CFP last date
20 December 2024
Reseach Article

VOIP in PEER-TO-PEER using Session Initiation Protocol

by Akila Rajini
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 28
Year of Publication: 2010
Authors: Akila Rajini
10.5120/512-829

Akila Rajini . VOIP in PEER-TO-PEER using Session Initiation Protocol. International Journal of Computer Applications. 1, 28 ( February 2010), 42-47. DOI=10.5120/512-829

@article{ 10.5120/512-829,
author = { Akila Rajini },
title = { VOIP in PEER-TO-PEER using Session Initiation Protocol },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 28 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 42-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number28/512-829/ },
doi = { 10.5120/512-829 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:49:21.968587+05:30
%A Akila Rajini
%T VOIP in PEER-TO-PEER using Session Initiation Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 28
%P 42-47
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Session Initiation Protocol (SIP) is an application layer protocol for multimedia sessions developed by IETF. It is a signaling protocol for voice over IP (VoIP). Originally, SIP was specified as a client server protocol to set up multimedia communications. However, recent proposals suggest using SIP in a peer-to-peer setting. The initiators of P2P SIP claim higher robustness against failure as well as easier configuration and maintenance as in the main motivation for peer-to-peer SIP. Clearly, a peer-to-peer setting imposes new security threats to SIP communications; design decisions that affect security, which include node-ID computation, overlay routing, authentication of nodes, SIP message semantics, and representation of identity. For instance, the lack of a central authority makes authentication of peers a hard problem. Without authentication, adversary nodes can spoof identity and falsify messages in the network. The peer-to-peer network may be affected by attacks like bootstrapping, identity enforcement, free riding, and anonymity. The requirements for secure network are secure node-ID assignment, secure routing table maintenance and secure message forwarding. In our project, we focus on providing secure node-IDs. Solely the IP address (without port) is used for node-ID generation. It is suggested as a better choice than using a combination of IP address and port which is being originally used.

References
  1. 1. K. Singh and H. Schulzrinne, "Peer-to-Peer Internet Telephony using SIP," Proc. Int'l. Wksp. Network and Op. Sys. Support for Digital Audio and Video, Stevenson, WA, June 2005, pp. 63-68.
  2. 2. D. A. Bryan, B. B. Lowekamp, and C. Jennings, "SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System," Proc. Int'l. Wksp. Advanced Architectures and Algorithms for Internet Delivery and Apps., Orlando, FL, June 2005.
  3. 3. J. Rosenberg et al., "SIP: Session Initiation Protocol," RFC 3261, 2002. J. Posegga and J. Seedorf, "Voice over IP: Unsafe at Any Bandwidth?," Proc. Eurescom Summit 2005 - Ubiquitous Svcs. and Apps., Heidelberg, Germany, Apr. 27-29, 2005, VDE Verlag, pp. 305-14.
  4. 4. D. Liben-Novell, H. Balakrishnan, and D. Karger, "Analysis of the Evolution of Peer-to-Peer Systems," Proc. 21st Annual Symp. Principles of Distrib. Comp., Monterey, CA, July 21-24, 2002.
  5. 5. I. Stoica et al., "Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications," IEEE/ACM Trans. Net., vol. 11, no. 1, Feb. 2003.
  6. 6. K. Singh and H. Schulzrinne, "SIPpeer: a Session Initiation Protocol (SIP)- based Peer-to-Peer Internet Telephony Client Adaptor," White paper, Comp. Sci. Dept., Columbia Univ., Jan. 2005, http://www1.cs.columbia.edu/ ~kns10/publication/sip-p2p-design.pdf
  7. 7. D. A. Bryan, B. Lowekamp, and C. Jennings, "A P2P Approach to SIP Registration and Resource Location," Mar. 2006, work in progress, draft-bryan- sipping-p2p-02, http://www.ietf.org/internet-drafts/draft-bryan-sippingp2p- 02.txt
  8. 8. A. Johnston and H. Sinnreich, "SIP, P2P, and Internet Communications," Mar. 2006, work in progress, draft-johnston-sipping-p2p-ipcom-01, http://www.ietf.org/internet-drafts/draft-johnston-sipping-p2p-ipcom-02.txt
  9. 9. E. Shim, S. Narayanan, and G. Daley, "An Architecture for Peer-to-Peer Session Initiation Protocol (P2P SIP)," Feb. 2006, work in progress, draftshim- sipping-p2p-arch-00, http://www.ietf.org/internet-drafts/draft-shimsipping- p2p-arch-00.txt
  10. 10. K. Singh and H. Schulzrinne, "Using an External DHT as a SIP Location Service," Columbia Univ. tech. rep. CUCS-007-06, Feb. 2006.
  11. 11. J. R. Douceur, "The Sybil Attack," Revised paper, 1st Int'l. Wksp. Peer-to- Peer Sys., LCNS, vol. 2429, Cambridge, MA,
Index Terms

Computer Science
Information Sciences

Keywords

Session Initiation Protocol VOIP P2P SIP SIP Components SIP Messages RAT