Skip to main content

A Peer-to-Peer Secure VoIP Architecture

  • Chapter
  • First Online:
Trustworthy Internet

Abstract

Voice over IP (VoIP) and multimedia real-time communications between two or more parties are widely used over the Internet. The Session Initiation Protocol (SIP) is the current signaling standard for such applications and allows users to establish and negotiate any end-to-end multimedia session. Unfortunately current SIP-based platforms use a centralized architecture where calls between User Agents (UAs) are routed based on static public-reachable proxy servers, suffering of well-known scalability and availability problems. Moreover, security is currently poorly implemented and, when supported, it usually relies on a third-party trust relationship or on a Public Key Infrastructure (PKI). In this work we propose a completely distributed P2P VoIP architecture where calls are routed relying on a Location Service implemented through a Distributed Hash Table (DHT). End-to-end security is also provided without the use of any centralized server or PKI. Secure media sessions are established and authenticated on the basis of previously established sessions or by simple peer’s voice recognition. The proposed architecture has been also implemented and publicly released.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rosenberg, J., et al.: RFC 3261: SIP: Session Initiation Protocol. IETF StandardTrack. http://www.ietf.org/rfc/rfc3261.txt (2002)

  2. Cirani, S., Veltri, L.: Implementation of a framework for a DHT-based Distributed Location Service. In: Proceedings of the 16th International Conference on Software, Telecommunications and Computer Networks, Split–Dubrovnik, Croatia (2008)

    Google Scholar 

  3. Cirani, S., Veltri, L.: A Kademlia-based DHT for Resource Lookup in P2PSIP. IETF Internet-Draft ciranip2psip-dsip-dhtkademlia-00. http://tools.ietf.org/html/draft-cirani-p2psip-dsip-dhtkademlia-00 (2007)

  4. Arkko, J., et al.: RFC 3830: MIKEY: Multimedia Internet KEYing. IETF Standard Track. http://tools.ietf.org/html/rfc3830 (2004)

  5. Zimmermann, P., Johnston, A., Callas, J.: ZRTP: Media Path Key Agreement for Secure RTP. IETF Internet-Draft draft-zimmermann-avt-zrtp-21. http://tools.ietf.org/html/draft-zimmermann-avt-zrtp-21 (2010)

  6. Jennings, C., et al.: REsource LOcation And Discovery (RELOAD) Base Protocol. IETF Internet-Draft draft-ietf-p2psip-base-09. http://tools.ietf.org/html/draft-ietf-p2psip-base-09 (2010)

  7. Baset, S.A., Schulzrinne, H.G.: An analysis of the Skype peer-to-peer internet telephony protocol. In: Proceedings of the 25th IEEE International Conference on Computer Communications, Barcelona, Spain (2006)

    Google Scholar 

  8. Baugher, M., et al.: RFC 3711: The Secure Real-time Transport Protocol (SRTP). IETF Standard Track. http://www.ietf.org/rfc/rfc3711.txt (2004)

  9. Gupta, P., Shmatikov, V.: Security analysis of voice-over-IP protocols. In: Proceedings of the 20th IEEE Computer Security Foundations Symposium, Venice, Italy (2007)

    Google Scholar 

  10. Maymounkov, P., Mazires, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: 1st International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA (2002)

    Google Scholar 

  11. Bryan, D.: dSIP: A P2P Approach to SIP Registration and Resource Location. IETF Internet-Draft draft-bryan-p2psip-dsip-00. http://www.p2psip.org/drafts/draft-bryan-p2psip-dsip-00.html (2007)

  12. Veltri, L.: MjSIP Project. http://www.mjsip.org/ (2010)

  13. Pecori, R., Veltri, L.: A key agreement protocol for P2P VoIP applications. In: Proceedings of the 17th International Conference on Software, Telecommunications and Computer Networks, Hvar–Korcula–Split, Croatia (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luca Veltri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Italia Srl

About this chapter

Cite this chapter

Cirani, S., Pecori, R., Veltri, L. (2011). A Peer-to-Peer Secure VoIP Architecture. In: Salgarelli, L., Bianchi, G., Blefari-Melazzi, N. (eds) Trustworthy Internet. Springer, Milano. https://doi.org/10.1007/978-88-470-1818-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-88-470-1818-1_8

  • Published:

  • Publisher Name: Springer, Milano

  • Print ISBN: 978-88-470-1817-4

  • Online ISBN: 978-88-470-1818-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics