SSMS - A secure SMS messaging protocol for the m-payment systems

@article{Toorani2008SSMSA,
  title={SSMS - A secure SMS messaging protocol for the m-payment systems},
  author={Mohsen Toorani and Asghar Beheshti},
  journal={2008 IEEE Symposium on Computers and Communications},
  year={2008},
  pages={700-705}
}
  • M. Toorani, A. Beheshti
  • Published 6 July 2008
  • Computer Science
  • 2008 IEEE Symposium on Computers and Communications
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The short message service (SMS) is one of its superior and well-tried services with a global availability in the GSM networks. The main contribution of this paper is to introduce a new secure application layer protocol, called SSMS, to efficiently embed the desired security attributes in the SMS messages to be used as a secure bearer in the m-payment systems. SSMS efficiently embeds the… 

Figures from this paper

A secure approach for SMS in GSM network
TLDR
A proposed approach, based on encryption and digital signature efficiently embeds the confidentiality, integrity, authentication, and non-repudiation in the SMS messages.
SECURE SYSTEM OF SHORT MESSAGE SERVICE (SMS) FOR GSM NETWORKS
TLDR
The proposed system provides the end toend security in any SMS message outgoing or incoming to the Subscriber Identity Module (SIM).
An Extensible Framework for Efficient Secure SMS
TLDR
SEESMS (Secure Extensible and Efficient SMS), a software framework written in Java which allows two peers to exchange encrypted and digitally signed SMS messages, and an experimental analysis was conducted to determine which combination of cryptosystems and security parameters were able to provide a better trade-off in terms of speed/security and energy consumption.
An encryption protocol for end-to-end secure transmission of SMS
  • Minta Thomas, V. Panchami
  • Computer Science
    2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]
  • 2015
TLDR
An efficient encryption protocol for securely transmitting the confidential SMS from one mobile user to other which serves the cryptographic goals like confidentiality, authentication and integrity to the messages is explained.
An Extension To Securedsms: A Protocol For Sms Security
TLDR
This paper proposes a secure application called ‘Secret SMS’ which can be used in military organizations and is completely based on SecuredSMS protocol and acts as an efficient way for secure communication between warfighters and command center and also between military officials.
Secure end-to-end SMS communication over GSM networks
  • Saad Islam, I. Haq, Amna Saeed
  • Computer Science
    2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST)
  • 2015
TLDR
The objectives of this research includes end-to-end confidentiality, authentication, message integrity and non-repudiation of SMS, and the proposed scheme uses symmetric key and identity based techniques for encryption and key management.
Development of a Secure SMS Application using Advanced Encryption Standard (AES) on Android Platform
TLDR
This android app will allow the user to encrypt and decrypt the SMS (Short Message Service) efficiently and just at one click, and AES (Advanced Encryption Standards) algorithm is the considered impregnable even to super computers brute force attacks.
Secured mobile messaging
  • R. Chavan, M. Sabnees
  • Computer Science
    2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET)
  • 2012
TLDR
The papers describe solution that provides SMS security that guarantees provision of confidentiality, authentication, and integrity service and provide hybrid compression encryption technique to secure the SMS data.
Design and Implementation of Secure SMS Messaging System
TLDR
This paper proposes a secure SMS protocol (SSP) at application layer and design the format of the secure message packet, and designs and implementation the secure SMS messaging system.
EasySMS: A Protocol for End-to-End Secure Transmission of SMS
TLDR
The analysis of the proposed protocol shows that this protocol is able to prevent various attacks, including SMS disclosure, over the air modification, replay attack, man-in-the-middle attack, and impersonation attack.
...
...

References

SHOWING 1-10 OF 22 REFERENCES
SafeSMS - End-to-end encryption for SMS messages
TLDR
This paper demonstrates how to send, receive, and store text messages securely with a mobile phone without any additional hard- ware and shows how to authenticate the sender of a message and how to ensure that the message has not been tampered with.
SafeSMS - end-to-end encryption for SMS
  • M. Hassinen
  • Computer Science
    Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.
  • 2005
TLDR
This paper will show how to send, receive, and store text messages securely with a mobile phone without any additional hardware, and how to authenticate the sender of a message andHow to ensure that the message has not been tampered with.
Strong mobile authentication
TLDR
A protocol that provides strong mobile authentication with non-repudiation using SMS messages and a protocol for mobile payment for vending machines, which contains several enhancements in security, usability and cost both from the client as well as from the service provider point of view.
Java based Public Key Infrastructure for SMS Messaging
  • M. Hassinen
  • Computer Science
    2006 2nd International Conference on Information & Communication Technologies
  • 2006
TLDR
An implementation of a public key cryptosystem for short messages in a mobile phone network that provides confidentiality, integrity and non-repudiation of SMS messages, which makes it possible to use SMS messaging in mobile commerce.
HMQV: A High-Performance Secure Diffie-Hellman Protocol
TLDR
HMQV is presented, a carefully designed variant of MQV that provides the same superb performance and functionality of the original protocol but for which all the MqV's security goals can be formally proved to hold in the random oracle model under the computational Diffie-Hellman assumption.
Guide to Elliptic Curve Cryptography
TLDR
This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
J2ME end-to-end security for M-commerce
  • W. Itani, A. Kayssi
  • Computer Science
    2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003.
  • 2003
TLDR
The proposed solution uses pure Java components to provide end-to-end client authentication and data confidentiality between wireless J2ME based clients and J2EE based servers.
The Elliptic Curve Digital Signature Algorithm (ECDSA)
TLDR
The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
m-order - payment model via SMS within the m-banking
  • B. Dukic, M. Katic
  • Computer Science
    27th International Conference on Information Technology Interfaces, 2005.
  • 2005
TLDR
Considering the fact that SMS is the simplest and most widely accepted service of digital data exchange, it is necessary to develop the model of mobile payment system, based on the potential of this particular service.
Notice of Violation of IEEE Publication PrinciplesGSM Security Issues and Challenges
  • S.M. Siddique, M. Amir
  • Computer Science
    Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06)
  • 2006
TLDR
This paper primarily reviews the security solutions implemented in this area for further applications and presents the terminology, operation including principals and features of the current GSM security system.
...
...