SecMon: end-to-end quality and security monitoring system

The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communication for the Internet users. This also applies to the Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by a limited number of implementations. As a result, the lack of mandatory and widely applicable QoS and security guarantee makes the contemporary VoIP systems vulnerable to attacks and network disturbances. In this paper we are facing these issues and propose the SecMon system, which simultaneously provides a lightweight security mechanism and improves quality parameters of the call. SecMon is intended specially for VoIP service over P2P networks and its main advantage is that it provides authentication, data integrity services, adaptive QoS and (D)DoS attack detection. Moreover, the SecMon approach represents a lowbandwidth consumption solution that is transparent to the users and possesses a self-organizing capability. The above-mentioned features are accomplished mainly by utilizing two information hiding techniques: digital audio watermarking and network steganography. These techniques are used to create covert channels that serve as transport channels for lightweight QoS measurement results. Furthermore, these metrics are aggregated in a reputation system that enables best route path selection in the P2P network. The reputation system helps also to mitigate (D)DoS attacks, maximize performance and increase transmission efficiency in the network.

[1]  Thomas J. Walsh,et al.  Security Considerations for Voice Over IP Systems , 2005 .

[2]  Markus Fiedler Euro-NGI D.JRA.6.1.1 : State-of-the-art with regards to user-perceived Quality of Service and quality feedback , 2004 .

[3]  Takehiro Takahashi,et al.  An assessment of VoIP covert channel threats , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[4]  M. Fiedler,et al.  Generic communication requirements of ITS-related mobile services as basis for seamless communications , 2005, Next Generation Internet Networks, 2005.

[5]  Markus Fiedler,et al.  Measurement and Analysis of Skype VoIP Traffic in 3G UMTS Systems , 2006 .

[6]  Markus Fiedler,et al.  The Throughput Utility Function: Assessing Network Impact on Mobile Services , 2005, EuroNGI Workshop.

[7]  Markus Fiedler,et al.  Network Selection Box: An Implementation of Seamless Communication , 2006, EuroNGI Workshop.

[8]  T. Ciszkowski,et al.  Distributed Reputation Management in Collaborative Environment of Anonymous MANETs , 2007, EUROCON 2007 - The International Conference on "Computer as a Tool".

[9]  Stefan Chevul,et al.  ON APPLICATION-PERCEIVED QUALITY OF SERVICE IN WIRELESS NETWORKS , 2006 .

[10]  Wojciech Mazurczyk,et al.  New VoIP Traffic Security Scheme with Digital Watermarking , 2006, SAFECOMP.

[11]  Guillermo Morales-Luna,et al.  Information Hiding through Noisy Channels , 2001, Information Hiding.

[12]  Markus Fiedler,et al.  Measurement of Application-Perceived Throughput of an E2E VPN Connection Using a GPRS Network , 2005, EuroNGI Workshop.

[13]  Markus Fiedler,et al.  Identification of performance degradation in IP networks using throughput statistics , 2003 .

[14]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[15]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[16]  Jakob Nielsen,et al.  Usability engineering , 1997, The Computer Science and Engineering Handbook.

[17]  Steven J. Murdoch,et al.  Embedding Covert Channels into TCP/IP , 2005, Information Hiding.

[18]  Zbigniew Kotulski,et al.  ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks , 2006, ArXiv.

[19]  Markus Fiedler,et al.  A P2P-Based Framework for Distributed Network Management , 2005, EuroNGI Workshop.

[20]  Wojciech Mazurczyk,et al.  New security and control protocol for VoIP based on steganography and digital watermarking , 2006, Ann. UMCS Informatica.

[21]  Markus Fiedler,et al.  Quantification of Quality of Experience for Edge-Based Applications , 2007, ITC.