A PKI-free Key Agreement Protocol for P2P VoIP Applications

被引:11
|
作者
Pecori, Riccardo [1 ]
机构
[1] Univ Parma, Dept Informat Engn, I-43100 Parma, Italy
关键词
Key agreement; Peer-to-peer; VoIP; Web of trust;
D O I
10.1109/ICC.2012.6364948
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The security of the protocols involved in peer-to-peer communications is becoming a fundamental prerequisite for their widespread diffusion. In this paper, we propose a new protocol for establishing a security association between two peers willing to set up a VoIP or multimedia communication through the standard SIP protocol. Our proposal is based on the MIKEY protocol and the Diffie-Hellman algorithm for key establishment, in a ZRTP like way. Beside this shared-secret-free method, we allow also the authentication via peer certificates without using any centralized PKI. An opportune distributed certificate management is also described. The proposed method has been also implemented and integrated in an open source SIP UA.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] A Key Agreement Protocol for P2P VoIP Applications
    Pecori, Riccardo
    Veltri, Luca
    [J]. 2009 INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2009, : 276 - 280
  • [2] An efficient group key agreement protocol for secure P2P communication
    Vijayakumar, Pandi
    Naresh, Ramu
    Deborah, Lazarus Jegatha
    Islam, Sk Hafizul
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 3952 - 3965
  • [3] Darkcube: A k-Hypercube based P2P VoIP protocol
    Aguirre, Jose-Vicente
    Alvarez, Rafael
    Zamora, Antonio
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 170 - 183
  • [4] Darkcube: A k-Hypercube based P2P VoIP protocol
    José-Vicente Aguirre
    Rafael Alvarez
    Antonio Zamora
    [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 170 - 183
  • [5] Online Game Protocol for P2P Using Byzantine Agreement
    Wada, Daisuke
    Kitagawa, Junichiro
    Kobayashi, Hiromi
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 753 - 758
  • [6] A P2P content authentication protocol based on Byzantine agreement
    Palomar, Esther
    Estevez-Tapiador, Juan M.
    Hernandez-Castro, Julio C.
    Ribagorda, Arturo
    [J]. EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 60 - 72
  • [7] A PROTOCOL FOR MAKING AN AGREEMENT IN A PEER-TO-PEER (P2P) SOCIETY
    Aikebaier, Ailixier
    Barolli, Valbona
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. JOURNAL OF INTERCONNECTION NETWORKS, 2008, 9 (04) : 317 - 335
  • [8] A Scalable PKI Based on P2P Network
    Gao, Zhiwei
    Fan, Jinsheng
    Jia, Yufeng
    Zhang, Li
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (02): : 47 - 57
  • [9] P2P email encryption by an identity-based one-way group key agreement protocol
    Yeh, Jyh-Haw
    Zeng, Fiona
    Long, Thomas
    [J]. 2014 20TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2014, : 760 - 767
  • [10] Reward mechanisms for P2P VoIP networks
    Li, Yung-Ming
    Jhang-Li, Jhih-Hua
    Cheng, Ding-Yuan
    [J]. INFORMATION TECHNOLOGY & MANAGEMENT, 2010, 11 (02): : 91 - 105