skip to main content
10.1145/1851600.1851700acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
demonstration

Secure and usable P2P VoIP for mobile devices

Published: 07 September 2010 Publication History

Abstract

The use of Voice over IP (VoIP) applications involves a number of security threats and usability issues, leading to possible breaches of security and privacy. With the adoption of future peer-to-peer communication systems, the challenges grow even more as we rely on untrusted peers to access the service. We are developing a peer-to-peer VoIP system which features techniques for improving the security and privacy of users in future networks. However, as the threats are seldom well understood, presenting them in a usable manner is problematic. Implemented on a mobile device, the small user interface provides additional challenges for the end user. Via interviews, a questionnaire and usability testing, we seek to improve both the usability of managing and understanding the additional security, as well as the overall user experience of the emerging application.

References

[1]
M. S. Ackerman, L. F. Cranor, and J. Reagle. Privacy in e-commerce: examining user scenarios and privacy preferences. In ACM Conference on Electronic Commerce, pages 1--8, 1999.
[2]
A. Adams and M. A. Sasse. Users are not the enemy. Commun. ACM, 42(12):40--46, 1999.
[3]
D. Balfanz, G. Durfee, R. E. Grinter, and D. Smetters. In search of usable security: Five lessons from the field. IEEE Security and Privacy, 2:19--24, 2004.
[4]
A. J. DeWitt and J. Kuljis. Aligning usability and security: a usability study of polaris. In SOUPS '06: Proceedings of the second symposium on Usable privacy and security, pages 1--7, New York, NY, USA, 2006. ACM.
[5]
J. Heikkila and A. Gurtov. Filtering spam in p2psip communities with web of trust. In Schmidt and Lian {11}, pages 110--121.
[6]
IETF P2PSIP WG.
[7]
J. Koskela and S. Tarkoma. Simple peer-to-peer sip privacy. In Schmidt and Lian {11}, pages 226--237.
[8]
R. Moskowitz and P. Nikander. Host Identity Protocol (HIP) Architecture. RFC 4423 (Informational), May 2006.
[9]
D. A. Norman. When security gets in the way. Interactions, 17, 2010.
[10]
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. In Proceedings of the IEEE, volume 63, pages 1278--1308. IEEE, 1975.
[11]
A. U. Schmidt and S. Lian, editors. Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, volume 17 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer, 2009.
[12]
A. Whitten and J. D. Tygar. Why johnny can't encrypt: A usability evaluation of pgp 5.0. In In Proceedings of the 8th USENIX Security Symposium, Berkeley, CA, USA, 1999. USENIX Association.
[13]
K.-P. Yee. User interaction design for secure systems. In In Proceedings of the 4th International Conference on Information and Communications Security, pages 278--290. Springer-Verlag, 2003.

Cited By

View all
  • (2018)Usable and Secure P2P VoIP for Mobile UseInternational Journal of Mobile Human Computer Interaction10.4018/ijmhci.20150101027:1(25-41)Online publication date: 16-Dec-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MobileHCI '10: Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
September 2010
552 pages
ISBN:9781605588353
DOI:10.1145/1851600
  • General Chairs:
  • Marco de Sá,
  • Luís Carriço,
  • Program Chair:
  • Nuno Correia

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 September 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. VoIP
  2. peer-to-peer
  3. usable security
  4. user study

Qualifiers

  • Demonstration

Conference

MobileHCI '10

Acceptance Rates

MobileHCI '10 Paper Acceptance Rate 46 of 225 submissions, 20%;
Overall Acceptance Rate 202 of 906 submissions, 22%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Usable and Secure P2P VoIP for Mobile UseInternational Journal of Mobile Human Computer Interaction10.4018/ijmhci.20150101027:1(25-41)Online publication date: 16-Dec-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media