skip to main content
10.1145/1851600.1851700acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
demonstration

Secure and usable P2P VoIP for mobile devices

Published:07 September 2010Publication History

ABSTRACT

The use of Voice over IP (VoIP) applications involves a number of security threats and usability issues, leading to possible breaches of security and privacy. With the adoption of future peer-to-peer communication systems, the challenges grow even more as we rely on untrusted peers to access the service. We are developing a peer-to-peer VoIP system which features techniques for improving the security and privacy of users in future networks. However, as the threats are seldom well understood, presenting them in a usable manner is problematic. Implemented on a mobile device, the small user interface provides additional challenges for the end user. Via interviews, a questionnaire and usability testing, we seek to improve both the usability of managing and understanding the additional security, as well as the overall user experience of the emerging application.

References

  1. M. S. Ackerman, L. F. Cranor, and J. Reagle. Privacy in e-commerce: examining user scenarios and privacy preferences. In ACM Conference on Electronic Commerce, pages 1--8, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Adams and M. A. Sasse. Users are not the enemy. Commun. ACM, 42(12):40--46, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Balfanz, G. Durfee, R. E. Grinter, and D. Smetters. In search of usable security: Five lessons from the field. IEEE Security and Privacy, 2:19--24, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. J. DeWitt and J. Kuljis. Aligning usability and security: a usability study of polaris. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, pages 1--7, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Heikkila and A. Gurtov. Filtering spam in p2psip communities with web of trust. In Schmidt and Lian {11}, pages 110--121.Google ScholarGoogle Scholar
  6. IETF P2PSIP WG.Google ScholarGoogle Scholar
  7. J. Koskela and S. Tarkoma. Simple peer-to-peer sip privacy. In Schmidt and Lian {11}, pages 226--237.Google ScholarGoogle Scholar
  8. R. Moskowitz and P. Nikander. Host Identity Protocol (HIP) Architecture. RFC 4423 (Informational), May 2006.Google ScholarGoogle Scholar
  9. D. A. Norman. When security gets in the way. Interactions, 17, 2010.Google ScholarGoogle Scholar
  10. J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. In Proceedings of the IEEE, volume 63, pages 1278--1308. IEEE, 1975.Google ScholarGoogle ScholarCross RefCross Ref
  11. A. U. Schmidt and S. Lian, editors. Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, volume 17 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Whitten and J. D. Tygar. Why johnny can't encrypt: A usability evaluation of pgp 5.0. In In Proceedings of the 8th USENIX Security Symposium, Berkeley, CA, USA, 1999. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. K.-P. Yee. User interaction design for secure systems. In In Proceedings of the 4th International Conference on Information and Communications Security, pages 278--290. Springer-Verlag, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure and usable P2P VoIP for mobile devices

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      MobileHCI '10: Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
      September 2010
      552 pages
      ISBN:9781605588353
      DOI:10.1145/1851600
      • General Chairs:
      • Marco de Sá,
      • Luís Carriço,
      • Program Chair:
      • Nuno Correia

      Copyright © 2010 Copyright is held by the author/owner(s)

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 September 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • demonstration

      Acceptance Rates

      MobileHCI '10 Paper Acceptance Rate46of225submissions,20%Overall Acceptance Rate202of906submissions,22%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader