Peer-to-Peer Networking and Applications

, Volume 3, Issue 4, pp 257–264 | Cite as

A survey on peer-to-peer SIP based communication systems

  • Xianghan Zheng
  • Vladimir Oleshchuk


Recently, both academia and industry have initiated research projects directed on integration of P2PSIP paradigm into communication systems. In this paradigm, P2P network stores most of the network information on each participating peer without help of the central servers. The concept of self-configuration, self-establishment greatly improves the robustness of the network system compared with the traditional Client/Server based systems. In this paper, we survey P2PSIP solutions proposed recently both in the academic and industrial research. We consider technical issues that include Chord overlay topology, P2PSIP session initiation (including enrollment and bootstrap, NAT traversal, message routing, P2PSIP interworking, P2PSIP Client, etc), and security issues. Our survey is based on recent research publications.


Peer-to-Peer (P2P) Session Initiation Protocol (SIP) P2PSIP Chord Public Key Infrastructure (PKI) Pre-Shared Key (PSK) Chord Secure Proxy (CSP) 


  1. 1.
    Make the most of Skype - free internet calls and cheap calls. p.
  2. 2.
    Nokia - Nokia on the Web. p.
  3. 3.
  4. 4.
    The SIP Center - A portal for the commercial development of SIP Session Initiation Protocol. p.
  5. 5.
    Kundan S, Henning S (2005) Peer-to-peer internet telephony using SIP, in Proceedings of the international workshop on Network and operating systems support for digital audio and video. Stevenson, Washington, ACMGoogle Scholar
  6. 6.
    Bryan DA, Lowerkamp BB,Jennings C (2005) SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA’05), pp 42–49.Google Scholar
  7. 7.
  8. 8.
  9. 9.
  10. 10.
  11. 11.
    Matuszewski M, Kokkonen E (Jan, 2008) Mobile P2PSIP - Peer-to-Peer SIP Communication in Mobile Communities, in 5th IEEE Consumer Communications and Networking Conference, 2008. CCNC 2008. Las VegasGoogle Scholar
  12. 12.
    Seedorf J (2006) Security challenges for P2P-SIP. IEEE Network Special Issue on Securing Voice over IP 20(5):38–45Google Scholar
  13. 13.
    Bryan DA, Lowekamp BB, Zangrilli M (April, 2008) The Design of a versatile, secure P2PSIP communications architecture for the public internet, in IEEE international Parallel and Distributed Processing Symposium. Lyon, FranceGoogle Scholar
  14. 14.
    Naoki W, Masayuki M (2006) Overlay network symbiosis: evolution and cooperation, in Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems. Cavalese, ACMGoogle Scholar
  15. 15.
    David K, Eric L, Tom L, Rina P, Matthew L, Daniel L (1997) Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web, in Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. El Paso, ACMGoogle Scholar
  16. 16.
    Stoica I, Morris R, Liben-Nowell D, Karger DR, Kaashoek MF, Dabek F, Balakrishnan H (2003) Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans Netw 11(1):17–32CrossRefGoogle Scholar
  17. 17.
    Junjie J, Ruo P, Changyong L, Weinong W (2005) Bi-Chord: An IMproved Approach for Lookup Routing in Chord. Lect Notes Comput SciGoogle Scholar
  18. 18.
    Ben L, Barbara L, Erik DD (2006) EpiChord: parallelizing the Chord lookup algorithm with reactive routing state management. Comput Commun 29(9):1242–1259Google Scholar
  19. 19.
    Vasilios D, Nicolas L, Oliver H, Andreas M, Ralf S (2006) Cacheing indices for efficient lookup in structured overlay networks. Lect Notes Comput Sci 4118:81–93CrossRefGoogle Scholar
  20. 20.
    Bhattacharjee B, Chawathe S, Gopalakrishnan V, Keleher P, Silaghi B (2003) Efficient peer-to-peer searches using result-caching. Lect Notes Comput Sci 2735:225–236Google Scholar
  21. 21.
    Zheng X, Oleshchuk V (June, 2008) Improving Chord lookup protocol for P2PSIP-based Communication Systems. 2009 International Conference on New Trends in Information and Service Science (3rd NISS)Google Scholar
  22. 22.
    Zoels S, Despotovic Z, Kellerer W (2008) On hierarchical DHT systems - An analytical approach for optimal designs. Comput Commun 31(3):576–590CrossRefGoogle Scholar
  23. 23.
    Joung Y-J, Wang J-C (2007) Chord2: a two-layer Chord for reducing maintenance overhead via heterogeneity. Comput Netw 51(3):712–731zbMATHCrossRefGoogle Scholar
  24. 24.
    Le L, Kuo G-S (June, 2007) Hierarchical and Breathing Peer-to-Peer SIP System, in IEEE International Conference on Communications, 2007. ICC’07Google Scholar
  25. 25.
    Shi J, Wang Y, Gu L, Li L, Lin W, Li Y, Ji Y, Zhang P (Nov. 2007) A Hierarchical Peer-to-Peer SIP System for Heterogeneous Overlays Interworking, in Global Telecommunications Conference (GLOBECOM’07), IEEEGoogle Scholar
  26. 26.
    Rosenberg J, Weinberger J, Huitema C, Mahy R (March 2003) STUN-Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs). RFC 3289Google Scholar
  27. 27.
    Stukas M, Sicker DC (2004) An evaluation of VoIP traversal of firewalls and NATs within an enterprise environment. Information Systems Frontiers 6(3):219–228CrossRefGoogle Scholar
  28. 28.
    Welcome to the UPnP Forum ! : p.
  29. 29.
    Sterman B, Schwartz D. NAT Traversal in SIP. IEC Annual Review of CommunicationsGoogle Scholar
  30. 30.
    Martinez-Yelmo I, Bikfalvi A, Cuevas R, Guerrero C, Garcia J (2009) H-P2PSIP: interconnection of P2PSIP domain for global multimedia services based on a hierarchical DHT overlay network. Comput Netw 53(4):556–568zbMATHCrossRefGoogle Scholar
  31. 31.
    Hautakorpi J, Salinas A, Harjula E, Ylianttila M (Sept, 2008) Interconnecting P2PSIP and IMS, in Next Generation Mobile Applications, Services and Technologies. WalesGoogle Scholar
  32. 32.
    Fessi A, Niedermayer H, Kinkelin H, Carle G (July, 2007) A cooperative SIP Infrastructure for Highly Reliable Telecommunication Services. IPTCOMM’07Google Scholar
  33. 33.
    Cao F, Bryan DA, Lowekamp BB (Feb, 2006) Providing Secure Services in Peer-to-Peer Communications Networks with Central Security Servers. International Conference on Internet and Web Applications and Services (ICIW)Google Scholar
  34. 34.
    Seedorf J (Oct, 2006) Security challenges for peer-to-peer SIP. IEEE Netw 20(Issue 5)Google Scholar
  35. 35.
    Josang A, Hayward R, Pope S. Trust network analysis with subjective logic, in Proceedings of the 29th Australasian Computer Science Conference, 2006, AustraliaGoogle Scholar
  36. 36.
    Zheng X, Oleshchuk V (Nov, 2009) Trust-based Framework for Security Enhancement of P2PSIP Communication Systems, in The 4th International Conference for Internet Technology and Secured Transactions (ICITST-2009). LondonGoogle Scholar
  37. 37.
    Zheng X, Oleshchuk V (Oct, 2009) A Secure Architecture for P2PSIP-based Communication Systems, in 2nd International Conference on Security of Information and Networks (SIN 2009). North CyprusGoogle Scholar
  38. 38.
    Zheng X, Oleshchuk V (Nov, 2008) Providing Privacy Service for P2PSIP based Communication Systems, in Norsk informasjonssikkerhetkonferanse (NISK). Kristiansand, NorwayGoogle Scholar
  39. 39.
    Zheng X, Oleshchuk V, Jiao H (Dec, 2007) A System Architecture for SIP/IMS-based Multimedia Services in International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE) Google Scholar

Copyright information

© Springer Science + Business Media, LLC 2010

Authors and Affiliations

  1. 1.University of AgderGrimstadNorway

Personalised recommendations