Security for decentralised service location: exemplified with real-time communication session establishment
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
2013
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext Inhaltsverzeichnis |
Beschreibung: | X, 248 S. graph. Darst. |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041536967 | ||
003 | DE-604 | ||
005 | 20140115 | ||
007 | t | ||
008 | 131220s2013 d||| m||| 00||| eng d | ||
035 | |a (OCoLC)867179356 | ||
035 | |a (DE-599)BVBBV041536967 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-473 |a DE-703 |a DE-1051 |a DE-824 |a DE-29 |a DE-12 |a DE-91 |a DE-19 |a DE-1049 |a DE-92 |a DE-739 |a DE-898 |a DE-355 |a DE-706 |a DE-20 |a DE-1102 | ||
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Seedorf, Jan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security for decentralised service location |b exemplified with real-time communication session establishment |c Jan Seedorf |
264 | 1 | |c 2013 | |
300 | |a X, 248 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |a Passau, Univ., Diss., 2013 | ||
650 | 0 | 7 | |a Verteilte Hash-Tabelle |0 (DE-588)1046384872 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Peer-to-Peer-Netz |0 (DE-588)4343110-0 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Peer-to-Peer-Netz |0 (DE-588)4343110-0 |D s |
689 | 0 | 1 | |a Verteilte Hash-Tabelle |0 (DE-588)1046384872 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o urn:nbn:de:bvb:739-opus-27147 |
856 | 4 | 1 | |u http://www.opus-bayern.de/uni-passau/volltexte/2013/2714/ |z kostenfrei |3 Volltext |
856 | 4 | 1 | |u https://nbn-resolving.org/urn:nbn:de:bvb:739-opus-27147 |x Resolving-System |3 Volltext |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026982809&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
912 | |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-026982809 |
Datensatz im Suchindex
_version_ | 1804151636575125504 |
---|---|
adam_text | Contents
Introduction
1
1.1 Motivation................................... 1
1.2 Research
Questions
and Goals........................
З
1.3
Thesis Overview
................................ 5
Background
7
2.1
Peer-to-Peer Networks
............................ 8
2.1.1
Defining Peer-to-Peer Computing
.................. 9
2.1.2
Unstructured vs. Structured P2P Systems
............. 11
2.1.3
Distributed Hash Tables
....................... 14
2.1.4
Security Challenges for Distributed Hash Tables
.......... 23
2.2
Session Establishment for
Real-Time
Communications
........... 28
2.2.1
Introduction to IP-based Multimedia Communications
...... 30
2.2.2
Signalling with SIP
.......................... 32
2.2.3
Security Challenges for Multimedia Communication Signalling
. . 36
2.3
Decentralised Service Location
........................ 41
2.3.1
Service Location as Part of Communication Session Establishment
41
2.3.2
Locating a Service on the Internet without Servers
........ 45
2.3.3
P2PSIP as a Prototypical Example of Decentralised Service Location
46
Thesis Scope
51
3.1
Security Analysis of P2PSIP
......................... 51
3.1.1
Security on the DHT Routing Layer
..............., , 52
3.1.2
Security on the DHT Application Layer
............... 55
3.2
Existing Work and Remaining Challenges
.................. 56
Algorithms for Increased Lookup Availability
61
4.1
Rationale
................................... 62
4.1.1
Defining Lookup Availability
..................... 62
4.1.2
Choosing Chord as the Prototypical DHT
.......... = .. 64
4.1.3
Goals
................................. . 65
4.1.4
Attacker Model and Assumptions
.................. 66
4.2
Lookup Availability: Analytical Observations
............... 67
4.2.1
The Shield Problem
.......................... 67
4.2.2
An Upper Bound on Lookup Success in Chord
........... 69
4.3
Algorithms for Increased Lookup Availability
...,,,..,.,,..., 71
vii
4.3.1
Chord Multipath Routing
...................... 72
4.3.2
Direct Replica Routing
........................ 74
4.3.3
Detecting Node-ID Suppression Attacks
.............. 75
4.4
Assessment of the Proposed Algorithms
................... 77
4.4.1
Theoretical Analysis
......................... 77
4.4.2
Simulation Results
.......................... 79
4.5
Related Work
................................. 85
4.5.1
Approaches for Lookup Availability in Chord
........... 85
4.5.2
Approaches for Lookup Availability in Other DHTs
........ 94
4.6
Summary and Contribution
......................... 95
5
A Decentralised Mechanism for Integrity Protection of Location-Bindings
99
5.1
Rationale
................................... 100
5.1.1
Motivation and Goals
......................... 100
5.1.2
Attacker Model and Integrity of Data Items
............ 102
5.1.3
Potential Solutions and their Drawbacks
.............. 102
5.1.4
Self-certifying Identities
....................... 103
5.2
Self-certifying SIP-URIs
........................... 104
5.2.1
A Scheme for Protecting the Integrity of Content in P2PSIP
... 104
5.2.2
Generating a Self-certifying SIP-URI
................ 106
5.3
Discussion
................................... 109
5.3.1
Potential Attacks and Countermeasures
............... 109
5.3.2
Notable Properties
.......................... 112
5.3.3
Drawbacks
............................... 113
5.4
Related Work
................................. 114
5.5
Summary and Contribution
......................... 119
6
Decentralised Identity Assessment
121
6.1
Rationale
................................... 123
6.1.1
Motivation and Goals
......................... 123
6.1.2
Existing Solutions for Identity Assertion in Real-Time Communi¬
cations
................................. 124
6.2
Adapting a Web-of-Trust Model to Decentralised
Real-Time
Communica¬
tions Identity Assertion
........................, , . . 125
6.2.1
Assumptions and Definitions
..................... 126
6.2.2
Real-time Derivation and Verification of Certificate Chains
.... 129
6.2.3
A Scheme for Decentralised Identity Assertion in Real-Time Com¬
munications
.............................. 131
6.2.4
Applying the Scheme to P2PSIP Networks
............. 135
6.2.5
Trade-offs for Higher Degrees of Decentralisation
........., 138
6.2.6
Simplifications when Using Self-Certifying SIP-URIs
........ 141
6.3
Evaluation and Analysis
........................... 142
6.3.1
Prototype Implementation
...................... 142
6.3.2
Quantitative Analysis of Decentralisation Trade-offs
........ 146
6.3.3
Limitations of the Proposed Approach
............... 150
6.4
Related Work
................................. 152
viii
6.4.1
SPIT Prevention Mechanisms
.................... 152
6.4.2
Web-of-Trust Research
........................ 153
6.4.3
Progress with Respect to State of the Art
............. 154
6.5
Summary and Contribution
......................... 154
7
Lawful Interception in P2PSIP
157
7.1
Introduction to Lawful Interception
..................... 159
7.1.1
Terminology and Reference Model for IP Networks
........ 159
7.1.2
Lawful Interception of Multimedia Communications in Server-based
Systems
................................ 161
7.2
Challenges for Lawful Interception in P2PSIP Systems
.......... 163
7.2.1
Lack of a Central Entity for Interception
.............. 163
7.2.2
РгР-Ііспгіііщ
............................. 164
7.2.3
Dynamic Nature of P2P Systems
.................. 165
7.2.4
P2P Nodes are not Trustworthy
................... 166
7.3
Potential Solutions
.............................. 168
7.3.1
Footprint in Devices
......................... 168
7.3.2
Intercepting at IP-Layer
....................... 169
7.3.3
Infiltrating the Peer-to-Peer Network
................ 170
7.4
Summary and Contribution
......................... 172
8
Proof-of-Concept Prototype of Security-Enhanced P2PSIP System
173
8.1
Design and Implementation
......................... 174
8.1.1
Design Considerations and Requirements
.............. 174
8.1.2
Implementation
............................ 176
8.2
Security Techniques Evaluated
....................... . 177
8.3
Experiments and Results
........................... 181
8.3.1
Experimental Setup
.......................... 182
8.3.2
Results
................................. 184
8.4
Discussion and Summary
........................... 186
9
Conclusion
189
9.1
Discussion and Assessment of Contributions
............... . 189
9.1.1
Main Contributions in Summary
.................. 189
9.1.2
Revisiting Initial Objectives and Research Questions
...... . 192
9.2
Open Issues and Future Work
........................ 194
Bibliography
195
A Previously Published and Related Publications
223
A.I Peer-reviewed Publications in Scientific Conferences or Journals
..... 223
A.2 Other Pre-published Publications
..................... . 226
В
Implementation and Experiment Details
227
B.I Algorithms for Increased Lookup Availability: Detailed Simulation Results
227
B.I.I Experimental Setup
......................... . 227
B.I.
2
Additional and Detailed Results
................... 227
ix
В.
2
Web-of-Trust Prototype Implementation and Experiment Details
..... 241
B.3 Implementations Details of P2PSIP Security Prototype and Detailed Re¬
sults of Emulation Experiments
....................... 241
B.3.1 Experimental Setup
.......................... 241
B.3.
2
Additional and Detailed Results
................... 241
χ
|
any_adam_object | 1 |
author | Seedorf, Jan |
author_facet | Seedorf, Jan |
author_role | aut |
author_sort | Seedorf, Jan |
author_variant | j s js |
building | Verbundindex |
bvnumber | BV041536967 |
classification_rvk | ST 200 |
collection | ebook |
ctrlnum | (OCoLC)867179356 (DE-599)BVBBV041536967 |
discipline | Informatik |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01844nam a2200397 c 4500</leader><controlfield tag="001">BV041536967</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140115 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">131220s2013 d||| m||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)867179356</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041536967</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1102</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Seedorf, Jan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security for decentralised service location</subfield><subfield code="b">exemplified with real-time communication session establishment</subfield><subfield code="c">Jan Seedorf</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 248 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">Passau, Univ., Diss., 2013</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verteilte Hash-Tabelle</subfield><subfield code="0">(DE-588)1046384872</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Peer-to-Peer-Netz</subfield><subfield code="0">(DE-588)4343110-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Peer-to-Peer-Netz</subfield><subfield code="0">(DE-588)4343110-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Verteilte Hash-Tabelle</subfield><subfield code="0">(DE-588)1046384872</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">urn:nbn:de:bvb:739-opus-27147</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">http://www.opus-bayern.de/uni-passau/volltexte/2013/2714/</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://nbn-resolving.org/urn:nbn:de:bvb:739-opus-27147</subfield><subfield code="x">Resolving-System</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026982809&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026982809</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV041536967 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:57:58Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026982809 |
oclc_num | 867179356 |
open_access_boolean | 1 |
owner | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 |
owner_facet | DE-384 DE-473 DE-BY-UBG DE-703 DE-1051 DE-824 DE-29 DE-12 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1049 DE-92 DE-739 DE-898 DE-BY-UBR DE-355 DE-BY-UBR DE-706 DE-20 DE-1102 |
physical | X, 248 S. graph. Darst. |
psigel | ebook |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
record_format | marc |
spelling | Seedorf, Jan Verfasser aut Security for decentralised service location exemplified with real-time communication session establishment Jan Seedorf 2013 X, 248 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Passau, Univ., Diss., 2013 Verteilte Hash-Tabelle (DE-588)1046384872 gnd rswk-swf Peer-to-Peer-Netz (DE-588)4343110-0 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Peer-to-Peer-Netz (DE-588)4343110-0 s Verteilte Hash-Tabelle (DE-588)1046384872 s DE-604 Erscheint auch als Online-Ausgabe urn:nbn:de:bvb:739-opus-27147 http://www.opus-bayern.de/uni-passau/volltexte/2013/2714/ kostenfrei Volltext https://nbn-resolving.org/urn:nbn:de:bvb:739-opus-27147 Resolving-System Volltext Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026982809&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Seedorf, Jan Security for decentralised service location exemplified with real-time communication session establishment Verteilte Hash-Tabelle (DE-588)1046384872 gnd Peer-to-Peer-Netz (DE-588)4343110-0 gnd |
subject_GND | (DE-588)1046384872 (DE-588)4343110-0 (DE-588)4113937-9 |
title | Security for decentralised service location exemplified with real-time communication session establishment |
title_auth | Security for decentralised service location exemplified with real-time communication session establishment |
title_exact_search | Security for decentralised service location exemplified with real-time communication session establishment |
title_full | Security for decentralised service location exemplified with real-time communication session establishment Jan Seedorf |
title_fullStr | Security for decentralised service location exemplified with real-time communication session establishment Jan Seedorf |
title_full_unstemmed | Security for decentralised service location exemplified with real-time communication session establishment Jan Seedorf |
title_short | Security for decentralised service location |
title_sort | security for decentralised service location exemplified with real time communication session establishment |
title_sub | exemplified with real-time communication session establishment |
topic | Verteilte Hash-Tabelle (DE-588)1046384872 gnd Peer-to-Peer-Netz (DE-588)4343110-0 gnd |
topic_facet | Verteilte Hash-Tabelle Peer-to-Peer-Netz Hochschulschrift |
url | http://www.opus-bayern.de/uni-passau/volltexte/2013/2714/ https://nbn-resolving.org/urn:nbn:de:bvb:739-opus-27147 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026982809&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT seedorfjan securityfordecentralisedservicelocationexemplifiedwithrealtimecommunicationsessionestablishment |