6 research outputs found

    Analysis of relod.net, a basic implementation of the RELOAD protocol for peer-to-peer networks

    Get PDF
    Actas de: XI Jornadas de Ingeniería Telemática (JITEL 2013) celebradas en Granada, 28-30 Octubre 2013. La web del evento es: http://dtstc.ugr.es/jitel2013/#The P2PSIP Working Group is chartered to develop protocols and mechanisms for the use of SIP in distributed environments, thus minimizing the need for centralized servers. Under this premise, the RELOAD protocol was created, whose design was generalized to accept other applications with similar requirements, and which is currently in process of standardization by the IETF. In this paper, we present a basic implementation and an analysis of this protocol proposed standard, given the great interest displayed in recent years by the scientific and business community in issues related to peerto- peer networks. Later, we conduct several experiments in order to validate its correct operation in real scenarios and provide feedback in relation with the current specificationThis research was supported in part by the Comunidad de Madrid grant S-2009/TIC-1468 (MEDIANET project).Publicad

    Desarrollo de una implementación de referencia del protocolo RELOAD

    Get PDF
    El grupo de trabajo P2PSIP se creó para desarrollar protocolos y mecanismos que permitieran el uso de SIP en entornos distribuidos, minimizando así la necesidad de servidores centralizados. Bajo esta premisa nació el protocolo RELOAD, cuyo diseño se ha generalizado para permitir otras aplicaciones con similares exigencias, y que actualmente está en proceso de normalización por el IETF. El objetivo de este Trabajo Fin de Grado es realizar una implementación de referencia de dicho protocolo, debido al gran interés mostrado en los últimos años por la comunidad científica y empresarial en los asuntos relacionados con las redes peer-to-peer. En este proyecto se ha implementado una parte relevante de RELOAD. Para ello, en primer lugar, se ha realizado un diseño orientado a objetos basado en un subconjunto funcional del nuevo estándar RFC 6940 y, posteriormente, se ha llevado a cabo la codificación, poniendo énfasis en la sencillez del código, de manera que la aplicación pueda modificarse y reutilizarse con facilidad. Finalmente, se han realizado y documentado pruebas, cuyo propósito ha sido demostrar el correcto funcionamiento en escenarios reales utilizando una implementación previamente existente de SIP.Ingeniería Telemátic

    Service Discovery Usage for REsource LOcation And Discovery (RELOAD)

    No full text

    The design of efficient and secure P2PSIP systems

    Get PDF
    Doktorgradsavhandling i informasjons- og kommunikasjonsteknologi, Universitetet i Agder, Grimstad, 201

    REsource LOcation And Discovery (RELOAD) Base Protocol

    Full text link

    Security for Decentralised Service Location - Exemplified with Real-Time Communication Session Establishment

    Get PDF
    Decentralised Service Location, i.e. finding an application communication endpoint based on a Distributed Hash Table (DHT), is a fairly new concept. The precise security implications of this approach have not been studied in detail. More importantly, a detailed analysis regarding the applicability of existing security solutions to this concept has not been conducted. In many cases existing client-server approaches to security may not be feasible. In addition, to understand the necessity for such an analysis, it is key to acknowledge that Decentralised Service Location has some unique security requirements compared to other P2P applications such as filesharing or live streaming. This thesis concerns the security challenges for Decentralised Service Location. The goals of our work are on the one hand to precisely understand the security requirements and research challenges for Decentralised Service Location, and on the other hand to develop and evaluate corresponding security mechanisms. The thesis is organised as follows. First, fundamentals are explained and the scope of the thesis is defined. Decentralised Service Location is defined and P2PSIP is explained technically as a prototypical example. Then, a security analysis for P2PSIP is presented. Based on this security analysis, security requirements for Decentralised Service Location and the corresponding research challenges -- i.e. security concerns not suitably mitigated by existing solutions -- are derived. Second, several decentralised solutions are presented and evaluated to tackle the security challenges for Decentralised Service Location. We present decentralised algorithms to enable availability of the DHTs lookup service in the presence of adversary nodes. These algorithms are evaluated via simulation and compared to analytical bounds. Further, a cryptographic approach based on self-certifying identities is illustrated and discussed. This approach enables decentralised integrity protection of location-bindings. Finally, a decentralised approach to assess unknown identities is introduced. The approach is based on a Web-of-Trust model. It is evaluated via prototypical implementation. Finally, the thesis closes with a summary of the main contributions and a discussion of open issues
    corecore