SSMS - A secure SMS messaging protocol for the m-payment systems
@article{Toorani2008SSMSA, title={SSMS - A secure SMS messaging protocol for the m-payment systems}, author={Mohsen Toorani and Asghar Beheshti}, journal={2008 IEEE Symposium on Computers and Communications}, year={2008}, pages={700-705} }
The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The short message service (SMS) is one of its superior and well-tried services with a global availability in the GSM networks. The main contribution of this paper is to introduce a new secure application layer protocol, called SSMS, to efficiently embed the desired security attributes in the SMS messages to be used as a secure bearer in the m-payment systems. SSMS efficiently embeds the…
100 Citations
A secure approach for SMS in GSM network
- Computer ScienceCUBE
- 2012
A proposed approach, based on encryption and digital signature efficiently embeds the confidentiality, integrity, authentication, and non-repudiation in the SMS messages.
SECURE SYSTEM OF SHORT MESSAGE SERVICE (SMS) FOR GSM NETWORKS
- Computer Science
- 2013
The proposed system provides the end toend security in any SMS message outgoing or incoming to the Subscriber Identity Module (SIM).
An Extensible Framework for Efficient Secure SMS
- Computer Science2010 International Conference on Complex, Intelligent and Software Intensive Systems
- 2010
SEESMS (Secure Extensible and Efficient SMS), a software framework written in Java which allows two peers to exchange encrypted and digitally signed SMS messages, and an experimental analysis was conducted to determine which combination of cryptosystems and security parameters were able to provide a better trade-off in terms of speed/security and energy consumption.
An encryption protocol for end-to-end secure transmission of SMS
- Computer Science2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]
- 2015
An efficient encryption protocol for securely transmitting the confidential SMS from one mobile user to other which serves the cryptographic goals like confidentiality, authentication and integrity to the messages is explained.
An Extension To Securedsms: A Protocol For Sms Security
- Computer Science
- 2015
This paper proposes a secure application called ‘Secret SMS’ which can be used in military organizations and is completely based on SecuredSMS protocol and acts as an efficient way for secure communication between warfighters and command center and also between military officials.
Secure end-to-end SMS communication over GSM networks
- Computer Science2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST)
- 2015
The objectives of this research includes end-to-end confidentiality, authentication, message integrity and non-repudiation of SMS, and the proposed scheme uses symmetric key and identity based techniques for encryption and key management.
Development of a Secure SMS Application using Advanced Encryption Standard (AES) on Android Platform
- Computer Science
- 2018
This android app will allow the user to encrypt and decrypt the SMS (Short Message Service) efficiently and just at one click, and AES (Advanced Encryption Standards) algorithm is the considered impregnable even to super computers brute force attacks.
Secured mobile messaging
- Computer Science2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET)
- 2012
The papers describe solution that provides SMS security that guarantees provision of confidentiality, authentication, and integrity service and provide hybrid compression encryption technique to secure the SMS data.
Design and Implementation of Secure SMS Messaging System
- Computer Science
- 2012
This paper proposes a secure SMS protocol (SSP) at application layer and design the format of the secure message packet, and designs and implementation the secure SMS messaging system.
EasySMS: A Protocol for End-to-End Secure Transmission of SMS
- Computer ScienceIEEE Transactions on Information Forensics and Security
- 2014
The analysis of the proposed protocol shows that this protocol is able to prevent various attacks, including SMS disclosure, over the air modification, replay attack, man-in-the-middle attack, and impersonation attack.
References
SHOWING 1-10 OF 22 REFERENCES
SafeSMS - End-to-end encryption for SMS messages
- Computer Science
- 2005
This paper demonstrates how to send, receive, and store text messages securely with a mobile phone without any additional hard- ware and shows how to authenticate the sender of a message and how to ensure that the message has not been tampered with.
SafeSMS - end-to-end encryption for SMS
- Computer ScienceProceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005.
- 2005
This paper will show how to send, receive, and store text messages securely with a mobile phone without any additional hardware, and how to authenticate the sender of a message andHow to ensure that the message has not been tampered with.
Strong mobile authentication
- Computer Science2005 2nd International Symposium on Wireless Communication Systems
- 2005
A protocol that provides strong mobile authentication with non-repudiation using SMS messages and a protocol for mobile payment for vending machines, which contains several enhancements in security, usability and cost both from the client as well as from the service provider point of view.
Java based Public Key Infrastructure for SMS Messaging
- Computer Science2006 2nd International Conference on Information & Communication Technologies
- 2006
An implementation of a public key cryptosystem for short messages in a mobile phone network that provides confidentiality, integrity and non-repudiation of SMS messages, which makes it possible to use SMS messaging in mobile commerce.
HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Computer Science, MathematicsCRYPTO
- 2005
HMQV is presented, a carefully designed variant of MQV that provides the same superb performance and functionality of the original protocol but for which all the MqV's security goals can be formally proved to hold in the random oracle model under the computational Diffie-Hellman assumption.
Guide to Elliptic Curve Cryptography
- Computer ScienceSpringer Professional Computing
- 2004
This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
J2ME end-to-end security for M-commerce
- Computer Science2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003.
- 2003
The proposed solution uses pure Java components to provide end-to-end client authentication and data confidentiality between wireless J2ME based clients and J2EE based servers.
The Elliptic Curve Digital Signature Algorithm (ECDSA)
- Computer Science, MathematicsInternational Journal of Information Security
- 2001
The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
m-order - payment model via SMS within the m-banking
- Computer Science27th International Conference on Information Technology Interfaces, 2005.
- 2005
Considering the fact that SMS is the simplest and most widely accepted service of digital data exchange, it is necessary to develop the model of mobile payment system, based on the potential of this particular service.
Notice of Violation of IEEE Publication PrinciplesGSM Security Issues and Challenges
- Computer ScienceSeventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06)
- 2006
This paper primarily reviews the security solutions implemented in this area for further applications and presents the terminology, operation including principals and features of the current GSM security system.