and Hannes Hartenstein. Instite f-ur Telematik,Universit" at Karlsruhe (TH, Germany [email protected], [email protected].
[7] Method and system for overcoming Denail of service attacks. Mark Vange, Mark Plumb, Kevin Blumberg.
[8] Preventing DoS attacks in peer to peer media streaming systems. William Connor, klara Nahrstedt, Indranil Gupta Department of computer science, university of Illinois, Urbana,IL USA.
[9] System and method for addressing Denial of Service attacks. Bruce wallman.
[10] Man in the middle attack on the authentication of the user from the remote autonomous object, Cheng-Ying Yang, Cheng Chi Lee and Shu - Yin Hsiao4.
[11] EBay. http://www.ebay.com.
[12] P. Resnickand, R. Zeckhauserand, E. Friedman, and K. Kuwabara. Reputation systems. Communications of the ACM, 43(12), 2000.
[13] Secured Peer to Peer network data exchange. Kuldip singh pabla, santa clara (US); William j.Yeager. Menlo Park, CA (US).
[14] A Reputation-Based Trust Management System for P2P Networks, Ali Ayd─▒n Sel├ºuk Ersin Uzun Mark Res┬©at Pariente Department of Computer Engineering Bilkent University,Ankara, 06800, Turkey.
[15] Trust and Reputation in peer-to-peer networks, a dissertation, submitted to the department of computer science and the committee on graduate studies of stanford university, in partial fulfillment of the requirements for the degree of doctor of philosophy.
[16] Y.-H. Chu, S. G. Rao, S. Seshan, and H. Zhang. Enabling Conferencing Applications on the Internet using an Overlay Multicast Architecture. Proc. of ACM SIGCOMM, San Diego, CA, August 2001.
[17] A. Bharambe, V. Padmanabhan, and S. Seshan. Supporting Spectators in Online Multiplayer Games. Proc. of HOTNETSIII, San Diego, November 2004.
[18] http://voip.about.com/od/security/a/SecuThreats.htm