2nd International IEEE Conference on Communication System Software and Middleware

Research Article

Implementation of an Instant Messaging System with Focus on Protection of User Presence

  • @INPROCEEDINGS{10.1109/COMSWA.2007.382413,
        author={Karsten Loesing and Maximilian  Roglinger and Christian  Wilms and Guido Wirtz},
        title={Implementation of an Instant Messaging System with Focus on Protection of User Presence},
        proceedings={2nd International IEEE Conference on Communication System Software and Middleware},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2007},
        month={7},
        keywords={Communication networks  Cryptographic protocols  Cryptography  Java  Mobile communication  Network servers  Privacy  Protection  Telephony  Tellurium},
        doi={10.1109/COMSWA.2007.382413}
    }
    
  • Karsten Loesing
    Maximilian Roglinger
    Christian Wilms
    Guido Wirtz
    Year: 2007
    Implementation of an Instant Messaging System with Focus on Protection of User Presence
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2007.382413
Karsten Loesing1,*, Maximilian Roglinger2, Christian Wilms2, Guido Wirtz2,*
  • 1: University of Bamberg, Distributed and Mobile Systems Group Feldkirchenstr. 21, 96047 Bamberg, GERMANY
  • 2: University of Bamberg Distributed and Mobile Systems Group Feldkirchenstr. 21, 96047 Bamberg, GERMANY
*Contact email: karsten.loesing@wiai.uni-bamberg.de, guido.wirtz@wiai.uni-bamberg.de

Abstract

Instant messaging (IM) systems provide its users with the information of which of their contacts are currently online. This presence information supplements text communication of IM systems and is an additional value compared to other synchronous communication media. Unauthorized users could illegally generate online logs of users by exploiting their presence information. Public IM systems lack the reliable means to protect user presence and force the user to trust in the central registry server. In this paper, we propose an IM system, which is explicitly designed to protect user presence without the need of a trusted central registry. We present a Java implementation based on the anonymous communication network Tor [1], the cryptographic suite Bouncy Castle [2], and the distributed hash table OpenDHT [3].