Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
SecMon: end-to-end quality and security monitoring system
Show others and affiliations
Responsible organisation
2008 (English)In: Annales UMCS Informatica, ISSN 1732-1360, Vol. AI 8, no 1, 185-201 p.Article in journal (Refereed) PublishedAlternative title
SecMon : end-till-end kvalitets- och säkerhetsmonitoreringssystem (Swedish)
Abstract [en]

The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communication for the Internet users. This also applies to the Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by a limited number of implementations. As a result, the lack of mandatory and widely applicable QoS and security guaranties makes the contemporary VoIP (P2P VoIP systems even more so than client-server ones) systems vulnerable to attacks and network disturbances. In this paper we are facing these issues and propose the SecMon system, which simultaneously provides a lightweight security mechanism and improves quality parameters of the call. SecMon is intended specially for VoIP service over P2P networks and its main advantage is that it provides authentication, data integrity services, adaptive QoS and (D)DoS attacks detection. Moreover, the SecMon approach represents a low-bandwidth consumption solution that is transparent to the users and possesses a self-organizing capability. The above- mentioned features are accomplished mainly by utilizing two information hiding techniques: digital audio watermarking and network steganography. These techniques are used to create covert channels that serve as transport channels for lightweight QoS measurement’s results. Furthermore, these metrics are aggregated in a reputation system that is used for the best route path selection in the P2P network. The reputation system also helps to mitigate (D)DoS attacks, maximize performance and increase transmission efficiency in the network.

Abstract [sv]

Ett system som hjälper att förbättra kvaliten och säkerheten i röstkommunikation via Internet presenteras. Mekanismen bygger på P2P teknik och behöver förhållandevis små resurser. Informationsutbyte sker med hjälp av gömda kanaler. Mer detaljer finns i den engelska versionen.

Place, publisher, year, edition, pages
Uniwersytet Marii Curie-Sklodowskiej , 2008. Vol. AI 8, no 1, 185-201 p.
Keyword [en]
VoIP, Peer-to-peer, Quality of Service, data integrity, information hiding, watermarking, network steganography
National Category
Telecommunications
Identifiers
URN: urn:nbn:se:bth-8031DOI: 10.2478/v10065-008-0018-0Local ID: oai:bth.se:forskinfoFB7E3AF46F4784FAC125760A00652C94OAI: oai:DiVA.org:bth-8031DiVA: diva2:835715
Available from: 2012-09-18 Created: 2009-08-06 Last updated: 2015-06-30Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Fiedler, Markus
Telecommunications

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 57 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf