메뉴 건너뛰기




Volumn 11, Issue 1, 2009, Pages 4-12

Peer-to-peer overlays for real-time communication: Security issues and solutions

Author keywords

DHT; P2P; P2PSEC; P2PSIP; PCAN; Peer to peer; Real time communications; RTC; Security; VoIP

Indexed keywords

DHT; P2P; P2PSEC; P2PSIP; PCAN; PEER-TO-PEER; REAL-TIME COMMUNICATIONS; RTC; SECURITY; VOIP;

EID: 70449370459     PISSN: None     EISSN: 1553877X     Source Type: Journal    
DOI: 10.1109/SURV.2009.090102     Document Type: Article
Times cited : (36)

References (53)
  • 1
    • 70449439672 scopus 로고    scopus 로고
    • "Napster," http://www.napster.com/.
    • Napster
  • 2
    • 70449425690 scopus 로고    scopus 로고
    • "Kazaa," http://www.kazaa.com/.
    • Kazaa
  • 4
    • 13644274213 scopus 로고    scopus 로고
    • A survey of peer-to-peer content distribution technologies
    • S. Androutsellis-Theotokis and D. Spinellis, "A survey of peer-to-peer content distribution technologies," ACM Comput. Surv., vol.36, no.4, pp. 335-371, 2004.
    • (2004) ACM Comput. Surv. , vol.36 , Issue.4 , pp. 335-371
    • Androutsellis-Theotokis, S.1    Spinellis, D.2
  • 5
    • 70449421062 scopus 로고    scopus 로고
    • "Skype," http://www.skype.com/.
    • Skype
  • 7
    • 70449447356 scopus 로고    scopus 로고
    • "Joost," http://www.joost.com.
    • Joost
  • 8
    • 50649124978 scopus 로고    scopus 로고
    • "Coolstreaming," http://www.coolstreaming.us.
    • Coolstreaming
  • 9
    • 33750309882 scopus 로고    scopus 로고
    • An analysis of the skype peer-to-peer internet telephony protocol
    • April
    • S. Baset and H. Schulzrinne, "An analysis of the skype peer-to-peer internet telephony protocol," Infocom, April 2006.
    • (2006) Infocom
    • Baset, S.1    Schulzrinne, H.2
  • 11
    • 3242703749 scopus 로고    scopus 로고
    • A survey of peer-to-peer security issues
    • Online
    • D. S. Wallach, "A survey of peer-to-peer security issues," International Symposium on Software Security, pp. 42-57, 2002. [Online]. Available: http://www.cs.rice.edu/dwallach/pub/tokyo-p2p2002.pdf
    • (2002) International Symposium on Software Security , pp. 42-57
    • Wallach, D.S.1
  • 17
    • 70449444185 scopus 로고    scopus 로고
    • Bookie reveals 100,000 cost of denial-ofservice extortion attacks
    • Online
    • A. McCue, "Bookie reveals 100,000 cost of denial-ofservice extortion attacks," silicon.com, 2004. [Online]. Available: http://software.silicon. com/security/0,39024655,39121278,00.htm
    • (2004) Silicon.com
    • McCue, A.1
  • 19
    • 25844529486 scopus 로고    scopus 로고
    • Pollution in p2p file sharing systems
    • Mar
    • J. Liang, R. Kumar, Y. Xi, and K. Ross, "Pollution in p2p file sharing systems," Infocom, Mar 2005.
    • (2005) Infocom
    • Liang, J.1    Kumar, R.2    Xi, Y.3    Ross, K.4
  • 26
    • 2942728016 scopus 로고    scopus 로고
    • Telling humans and computers apart automatically
    • L. von Ahn, M. Blum, and J. Langford, "Telling humans and computers apart automatically," Commun. ACM, vol.47, no.2, pp. 56-60, 2004.
    • (2004) Commun. ACM , vol.47 , Issue.2 , pp. 56-60
    • Von Ahn, L.1    Blum, M.2    Langford, J.3
  • 32
    • 70449401012 scopus 로고    scopus 로고
    • Robust forwarding in structured peerto-peer overlay networks
    • August
    • W.-K. Poon and R. K. C. Chang, "Robust forwarding in structured peerto-peer overlay networks," SIGCOMM, August 2004.
    • (2004) SIGCOMM
    • Poon, W.-K.1    Chang, R.K.C.2
  • 38
    • 30144435965 scopus 로고    scopus 로고
    • Enhancing data authenticity and integrity in P2P systems
    • Sep.
    • X. Zhang, S. Chen, and R. Sandhu, "Enhancing data authenticity and integrity in P2P systems," Internet Computing, Sep. 2005.
    • (2005) Internet Computing
    • Zhang, X.1    Chen, S.2    Sandhu, R.3
  • 42
    • 70449384061 scopus 로고    scopus 로고
    • XPP extensions for implementing a passive P2PSIP overlay network based on the CAN distributed hash table
    • Jun. Online
    • E. Marocco and E. Ivov, "XPP extensions for implementing a passive P2PSIP overlay network based on the CAN distributed hash table," Internet-Draft draft-marocco-p2psip-xpp-pcan-00 (Work in Progress), Jun. 2007. [Online]. Available: http://tools.ietf.org/html/draft-maroccop2psip-xpp-pcan-00
    • (2007) Internet-Draft Draft-marocco-p2psip-xpp-pcan-00 (Work in Progress)
    • Marocco, E.1    Ivov, E.2
  • 44
    • 70449384060 scopus 로고    scopus 로고
    • A distributed transport function in P2PSIP using HIP for multi-hop overlay routing
    • Jun. Online
    • E. Cooper, A. Johnston, and P. Matthews, "A distributed transport function in P2PSIP using HIP for multi-hop overlay routing," InternetDraft draft-matthews-p2psip-hip-hop-00 (Work in Progress), Jun. 2007. [Online]. Available: http://tools.ietf.org/html/draft-matthews-p2psip-hiphop-00
    • (2007) InternetDraft Draft-matthews-p2psip-hip-hop-00 (Work in Progress)
    • Cooper, E.1    Johnston, A.2    Matthews, P.3
  • 46
    • 33749995300 scopus 로고    scopus 로고
    • Security challenges for peer-to-peer SIP
    • J. Seedorf, "Security challenges for peer-to-peer SIP," IEEE Network, vol.20, 2006.
    • (2006) IEEE Network , vol.20
    • Seedorf, J.1
  • 50
    • 0003821858 scopus 로고    scopus 로고
    • HTTP over TLS
    • (Informational), May [Online]
    • E. Rescorla, "HTTP over TLS," RFC 2818 (Informational), May 2000. [Online], Available: http://www.ietf.org/rfc/rfc2818.txt
    • (2000) RFC , vol.2818
    • Rescorla, E.1
  • 51
    • 57349182190 scopus 로고    scopus 로고
    • Using cryptographically generated SIP-URIs to protect the integrity of content in P2P-SIP
    • June
    • J. Seedorf, "Using cryptographically generated SIP-URIs to protect the integrity of content in P2P-SIP," VoIP Security Workshop, June 2006.
    • (2006) VoIP Security Workshop
    • Seedorf, J.1
  • 52
    • 26844503631 scopus 로고    scopus 로고
    • The secure real-time transport protocol (SRTP)
    • (Draft Standard), Mar. [Online]
    • M. Baugher, D. McGrew, M. Naslund, , E. Carrara, and K. Norrman, "The secure real-time transport protocol (SRTP)," RFC 3711 (Draft Standard), Mar. 2004. [Online], Available: http://www.ietf.org/rfc/rfc3711.txt
    • (2004) RFC , vol.3711
    • Baugher, M.1    McGrew, D.2    Naslund, M.3    Carrara, E.4    Norrman, K.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.