A cooperative SIP infrastructure for highly reliable telecommunication services

Voice over IP (VoIP) has been a promising technology for several years. Although it has become very popular, the vision to substitute the "good old" Public Switched Telephone Network (PSTN) is still far from being true. Several issues, such as security, reliability and emergency calls are slowing down the integration of VoIP. Currently, there is a mixture of technologies where VoIP is often used for reducing costs, while still keeping the PSTN if a reliable communication is needed. Peer-to-Peer (P2P) and overlay networks received a large attention in the research community in the last few years. P2P networks provide self-organization and scalability. Recent work involved P2P-based signaling for lookup services for Voice over IP (VoIP) communication based on the Session Initiation Protocol (SIP). The main motivation behind P2P-basd SIP is to support ad hoc communication, to simplify the configuration of SIP networks, to make SIP networks more scalable and to provide services independently of other network components such as DNS. However, pure P2P networks do not have only their advantages. They create also several security threats which are hard to solve. Some of them, for example, the Sybil attack, have been proven to be unsolvable without centralized authorities or an additional out-of-band mechanism. P2P-based SIP may also create a high potential for Spam over IP Telephony (SPIT). In this paper, we present a hybrid solution for telecommunication networks that fills the gap between centralized (and therefore vulnerable to Denial-of-Service (DoS) attacks) telecommunication infrastructures and pure P2P-based telecommunication networks (which are vulnerable to SPIT, Sybil attacks, eclipse attacks, partition attacks, etc.). Our approach works with a SIP server under normal operation, while SIP User Agents (UAs) organize themselves into a P2P network. In the normal case, SIP UAs can profit from the lookup performance provided by the SIP server, which is usually better than the performance provided by the P2P network. In case of a service interruption of the infrastructure, the SIP network will function further due to the interconnection in the P2P network. Since the server and the P2P network cooperate in order to improve reliability, survivability, performance and security, we call this approach Cooperative SIP (CoSIP). We present our prototype implementation of CoSIP and discuss the potential for improvements compared to server-based SIP and P2P-based SIP.

[1]  Ralf Ackermann,et al.  Security-Related Issues in Peer-to-Peer Networks , 2005, Peer-to-Peer Systems and Applications.

[2]  Cullen Jennings,et al.  SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System , 2005, First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA'05).

[3]  Henning Schulzrinne,et al.  Peer-to-peer internet telephony using SIP , 2005, NOSSDAV '05.

[4]  Gonzalo Camarillo SIP Demystified , 2001 .

[5]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM '02.

[6]  Emin Gün Sirer,et al.  The design and implementation of a next generation name service for the internet , 2004, SIGCOMM '04.

[7]  Robbert van Renesse,et al.  Fireflies: scalable support for intrusion-tolerant network overlays , 2006, EuroSys.

[8]  Peter Druschel,et al.  Storage management and caching in PAST , 2001 .

[9]  John Kubiatowicz,et al.  Handling churn in a DHT , 2004 .

[10]  Brighten Godfrey,et al.  OpenDHT: a public DHT service and its uses , 2005, SIGCOMM '05.

[11]  Robert Tappan Morris,et al.  Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.

[12]  Jon Appelberg Peer-to-Peer Session Initiation Protocol , 2009 .

[13]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[14]  Hari Balakrishnan,et al.  Resilient overlay networks , 2001, SOSP.

[15]  K.K. Tam,et al.  Session Initiation Protocol , 2002, 2002 IEEE International Conference on Industrial Technology, 2002. IEEE ICIT '02..

[16]  Jan Seedorf Security challenges for peer-to-peer SIP , 2006, IEEE Network.

[17]  Krishna P. Gummadi,et al.  The impact of DHT routing geometry on resilience and proximity , 2003, SIGCOMM '03.

[18]  Zhe Wang,et al.  CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups , 2004, OSDI.

[19]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[20]  Klaus Wehrle,et al.  Reliability and Load Balancing in Distributed Hash Tables , 2005, Peer-to-Peer Systems and Applications.

[21]  Alan B. Johnston,et al.  SIP: Understanding the Session Initiation Protocol , 2001 .

[22]  Antony I. T. Rowstron,et al.  Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.