Advertisement

Approaches to Securing P2PSIP in MANETs

  • Alexandre Cormier
  • François GagnonEmail author
  • Babak Esfandiari
  • Thomas Kunz
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 990)

Abstract

This paper studies the security for Voice over IP in peer-to-peer (P2P) networks. Instead of taking a general approach to security in P2P, we focus on a specific use case, namely private (e.g. military) mobile ad hoc networks. This allows for security measures that are not necessarily applicable to general P2P networks, but elegantly solve the issues in the given context. We propose security measures for two different approaches to the P2P version of the Session Initiation Protocol in such networks, provide their implementations and present results from performing experimentations in a simulator.

Keywords

P2P SIP MANET Security Attacks and simulation experiments 

Notes

Acknowledgment

The research was sponsored by the Army Research Laboratory/US Army RDECOM-Americas and was accomplished under Cooperative Agreement Number W911NF-16-1-0345. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory/US Army RDECOM-Americas or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation herein.

References

  1. 1.
    Cormier, A., Gagnon, F., Esfandiari, B., Kunz, T.: Toward testing security attacks and defense mechanisms for P2PSIP in MANETs with a simulator. In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 3: DCNET, (ICETE 2017), INSTICC, pp. 43–54. SciTePress (2017)Google Scholar
  2. 2.
    Varga, A., Hornig, R.: An overview of the OMNeT++ simulation environment. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), p. 60 (2008)Google Scholar
  3. 3.
    Baumgart, I., Heep, B., Krause, S.: OverSim: a flexible overlay network simulation framework. In: Proceedings of 10th IEEE Global Internet Symposium (GI 2007) in Conjunction with IEEE INFOCOM 2007, Anchorage, AK, USA, pp. 79–84 (2007)Google Scholar
  4. 4.
    Giordano, S., et al.: Mobile ad hoc networks. In: Handbook of Wireless Networks and Mobile Computing, pp. 325–346 (2002)Google Scholar
  5. 5.
    Rosenberg, J., et al.: SIP: Session Initiation Protocol. RFC 3261 (2002)Google Scholar
  6. 6.
    Jennings, C., Lowekamp, B., Rescorla, E., Baset, S., Schulzrinne, H.: REsource LOcation and Discovery (RELOAD) Base Protocol. RFC 6940 (2014)Google Scholar
  7. 7.
    Schollmeier, R.: A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications. In: First International Conference on Peer-to-Peer Computing, Proceedings, pp. 101–102. IEEE (2001)Google Scholar
  8. 8.
    Li, L., Lamont, L.: Support real-time interactive session applications over a tactical mobile ad hoc network. In: Military Communications Conference, MILCOM 2005, pp. 2910–2916. IEEE (2005)Google Scholar
  9. 9.
    Banerjee, N., Acharya, A., Das, S.K.: Peer-to-peer SIP-based services over wireless ad hoc networks. In: BROADWIM: Broadband Wireless Multimedia Workshop (2004)Google Scholar
  10. 10.
    Yahiaoui, S., Belhoul, Y., Nouali-Taboudjemat, N., Kheddouci, H.: AdSIP: decentralized SIP for mobile ad hoc networks. In: 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp. 490–495 (2012)Google Scholar
  11. 11.
    Banerjee, N., Acharya, A., Das, S.K.: Enabling SIP-based session setup in ad hoc networks. In: Proceedings of INFOCOM (2005)Google Scholar
  12. 12.
    Fudickar, S., Rebensburg, K., Schnor, B.: MANETSip - a dependable SIP overlay network for MANET including presentity service. In: Fifth International Conference on Networking and Services, ICNS 2009, pp. 314–319 (2009)Google Scholar
  13. 13.
    Aburumman, A., Seo, W.J., Esposito, C., Castiglione, A., Islam, R., et al.: A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy. In: Practice and Experience, Concurrency and Computation (2016)Google Scholar
  14. 14.
    Wongsaardsakul, T.: P2P SIP over mobile ad hoc networks. Ph.D. thesis, Evry, Institut national des télécommunications (2010)Google Scholar
  15. 15.
    O’Driscoll, A., Rea, S., Pesch, D.: Hierarchical clustering as an approach for supporting P2P SIP sessions in ubiquitous environments. In: 9th IFIP International Conference on Mobile Wireless Communications Networks, MWCN 2007, Cork, Ireland, 19–21 September 2007, pp. 76–80. IEEE (2007)Google Scholar
  16. 16.
    Baumgart, I.: P2PNS: a secure distributed name service for P2PSIP. In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008, pp. 480–485. IEEE (2008)Google Scholar
  17. 17.
    Bryan, D.A., Lowekamp, B.B., Zangrilli, M.: The design of a versatile, secure P2PSIP communications architecture for the public internet. In: IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, pp. 1–8. IEEE (2008)Google Scholar
  18. 18.
    Seedorf, J.: Using cryptographically generated SIP-URIs to protect the integrity of content in P2P-SIP. In: Third Annual VoIP Security Workshop (2006)Google Scholar
  19. 19.
    Davoust, A., Gagnon, F., Esfandiari, B., Kunz, T., Cormier, A.: Towards securing peer-to-peer sip in the manet context: existing work and perspectives. In: 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 223–229. IEEE (2017)Google Scholar
  20. 20.
    Freedman, M.J., Morris, R.: Tarzan: a peer-to-peer anonymizing network layer. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, 18–22 November 2002, pp. 193–206 (2002)Google Scholar
  21. 21.
    Rennhard, M., Plattner, B.: Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection. In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, 21 November 2002, pp. 91–102 (2002)Google Scholar
  22. 22.
    Wang, Q., Borisov, N.: Octopus: a secure and anonymous DHT lookup. In: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), pp. 325–334. IEEE (2012)Google Scholar
  23. 23.
    Fonville, M.: Confidential peer-to-peer file-sharing using social-network sites. In: 13th Twente Student Conference on IT, June, vol. 21, p. 10 (2010)Google Scholar
  24. 24.
    Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Comput. Commun. Rev. 31, 149–160 (2001)CrossRefGoogle Scholar
  25. 25.
    Clausen, T., Jacquet, P.: Optimized Link State Routing Protocol (OLSR). RFC 3626 (2003)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Alexandre Cormier
    • 1
  • François Gagnon
    • 2
    Email author
  • Babak Esfandiari
    • 1
  • Thomas Kunz
    • 1
  1. 1.Department of Systems and Computer EngineeringCarleton UniversityOttawaCanada
  2. 2.Cybersecurity Research LabCégep Sainte-FoyQuébec CityCanada

Personalised recommendations