Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2019, IJCSMC
Communication has been a major factor in human’s everyday life. The advancement of information technology changed the method of online transactions. No one uses SMSs that frequently to pass messages from one to another because of the arrival of the free data services and cheap data packs from the ISPs. But SMS still plays a very vital role in our day to day lives and its theft is increasing concerns to secure it. No airline or bank or subscription services send their transaction details through any web appl ication but through SMS. SMS plays an important role in online transactions .With the increasing use of SMS for communication and information exchange, care should be taken when sensitive information is transmitted using SMS. Users should be aware that SMS messages might be subject to interception. Solutions such as encrypted SMS should be considered if there is a need to send sensitive information via SMS. The messages are encrypted by strong cryptographic algorithms. The encrypted message received by the customer decrypt the message by authentication. This is only known to user. It uses RSA algorithm for secure keys and AES algorithm to secure message. Authentication is implemented by using pattern lock. This system provide secure and reliable communication environment.
2015
Security assurance in any telecommunication lines is a necessity. It is everyone's desire to maintain secrecy of any information sent thru both unsecured and secured telecommunication lines. Short Message Service (SMS) has turned into an extension and has been an important part in the life of its user. Payment, mobile banking, important reminders such as stocks and news alerts, traffic updates, weather information and business related information are being catered thru SMS. Problems of privacy and imitations are the core issues dealt in the study. In order to prolong the secrecy of any information, an implementation of an improved cryptology scheme was designed. The study used a cascaded encryption process designed for sending SMS thru any communication line. The strength of the algorithm using the framework focused on designing a secured encryption process and adapting AES (Advance Encryption Standard) encryption with two more encryption layers. It discussed impact of the frame...
2016
Asymmetric algorithm like Diffie-Hellman can be used to encrypt the SMS message in M-commerce or mobile banking system. Password key exchange protocol based on Diffie-Hellman key exchange algorithm allows users to exchange a secret key that can be used in message encryption. The security of this protocol can be increased by using the MAC (message authentication code) or hash function with the encryption. These functions act as an error detecting code or checksum. This paper throws a light on the comparative analysis of both the authentication functions separately in password key exchange protocol. By analyzing some of the security issues viz. (i) brute force attach and (ii) cryptanalysis, it can be very well shown that the MAC function is more secure than hash.
… Conference on Machine …, 2009
In this paper, we describe a system for securing SMS messages during and after its transmission over mobile network. The system can also be used for protecting personal data for users who desire to keep their confidential data stored on their mobile phones. The system has been implemented employing the AES encryption algorithm and using symmetric-key encryption. The system has been tested using various devices. The testing and validation of the system is also reported.
IJCA, Published by Foundation of Computer Science, New York, USA, 2012
Asymmetric algorithm like Diffie-Hellman can be used to encrypt the SMS message in M-commerce or mobile banking system. Password key exchange protocol based on Diffie-Hellman key exchange algorithm allows users to exchange a secret key that can be used in message encryption. The security of this protocol can be increased by using the MAC (message authentication code) or hash function with the encryption. These functions act as an error detecting code or checksum. This paper throws a light on the comparative analysis of both the authentication functions separately in password key exchange protocol. By analyzing some of the security issues viz. (i) brute force attach and (ii) cryptanalysis, it can be very well shown that the MAC function is more secure than hash.
The Short Message Service (SMS) is one of the frequently used mobile services with universal availability in all GSM networks. The current SMS hasnít achieved secure transmission of plaintext between different mobile phone devices. SMS doesnít have its own build-in mechanism to secure the transmitted data because security isnít considered as a priority application for mobile devices. Many SMS security schemes have been proposed by the researchers. This survey presents the existing schemes used to secure SMS message communication. State of the art SMS security solutions for mobile devices is presented from the period 2006-2013. Literature research of those security schemes is conducted and presented in this survey. The effect of each security scheme on mobile device's performance is also observed. Finally, a general summary of all security schemes with their limitations is presented.
2012
Nowadays, security of SMS is a crucial aspect because it plays an important role in value added services and mobile commerce. Asymmetric algorithm like Diffie-Hellman can be used to encrypt the SMS message in M-commerce or mobile banking system. We use authentication functions to maintain the integrity of data. Password key exchange protocol based on Diffie-Hellman algorithm generates a secret shared key which can be used in message encryption and in MAC function. MAC (message authentication code) or hash functions are used maintain the integrity of message and can be used with the encryption. These functions also act as an error detecting code or checksum. This paper discusses the comparative analysis of both the authentication functions separately for password key exchange protocol by analyzing some of the security issues. The discussion of this paper concludes that MAC functions are more secure than hash function, but having greater complexity and take more to execute. So, it's better to use hash function for maintaining the integrity of message over a network where the transmitted amount of message is very small (SMS). Here, digital signature is generated with RSA to show the functionality of MD5 and SHA1, which prevents SMS from message modification and non-repudiation attack.
IAEME PUBLICATION, 2014
Short Message Service (SMS) has become common in many of our daily life applications. Sometimes SMS is used to send confidential information like password, passcode, banking details etc. But in traditional SMS service, information content is transmitted as plain text which is not at all secure. It’s because when SMS is transmitted as plain text without using any encryption mechanisms it is easily subjected to many attacks. In this paper, we propose a protocol called SecuredSMS which make use of the symmetric key shared between the end users thus providing secure and safe communication between two users. The analysis of this protocol shows that it is highly secure as it is able to prevent the information content from various attacks like replay attack, man-in-the-middle attack, over the air modification and impersonation attack. SecuredSMS can be activated in the phone using PIN number. It also provides a way for remote destruction and remote locking in the case if the phone is stolen or lost.
Jurnal Informatika Universitas Pamulang, 2018
SMS (Short Message Service) is used because it is cheap, easily accessible and a popular method to sent information by a text message using a mobile phone. However, the original SMS application on android phones are have no security features. A message sent is still in plain text form so easily be intercepted without unknown by the sender or the recipient. Therefore, proposed encryption algorithm RSA (Rivest Shamir Adleman) and Caesar Cipher to secure a text message sent. The results showed that the application can prevents the contents of SMS to intercepted or viewed by unauthorized people because the message that is sent is not in plain text, but the message has been encrypted (cipher text).
2014
Billions of text messages are sent daily through GSM networks sent in plain text format which makes them susceptible to various attacks. With the increasing number of software crackers available for free in the internet, studies have shown SMS continues to suffer from several security vulnerabilities and loopholes. The aim of this project was to develop a secure messaging platform for Java enabled phones to securely send encrypted short messages via the GSM network.. The application was developed in MDIP 2.0 and CDLC 1.1configurations and applied symmetric encryption concepts. The experimental results revealed that the mobile application was able to encrypt, decrypt, send and receive text messages without adding changing the size of the packets .
2012
The Short Message Service (SMS) is one of very popular kind of superior and well-tried services with a global availability in GSM networks. This paper deals with an SMS security for mobile communication. The transmission of an SMS in GSM network is not secure; therefore it is desirable to secure SMS by additional encryption. A proposed approach, based on encryption and digital signature efficiently embeds the confidentiality, integrity, authentication, and non-repudiation in the SMS messages. In the next part, there is the description of design and implementation of the application, which encrypts SMS by DES, Triple DES, AES and Blowfish algorithms and finally signs SMS by DSA or RSA algorithm respectively. At the end, we described attacks on secured SMS and future extension of the application.
The rapid development of communication technology, on the one hand, is bringing many technological conveniences with it and simplifying our lives. On the other hand, it has disadvantages on hiding the information that is continuously roaming through various communication media resources between senders and receivers and on not sharing them with third people. The aim of eliminating these disadvantages via specific security methods and algorithms is related to the discipline called cryptography, which includes information security. In this study, how RSA encryption algorithm and the secure messaging process on the SMS channel are realized in the devices with the Android operating system is examined thanks to the developed application. The advantages and the disadvantages of the application are demonstrated. The solution proposals are presented. The application is tested with different key sizes for fast and powerful messaging. The different key sizes which can be used for key generati...
2015
Short message service (SMS) is most important communication medium in many daily life applications, including healthcare monitoring, mobile banking, mobile commerce, and so on. when a SMS send an from one mobile phone(MS) to another MS (Mobile subscriber), the information contained in the SMS transmit as plain text. Sometimes this information may be confidential like account numbers, passwords, license numbers, and so on, and it is a major drawback to send such information through SMS while the traditional SMS service does not provide encryption to the information before its transmission, However telecom service providers are ensuring at server end some security provided as Using A3,A8 and Kc algorithms, but not providing during the message transformation .In this paper, we propose an efficient and secure protocol called User End secure SMS along with integrity key check, which provides end-to-end secure communication through SMS between end users. The working of the protocol is pre...
Journal of Telecommunications System & Management, 2016
Today data communication is a modern technology that contains a powerful computer processor to exchange information. But brute force attacks are made to break the encryption techniques and these attacks are the main drawbacks of older algorithms. This paper is concerned with the development of a secure messaging system based on cryptographic algorithms that is which is more faster, better immune to attacks, more complex, easy to encrypt and many more advanced security feature included. This project work is designed and developed for a secure messaging both in web and android platforms. The application is well featured and provides encryption/decryption that can protect message from unauthorized access and disclosure over networks. To send message, a recipient or registered user types and encrypts a text message using keyword mono-alphabetic substitution algorithm with a key, selected from key list. The encrypted message is stored in the database and receiver's inbox with serial number of key (not the value). The receiver, after log into his/her own account, selects the key value and then decrypts the encrypted message with the key to see the original message. With compared to other messaging systems, the proposed secure messaging system can be used for chat, messaging, video conferencing and real time file sharing in both web and android platforms.
The SMS based Mobile communications require high security in the network. Information as well as SMS security is important and challenging part for mobile communication. Some ethical hackers or attackers access the illegally sensitive data or messages. For solve this important issue and problems. Many users' uses the various algorithm and techniques for provide security to data and SMS in communication networks. Some users use encryption as well as decryption algorithms. Many people's implement own algorithm for SMS or data security in the communication network. The algorithms like AES, DES, Triple DES used by many authors for encrypt or decrypt SMS for communication. In the Wireless communication network for reducing processing time i.e. encryption or decryption time, developers uses various available algorithms. New algorithms implemented using AODV Protocols in wireless communication networks. In this paper we have propose the survey of SMS encryption as well as decryption techniques, algorithms, models use in communication network and security. The concept of Server key secure and Sender key secure messaging for SMS security.
2017
Nowadays, short message service (SMS) is being used in many daily life applications, including healthcare monitoring, mobile banking, mobile commerce, and so on. But when we send an SMS from one mobile phone to another, the information contained in the SMS transmit as plain text. Sometimes this information may be confidential like account numbers, passwords, license numbers, and so on. In this paper, presented an efficient and secure technique called secure SMS. The working of the protocol is presented by considering the asymmetric key cryptography . The analysis of the proposed technique shows that this protocol is able to prevent various attacks, including SMS disclosure, over the air modification, replay attack, man-in-the middle attack, and impersonation attack
Proceedings of SAICSIT, 2004
Short Message Service (SMS) has grown in popularity over the years and it has become a common way of communication. SMS is usually used to transport unclassified information, but with the rise of mobile commerce it has become a popular tool for transmitting sensitive information between the business and its clients. By default SMS does not guarantee confidentiality and integrity to the message content. Therefore SMS is not totally secure and reliable. This affects the Wireless Messaging API (WMA)-an optional package for Java 2 Micro Edition that enables SMS messaging on Java-enabled cellular phones. This paper proposes a protocol that can be used to secure a SMS connection between a WMA client and SMS-based server.
International Journal of Engineering Research and Advanced Technology (IJERAT), 2019
Nowadays, SMS or messaging is a very common way of communication. So, it differs from the apps and instant messaging available but SMS is still one of the broad communication methods as it does not require internet connection and sending inexpensive, fast and modest SMS messages. When confidential information is replaced by SMS, it is difficult to protect information from secure SMS and ensure that the message is sent only by approved senders. This research reviews and describes several methods used to encrypt SMS massage on android based on the encryption algorithm and compare these methods.
The development of telecommunications technology is so rapid has given such great benefits. With the telecommunication technology, distance and time no longer be a significant obstacle. One of the results of telecommunications technology that is well known is the Short Message Service. In this study developed an application on the mobile phone to modify the SMS message into ciphertext so that the information content of the SMS is not known by others. SMS delivery system for encrypting messages into ciphertext using a key that is entered by the sender then sends to the destination number. SMS reception system to decrypt it to others via SMS without the fear of information from these messages will be known by others. The method used in the system encrypt and decrypt the message is the algorithm Tiny Encryption Algorithm and implemented using the Java programming language. JDK 1.7 as the Java programming language ciphertext into plaintext using the key entered by the receiver and displays the original message to the recipient. This application can be used by someone who wants to send a confidential information and the Java compiler. Eclipse, a Java SDK and the Android SDK as a Java source code editor.
In the past few years a new generation of mobile messaging systems have been developed in conjunction with the explosive growth in the use of smart phones. As this technology enabling for accessing Internet based services, the new-generation the messaging applications was directed to play the role of traditional text messaging(SMS). Such applications require only the user’s phone number for registration. Unfortunately, these appl1icationsdo not provide a built-in support for any security feature. Sometime, the basic security features (e.g., authentication and confidentiality between the communicators) must be ensured in messaging service. In addition to that, most of the modern communications via internet takes place "through the air"; therefore the risk of interception becomes greater than in case of wired networks. If the message is not encrypted, or encrypted using a weak algorithm, the attacker can get it and may make hard harm. This paper presents a security solution to ensure confidentiality and authentication of exchanged messages, the users of proposed system can communicate exclusively via web server and by using a dedicated android application. The exchanged messages are encrypted using stream cipher RC4 with a personalP2P dynamic encryption key.
This paper presents a security solution to ensure confidentiality and authentication of exchanged messages, the users of proposed system can communicate exclusively via web server and by using a dedicated android application. The exchanged messages are encrypted using stream cipher RC4 with a personalP2P dynamic encryption key.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.