Survey of secure anonymous peer to peer Instant Messaging protocols

@article{Alkhulaiwi2016SurveyOS,
  title={Survey of secure anonymous peer to peer Instant Messaging protocols},
  author={Rakan Alkhulaiwi and Abdulhakim Sabur and Khalid Aldughayem and Osama Almanna},
  journal={2016 14th Annual Conference on Privacy, Security and Trust (PST)},
  year={2016},
  pages={294-300}
}
Secure end-to-end communication has become a necessity for many people. In this research paper we survey the most popular and widely used secure anonymous Instant Messaging (IM) services and protocols, study them from a security and anonymity point of view, and investigate how these services or protocols could be compromised. 
Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems
TLDR
The comparison results of the proposed scheme with other schemes and the results of an experiment show that it is a comprehensive secure scheme with high security and good practicability. Expand

References

SHOWING 1-10 OF 37 REFERENCES
Improved group off-the-record messaging
TLDR
This work proposes an improved group OTR (GOTR) protocol that provides unconditional repudiability, and shows how to obtain data origin authentication given this level of repudiability. Expand
Secure off-the-record messaging
TLDR
A security analysis of OTR is presented showing that, while the overall concept of the system is valid and attractive, the protocol suffers from security shortcomings due to the use of an insecure key-exchange protocol and other problematic design choices. Expand
Off-the-record communication, or, why not to use PGP
TLDR
This paper presents a protocol for secure online communication, called "off-the-record messaging", which has properties better-suited for casual conversation than do systems like PGP or S/MIME. Expand
Kerberos: an authentication service for computer networks
TLDR
The authors concentrate on authentication for real-time, interactive services that are offered on computer networks, which includes remote login, file system reads and writes, and information retrieval for applications like Mosaic. Expand
Anonymous connections and onion routing
TLDR
Anonymous connections and their implementation using onion routing are described and several application proxies for onion routing, as well as configurations of onion routing networks are described. Expand
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
TLDR
A peer-to-peer distributed hash table with provable consistency and performance in a fault-prone environment is described using a novel XOR-based metric topology that simplifies the algorithm and facilitates the proof. Expand
Remote timing attacks are practical
TLDR
This work devise a timing attack against OpenSSL that can extract private keys from an OpenSSL-based web server running on a machine in the local network. Expand
Peer-to-peer systems
Within a decade, P2P has proven to be a technology that enables innovative new services and is used by millions of people every day.
The Security Impact of a New Cryptographic Library
This paper introduces a new cryptographic library, NaCl, and explains how the design and implementation of the library avoid various types of cryptographic disasters suffered by previousExpand
Handbook of Peer-to-Peer Networking
TLDR
This handbook addresses current issues as well as emerging concepts and applications, including P2P architectures, search and queries, incentive mechanism, multimedia streaming, service- oriented architectures, collaboration to share non-storage resources, mobile P1P, theory and analysis, and P2p databases. Expand
...
1
2
3
4
...