Abstract:
Peer-to-peer (P2P) networks use diverse connectivity between participants in networks. P2P networks are useful for many purposes. Sharing content files containing audio, ...Show MoreMetadata
Abstract:
Peer-to-peer (P2P) networks use diverse connectivity between participants in networks. P2P networks are useful for many purposes. Sharing content files containing audio, video, data or anything in digital format is very common, and real-time data, such as telephony traffic, is also passed using P2P technology. Because the P2P communication model differs from that of conventional server and client system, further security threats emerge, which are not applicable to server and client architecture. The Telecommunication Standardization Sector (ITU-T) developed network security Recommendations for P2P telecommunications on behalf of the International Telecommunication Union (ITU). This paper provides general survey of the Recommendations.
Date of Conference: 23-25 March 2009
Date Added to IEEE Xplore: 18 August 2009
Print ISBN:978-1-4244-4327-7
Print ISSN: 1541-0056
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- ITU-T Recommendation ,
- Security Threats ,
- P2P Network ,
- International Telecommunication Union ,
- Access Control ,
- Hash Function ,
- Communication Platforms ,
- Traffic Control ,
- Denial Of Service ,
- Mechanisms In Order ,
- Security Requirements ,
- Physical Network ,
- Security Operations ,
- Unauthorized Access ,
- Multicast ,
- Security Framework ,
- Security Architecture ,
- User Authentication ,
- Malicious Users ,
- Key Exchange ,
- Security Functions ,
- Sybil Attack ,
- Peer-to-peer Communication ,
- Trusted Third Party ,
- Data Integration ,
- Kinds Of Data ,
- Application Server ,
- Distributed Computing ,
- Information Exchange
- Author Keywords
- component ,
- ITU-T ,
- Recommendation ,
- P2P ,
- Security
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- ITU-T Recommendation ,
- Security Threats ,
- P2P Network ,
- International Telecommunication Union ,
- Access Control ,
- Hash Function ,
- Communication Platforms ,
- Traffic Control ,
- Denial Of Service ,
- Mechanisms In Order ,
- Security Requirements ,
- Physical Network ,
- Security Operations ,
- Unauthorized Access ,
- Multicast ,
- Security Framework ,
- Security Architecture ,
- User Authentication ,
- Malicious Users ,
- Key Exchange ,
- Security Functions ,
- Sybil Attack ,
- Peer-to-peer Communication ,
- Trusted Third Party ,
- Data Integration ,
- Kinds Of Data ,
- Application Server ,
- Distributed Computing ,
- Information Exchange
- Author Keywords
- component ,
- ITU-T ,
- Recommendation ,
- P2P ,
- Security