Android mobile VoIP apps: a survey and examination of their security and privacy

被引:34
作者
Azfar, Abdullah [1 ]
Choo, Kim-Kwang Raymond [1 ]
Liu, Lin [2 ]
机构
[1] Univ S Australia, Informat Assurance Res Grp, Adelaide, SA 5001, Australia
[2] Univ S Australia, Sch Informat Technol & Math Sci, Adelaide, SA 5001, Australia
关键词
Android applications; Voice over Internet Protocol (VoIP); Mobile VoIP (mVoIP) applications; Security and privacy of mobile VoIP apps; ENTROPY;
D O I
10.1007/s10660-015-9208-1
中图分类号
F [经济];
学科分类号
020101 [政治经济学];
摘要
Voice over Internet Protocol (VoIP) has become increasingly popular among individuals and business organisations, with millions of users communicating using VoIP applications (apps) on their smart mobile devices. Since Android is one of the most popular mobile platforms, this research focuses on Android devices. In this paper we survey the research that examines the security and privacy of mVoIP published in English from January 2009 to January 2014. We also examine the ten most popular free mVoIP apps for Android devices, and analyse the communications to determine whether the voice and text communications using these mVoIP apps are encrypted. The results indicate that most of the apps encrypt text communications, but voice communications may not have been encrypted in Fring, ICQ, Tango, Viber, Vonage, WeChat and Yahoo. The findings described in this paper contribute to an in-depth understanding of the potential privacy risks inherent in the communications using these apps, a previously understudied app category. Six potential research topics are also outlined.
引用
收藏
页码:73 / 111
页数:39
相关论文
共 38 条
[1]
[Anonymous], 2013, INFONETICS RES RAISE
[2]
[Anonymous], 2011, P 2011 ACM SIGCOMM C
[3]
[Anonymous], 2013, Washington Post
[4]
[Anonymous], 2009, ADV INFORM SECURITY
[5]
Appelman M., 2011, VIBER COMMUNICATION
[6]
Australian Government Department of Broadband Communications and Digital Economy, 2013, STAT SNAPSH
[7]
Characterising Network Traffic for Skype Forensics [J].
Azab, Ahmad ;
Watters, Paul ;
Layton, Robert .
2012 THIRD CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2012), 2012, :19-27
[8]
A study of ten popular Android mobile VoIP applications: Are the communications encrypted? [J].
Azfar, Abdullah ;
Choo, Kim-Kwang Raymond ;
Liu, Lin .
2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, :4858-4867
[9]
BKAV Internet Security Corporation, 2013, CRIT FLAW VIB ALL FU
[10]
Beyond e-business models: the road to virtual worlds [J].
Cagnina, Maria Rosita ;
Poian, Michele .
ELECTRONIC COMMERCE RESEARCH, 2009, 9 (1-2) :49-75