Font Size: a A A

Research And Prevention Of Man-In-The-Middle Attack In P2PSIP System

Posted on:2009-08-18Degree:MasterType:Thesis
Country:ChinaCandidate:S K WangFull Text:PDF
GTID:2178360275972494Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Today's society, the demands of communication are increasing high and high. More and more applications take use of P2P and SIP protocol, and make good outcomes in their respective areas. The P2P technology has some problems in standardization, interoperability, security, authentication and mobility, and other aspects, while SIP technology in the scalability, reliability, security and flexibility, and other areas. As strong complementary of the two protocols, reseches on combination of P2P and SIP are gradually increasing in the recent years. Especially the worldwide popular software Skype instant messsge software has achieved tremendous success by way of P2PSIP-like.Construting process of any system, safety problem must be considered, including P2PSIP system. Although there is still not a standardized structure for P2PSIP system, the safety research has already begun. Although P2PSIP converge the advantages of P2P technology and SIP technology, also inevitably inherited the two networks' inherent flaws. The characteristic of P2PSIP self-organization is vulnerable to Man-In-The-Middle (MITM) attack, so attackers can take many methods to attack the system. To address this issue, add super-node or reputation- mechanism has been used in recent research, but super-node breaks P2P structure and there is still not complete viable model system for reputation-mechanism.IETF(Internet Engineering Task Force) P2PSIP workgroup distributed the entire structure of the P2PSIP network, to avoid any form of intermediate nodes or servers, so these two existing programmes clearly does not meet such a request. By analyzing the attack ways taking by attacks, this paper advances the methods of authentication and iterative-routing mechanism. No additional proxy is needed that may break the structure of P2PSIP. The use of asymmetrickey algorithm and reliable hash algorithm can complete the certification function. With iterative routing, MITM attacks or attackers can be guarded and checked out.The final details are given each node's SIP-URI production process and in accordance with the Chord algorithm construct structural P2PSIP network. Simulation of a variety of possible MITM attacks. And simulation platform detects all these attacks and malicious nodes, to prove such a programme feasible and effective.
Keywords/Search Tags:P2PSIP, Man-In-The-Middle Attack, Authentication, Iterative-routing
PDF Full Text Request
Related items