¬¬¬Instant Messaging Security: A Comprehensive Review of Behavior Patterns, Methodologies, and Security Protocols

Authors

  • Ahmed R. AlMhanawi1 Department of Computer Science, College of Science, Mustansiriyah University, Baghdad, Iraq.
  • Bashar M. Nema Department of Computer Science, College of Science, Mustansiriyah University, Baghdad, Iraq.

DOI:

https://doi.org/10.29304/jqcsm.2024.16.11440

Keywords:

Instant Messaging,, Communication Security, End-to-End Encryption,, Decentralized Authentication, Zero-Knowledge Proof,, Privacy Measures, Behavioral Analysis.

Abstract

          This review presents a comprehensive analysis of contemporary scholarship pertaining to instant messaging (IM) user behavior and security protocols. Through meticulous selection, the authors highlight critical studies that illuminate optimized message consumption strategies and delve into the evolving landscape of IM security models. Focusing on the past four years, the review meticulously dissects cutting-edge advancements in this domain. A significant insight emerges: achieving optimal communication security necessitates the synergistic convergence of three fundamental techniques: end-to-end encryption for data confidentiality, decentralized authentication for independent user verification, and zero-knowledge proof for identity obscurity. The review postulates that the simultaneous integration of these elements within the application architecture is paramount for robust privacy and heightened security in the realm of IM.

Downloads

Download data is not yet available.

References

M. Iturralde. CI: A New Encryption Mechanism for Instant Messaging in Mobile Devices. Procedia Computer Science, Vol. 63,( 2015). P 533 – 535.

I. Makhdoom, M. Abolhasan, and J. Lipman. A comprehensive survey of covert communication techniques, limitations and future challenges. Computers & Security. Vol 120, September 2022.

S. Bojjagania, D.R. Denslin Brabinb, P.V. Venkateswara Rao. PhishPreventer: A Secure Authentication Protocol for Prevention of Phishing Attacks in Mobile Environment with Formal Verification. Procedia Computer Science, 2020 P 171.

I. Sukhodolskiy, S. Zapechnikov. Analysis of Secure Protocols and authentication methods for messaging. Procedia Computer Science, Vol 169, (2020). P407-409.

G. S. Gaba , M. Hedabou , P. Kumar , An Braeken , M. Liyanage and M. Alazab. Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare. Sustainable Cities and Society, (2022). Vol 80.

J. Wei , X. Chen , J. Wang , Willy Susilo and Ilsun You. Towards secure asynchronous messaging with forward secrecy and mutual authentication. Information Sciences Vol 626, (2023). P 114-116.

M. Franco , O. Gaggi , B. Guidi , A. Michienzi and C. E. Palazzi. A decentralised messaging system robust against the unauthorised forwarding of private content. Future Generation Computer Systems. Volume 145, (August 2023) P 211-212..

Kunpeng Liu, Chenfei Wang and Xiaotong Zhou. Decentralizing access control system for data sharing in smart grid. High-Confidence Computing. Volume 3, June (2023).

D. E. Majdoubi , H. E. Bakkali , M. Bensaih and S. Sadki. A Decentralized Trust Establishment Protocol for Smart IoT Systems. Internet of Things. Volume 20, November (2022).

M. T. HAMMI, P. BELLOT and A. SERHROUCHNI. BCTrust: A decentralized authentication blockchain-based mechanism. IEEE Wireless Communications and Networking Conference (WCNC). (2018)

M. Kara, Hisham R.J. Merzeh , M. A. Aydın and H. H. Balık. VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain. Computer Communications. Volume 198, January (2023) Pages 247-249.

X. Yang and Wenjie Li. A zero-knowledge-proof-based digital identity management scheme in blockchain. Computers & Security. Vol 99. (2020).

Christoph P. Florian B. Titilayo D. ، Deborah O. Gröhbiel U, and Ajuwon A. Instant messaging and nursing students' clinical learning experience. Nurse Education Today. May (2018). Vol 64, P 119-121.

Chih-Hung Yuan and Yenchun Jim Wu. Mobile instant messaging or face-to-face? Group interactions in cooperative simulations. Computers in Human Behavior. Vol 113. (2020) P1-9.

K. Paerata. The use of workplace instant messaging since COVID-19. Telematics and Informatics Reports. (2023) Vol 10..

N. S. Ahmad, S. Bahri, A. Fauzi. Does Mobile Instant Messaging (MIM) affect power redistribution? Evidence from a Malaysian school management organization. Social Sciences & Humanities. (2023). P 1-3.

Thomas P., and Hans-Joachim H. An Empirical Survey on how Much Security and Privacy Customers Want in Instant Messengers. The Tenth International Conference on Emerging Security Information, Systems and Technologies. P 89. 2016.

Haibo Yi. Securing instant messaging based on blockchain with machine learning. Safety Science. Volume 120, Pages 6-13, December 2019.

A. Konkin, S. Zapechnikov. Privacy methods and zero-knowledge poof for corporate blockchain. Procedia Computer Science 190, (2021). P 471–472.

R. M. Ali and S. N. Alsaad. Instant messaging security and privacy secure instant messenger design. 3rd International Conference on Sustainable Engineering Techniques ICSET. (2020). P 1-3.

Corina-Elena B., Razvan M. and Emil S. A security analysis comparison between Signal, WhatsApp and Telegram. IACR Cryptology ePrint. January, (2023). P 1-4.

Sabina Szymoniak. Security protocols analysis including various time parameters. Security protocols analysis including various time parameters. Vol 18(2). (2021). p1136–1153.

Downloads

Published

2024-03-30

How to Cite

R. AlMhanawi1, A., & M. Nema, B. (2024). ¬¬¬Instant Messaging Security: A Comprehensive Review of Behavior Patterns, Methodologies, and Security Protocols . Journal of Al-Qadisiyah for Computer Science and Mathematics, 16(1), Comp. 117–123. https://doi.org/10.29304/jqcsm.2024.16.11440

Issue

Section

Computer Articles