期刊文献+

基于P2PSIP的移动实时流媒体系统的安全架构

Security architecture of mobile P2PSIP based live streaming system
下载PDF
导出
摘要 在分析移动实时流媒体应用对P2P环境提出的安全性方面挑战的基础上,提出了基于P2PSIP的移动实时流媒体系统MPSLSS的安全架构。针对MPSLSS系统的可管控性设计了一种分层混合式P2P网络架构,并采用STRIDE模型举例分析了MPSLSS系统面临的安全威胁,在此基础上提出了一种适用于移动实时流媒体应用的系统安全架构,并对其进行了分析。 Based on the analysis of the security challenges for P2P environments presented by mobile real-time streaming application, a P2PSIP-based mobile live streaming system(MPSLSS) is presented as well as a hybrid layered P2P network architecture is designed aiming at the controllability and manageability of MPSLSS.The security threats faced by MPSLSS are illustrated and analyzed using STRIDE threats modeling.A security architecture suitable for mobile real-time streaming application is presented and analyzed.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第23期5332-5336,共5页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2008AA01A315)
关键词 对等会话初始化协议 移动实时流媒体系统 资源定位和发现 STRIDE威胁建模 P2P系统可管控性 P2PSIP mobile real-time streaming systems RELOAD STRIDE threats modeling controllability and manageability of P2P systems
  • 相关文献

参考文献18

  • 1Rosenberg J,Schulzrinne H.SIP: session initiation protocol[EB/ OL].http://www.ietf.org/rfc/rfc3261 .txt,2002.
  • 2Miguel Castro,Peter Druschel,Ayalvadi Ganesh,et al.Secure routing for structured peer-to-peer overlay networks [C]. Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 2002:299-314.
  • 3Dimitris Geneiakis,Tasos Dagiuldas.Survey of security vulnerabilities in SIP[J].IEEE Communications Surveys and Tutorials, 2006,8(3):68-81.
  • 4Overcoming the challenge of security in a mobile environment [C].IEEE International Conference on Performance,Computing, and C ommunications,2006:66-72.
  • 5Singh K, Schulzrinne H. Peer-to-peer intemet telephony using SIP[C]. Proceedings of the international workshop on Network and operating systems support for digital audio and video,2005: 63 -68.
  • 6Ji Y, Zhang C,Li L,et al.Architecture design of P2PSIP system [J].Intemational Journal of Distributed Sensor Networks,2009,5 (1):85.
  • 7Jennings C,Lowekamp B,Rescorla E,et al.Resource location and discovery (RELOAD)[EB/OL]. http://www.p2psip.org/draits/ draft-ietf-p2psip- reload-00.txt,2008.
  • 8Handley M,Jacobson V.SDP: Session description protocol[EB/ OL].http://www.ietf.org/rfc/rfc2327.txt, 1998.
  • 9Andreasen F, Baugher M,Wing D.Session description protocol (SDP) security descriptions for media streams[EB/OL], http:// tools.ietf.org/html/rfe4568,2006.
  • 10Arkko J,Carrara E, Lindholm F, et aI.MIKEY: Multimedia internet keying [EB/OL]. http://www.rfc-editor.org/rfc/rfc3830.txt,.2004.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部