{"id":"https://openalex.org/W4402125270","doi":"https://doi.org/10.1109/blackseacom61746.2024.10646263","title":"Security and Performance Evaluation in Peer- To-Peer VoIP Communication","display_name":"Security and Performance Evaluation in Peer- To-Peer VoIP Communication","publication_year":2024,"publication_date":"2024-06-24","ids":{"openalex":"https://openalex.org/W4402125270","doi":"https://doi.org/10.1109/blackseacom61746.2024.10646263"},"language":"en","primary_location":{"id":"doi:10.1109/blackseacom61746.2024.10646263","is_oa":false,"landing_page_url":"https://doi.org/10.1109/blackseacom61746.2024.10646263","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106930352","display_name":"Gani SANLIOZ","orcid":null},"institutions":[{"id":"https://openalex.org/I4210112471","display_name":"Istanbul University-Cerrahpa\u015fa","ror":"https://ror.org/01dzn5f42","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210112471"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Gani SANLIOZ","raw_affiliation_strings":["Istanbul University-Cerrahpasa,Department of Computer Engineering,Istanbul,Turkey"],"affiliations":[{"raw_affiliation_string":"Istanbul University-Cerrahpasa,Department of Computer Engineering,Istanbul,Turkey","institution_ids":["https://openalex.org/I4210112471"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063083883","display_name":"Mustafa Kara","orcid":"https://orcid.org/0000-0002-7093-0153"},"institutions":[{"id":"https://openalex.org/I99312532","display_name":"Turkish Air Force Academy","ror":"https://ror.org/01psaa030","country_code":"TR","type":"education","lineage":["https://openalex.org/I99312532"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Mustafa Kara","raw_affiliation_strings":["National Defence University,Department of Computer Engineering Air Force Academy,Istanbul,Turkey"],"affiliations":[{"raw_affiliation_string":"National Defence University,Department of Computer Engineering Air Force Academy,Istanbul,Turkey","institution_ids":["https://openalex.org/I99312532"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013726817","display_name":"Muhammed Ali Ayd\u0131n","orcid":"https://orcid.org/0000-0002-1846-6090"},"institutions":[{"id":"https://openalex.org/I4210112471","display_name":"Istanbul University-Cerrahpa\u015fa","ror":"https://ror.org/01dzn5f42","country_code":"TR","type":"education","lineage":["https://openalex.org/I4210112471"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Muhammed Ali Aydin","raw_affiliation_strings":["Istanbul University-Cerrahpasa,Department of Computer Engineering,Istanbul,Turkey"],"affiliations":[{"raw_affiliation_string":"Istanbul University-Cerrahpasa,Department of Computer Engineering,Istanbul,Turkey","institution_ids":["https://openalex.org/I4210112471"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5106930352"],"corresponding_institution_ids":["https://openalex.org/I4210112471"],"apc_list":null,"apc_paid":null,"fwci":1.099,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.78936514,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"340","last_page":"343"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.9000670313835144},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.7646725177764893},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.703886866569519},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5410479307174683},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35655146837234497},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.15739557147026062},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.12119144201278687}],"concepts":[{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.9000670313835144},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.7646725177764893},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.703886866569519},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5410479307174683},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35655146837234497},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15739557147026062},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.12119144201278687}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/blackseacom61746.2024.10646263","is_oa":false,"landing_page_url":"https://doi.org/10.1109/blackseacom61746.2024.10646263","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1520914943","https://openalex.org/W1635678085","https://openalex.org/W1964213561","https://openalex.org/W1979553155","https://openalex.org/W2128624610","https://openalex.org/W2296361021","https://openalex.org/W2399855654","https://openalex.org/W2885919466","https://openalex.org/W2977921325","https://openalex.org/W2998166806","https://openalex.org/W3016687266","https://openalex.org/W3103596740","https://openalex.org/W3184158691","https://openalex.org/W3196223056","https://openalex.org/W4282839237","https://openalex.org/W4302804449","https://openalex.org/W4310041586","https://openalex.org/W4310732159","https://openalex.org/W4386364565","https://openalex.org/W6630810111"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2084179496","https://openalex.org/W2103238357","https://openalex.org/W2741704743","https://openalex.org/W2262810789","https://openalex.org/W2002490650","https://openalex.org/W2322032246","https://openalex.org/W2057688614","https://openalex.org/W2067368164"],"abstract_inverted_index":{"The":[0,56],"impact":[1],"of":[2,17,58,143,200],"virtual":[3],"collaborations":[4],"and":[5,61,83,116,139,160,170,181],"digital":[6],"transformation":[7],"has":[8,38,71],"led":[9],"to":[10,31,33,41,91,114,189],"a":[11,25,43,135,167,194],"significant":[12],"increase":[13],"in":[14,29,48,53,63,67,73,95,127,162],"the":[15,34,51,101,120,141,176,198],"use":[16,42],"V":[18,164],"oIP":[19],"technologies.":[20],"VoIP,":[21],"which":[22],"works":[23],"on":[24,98,103,175],"hierarchical":[26],"client-server":[27],"architecture":[28,45,70],"order":[30],"adapt":[32],"old":[35],"circuit-switched":[36],"technology,":[37],"gradually":[39],"started":[40],"P2P":[44,69,96,104,136,163,201],"over":[46],"time":[47],"parallel":[49],"with":[50],"developments":[52],"this":[54,131,155,191],"architecture.":[55,129],"lack":[57],"\u201cpeer":[59],"admission\u201d":[60],"\u201ccontrol":[62],"call":[64],"flow\u201d":[65],"features":[66],"pure":[68],"resulted":[72],"vulnerabilities":[74,94],"against":[75],"some":[76],"attacks,":[77],"such":[78],"as":[79],"modifying,":[80],"termination,":[81],"eavesdropping,":[82],"SPIT.":[84],"Although":[85],"various":[86],"studies":[87],"have":[88],"been":[89],"conducted":[90,174],"mitigate":[92],"these":[93],"systems":[97],"other":[99],"platforms,":[100],"literature":[102],"VoIP":[105,137],"is":[106,173],"limited.":[107],"Studies":[108],"using":[109],"distributed":[110,148],"blockchains":[111],"were":[112],"limited":[113],"authentication":[115],"could":[117],"not":[118],"eliminate":[119],"system's":[121],"centralization":[122],"by":[123],"keeping":[124],"SIP":[125],"servers":[126],"their":[128],"In":[130],"study,":[132],"we":[133],"proposed":[134],"system":[138],"assessed":[140],"feasibility":[142],"managing":[144],"user":[145],"data":[146],"via":[147],"blockchain":[149,177,183],"technology.":[150],"Our":[151],"findings":[152],"reveals":[153],"that":[154,185],"approach":[156],"can":[157],"enhance":[158],"security":[159,171],"decentralization":[161],"oIP.":[165],"Furthermore,":[166],"thorough":[168],"performance":[169],"evaluation":[172],"type,":[178],"consensus":[179],"algorithm,":[180],"several":[182],"architectures":[184],"will":[186],"be":[187],"used":[188],"manage":[190],"data,":[192],"offering":[193],"promising":[195],"outlook":[196],"for":[197],"future":[199],"VoIP.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
