CFP last date
20 August 2025
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2025

Submit your paper
Know more
Random Articles
Reseach Article

VOIP in PEER-TO-PEER using Session Initiation Protocol

by Akila Rajini
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 28
Year of Publication: 2010
Authors: Akila Rajini
10.5120/512-829

Akila Rajini . VOIP in PEER-TO-PEER using Session Initiation Protocol. International Journal of Computer Applications. 1, 28 ( February 2010), 42-47. DOI=10.5120/512-829

@article{ 10.5120/512-829,
author = { Akila Rajini },
title = { VOIP in PEER-TO-PEER using Session Initiation Protocol },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 28 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 42-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number28/512-829/ },
doi = { 10.5120/512-829 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:49:21.968587+05:30
%A Akila Rajini
%T VOIP in PEER-TO-PEER using Session Initiation Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 28
%P 42-47
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Session Initiation Protocol (SIP) is an application layer protocol for multimedia sessions developed by IETF. It is a signaling protocol for voice over IP (VoIP). Originally, SIP was specified as a client server protocol to set up multimedia communications. However, recent proposals suggest using SIP in a peer-to-peer setting. The initiators of P2P SIP claim higher robustness against failure as well as easier configuration and maintenance as in the main motivation for peer-to-peer SIP. Clearly, a peer-to-peer setting imposes new security threats to SIP communications; design decisions that affect security, which include node-ID computation, overlay routing, authentication of nodes, SIP message semantics, and representation of identity. For instance, the lack of a central authority makes authentication of peers a hard problem. Without authentication, adversary nodes can spoof identity and falsify messages in the network. The peer-to-peer network may be affected by attacks like bootstrapping, identity enforcement, free riding, and anonymity. The requirements for secure network are secure node-ID assignment, secure routing table maintenance and secure message forwarding. In our project, we focus on providing secure node-IDs. Solely the IP address (without port) is used for node-ID generation. It is suggested as a better choice than using a combination of IP address and port which is being originally used.

References
  1. 1. K. Singh and H. Schulzrinne, "Peer-to-Peer Internet Telephony using SIP," Proc. Int'l. Wksp. Network and Op. Sys. Support for Digital Audio and Video, Stevenson, WA, June 2005, pp. 63-68.
  2. 2. D. A. Bryan, B. B. Lowekamp, and C. Jennings, "SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System," Proc. Int'l. Wksp. Advanced Architectures and Algorithms for Internet Delivery and Apps., Orlando, FL, June 2005.
  3. 3. J. Rosenberg et al., "SIP: Session Initiation Protocol," RFC 3261, 2002. J. Posegga and J. Seedorf, "Voice over IP: Unsafe at Any Bandwidth?," Proc. Eurescom Summit 2005 - Ubiquitous Svcs. and Apps., Heidelberg, Germany, Apr. 27-29, 2005, VDE Verlag, pp. 305-14.
  4. 4. D. Liben-Novell, H. Balakrishnan, and D. Karger, "Analysis of the Evolution of Peer-to-Peer Systems," Proc. 21st Annual Symp. Principles of Distrib. Comp., Monterey, CA, July 21-24, 2002.
  5. 5. I. Stoica et al., "Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications," IEEE/ACM Trans. Net., vol. 11, no. 1, Feb. 2003.
  6. 6. K. Singh and H. Schulzrinne, "SIPpeer: a Session Initiation Protocol (SIP)- based Peer-to-Peer Internet Telephony Client Adaptor," White paper, Comp. Sci. Dept., Columbia Univ., Jan. 2005, http://www1.cs.columbia.edu/ ~kns10/publication/sip-p2p-design.pdf
  7. 7. D. A. Bryan, B. Lowekamp, and C. Jennings, "A P2P Approach to SIP Registration and Resource Location," Mar. 2006, work in progress, draft-bryan- sipping-p2p-02, http://www.ietf.org/internet-drafts/draft-bryan-sippingp2p- 02.txt
  8. 8. A. Johnston and H. Sinnreich, "SIP, P2P, and Internet Communications," Mar. 2006, work in progress, draft-johnston-sipping-p2p-ipcom-01, http://www.ietf.org/internet-drafts/draft-johnston-sipping-p2p-ipcom-02.txt
  9. 9. E. Shim, S. Narayanan, and G. Daley, "An Architecture for Peer-to-Peer Session Initiation Protocol (P2P SIP)," Feb. 2006, work in progress, draftshim- sipping-p2p-arch-00, http://www.ietf.org/internet-drafts/draft-shimsipping- p2p-arch-00.txt
  10. 10. K. Singh and H. Schulzrinne, "Using an External DHT as a SIP Location Service," Columbia Univ. tech. rep. CUCS-007-06, Feb. 2006.
  11. 11. J. R. Douceur, "The Sybil Attack," Revised paper, 1st Int'l. Wksp. Peer-to- Peer Sys., LCNS, vol. 2429, Cambridge, MA,
Index Terms

Computer Science
Information Sciences

Keywords

Session Initiation Protocol VOIP P2P SIP SIP Components SIP Messages RAT