SlideShare a Scribd company logo
1 of 5
Download to read offline
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
37
SECUREDSMS: A PROTOCOL FOR SMS SECURITY
Deepthi Sucheendran, Asst Prof. Arun R, Dr. S.Sasidhar Babu, Prof. P.Jayakumar
Final Year M.Tech (Cyber Security), Department of Computer Science & Engineering, SNGCE, Kerala, India
ABSTRACT
Short Message Service (SMS) has become common in many of our daily life applications. Sometimes SMS is
used to send confidential information like password, passcode, banking details etc. But in traditional SMS service,
information content is transmitted as plain text which is not at all secure. It’s because when SMS is transmitted as plain
text without using any encryption mechanisms it is easily subjected to many attacks. In this paper, we propose a protocol
called SecuredSMS which make use of the symmetric key shared between the end users thus providing secure and safe
communication between two users. The analysis of this protocol shows that it is highly secure as it is able to prevent the
information content from various attacks like replay attack, man-in-the-middle attack, over the air modification and
impersonation attack. SecuredSMS can be activated in the phone using PIN number. It also provides a way for remote
destruction and remote locking in the case if the phone is stolen or lost.
Keywords: Authentication, Cryptography, Security, SMS, Symmetric Key.
1. INTRODUCTION
Short Message Service (SMS) has become one of the major means for communication. SMS service was first
started on December 3, 1992. Even after 21 years, the use of SMS is still increasing. SMS is widely used for many
applications which play a major role in daily life. Many Banks are now using SMS service as a means for communication
with its customers. Also SMS is used as a means of communication in Transportation Information System [1],
SMSAssassin [2], SMS-based web search such as SMSFind [3], private health facilities using SMS [4] and many more.
Even though SMS is widely used in many applications, the traditional SMS service has got many drawbacks. The
major problem lies in the transmission of information content as no encryption mechanisms are provided before
transmission. In traditional SMS service, SMS is sent as plain text which makes it vulnerable to many attacks. Also over
the air (OTA) traffic between the Mobile Station (MS) and the Base Transceiver Station (BTS) is encrypted by a weak
stream cipher (A5/1 or A5/2). An attacker can easily compromise these algorithms. Thus the SMS contents are not at all
secured. It is prone to various attacks like SMS disclosure [5], man-in-the-middle attack [6], replay attack [7] and
impersonation attack [8].
The above attacks can be efficiently avoided using SecuredSMS protocol which makes use of a symmetric key
for secure transmission of information between users. It also provides a way for Remote destruction and Remote locking
[10]. The key idea of this protocol is from EasySMS [9] protocol.
1.1 Organization
This paper contains 4 sections. Section 2 contains the literature review of previous work that had provided
security to SMS. Section 3 presents the proposed protocol SecuredSMS, which provides security for the information
content in the SMS. Section 4 summarizes the work.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 12, December (2014), pp. 37-41
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
38
2. RELATED WORKS
Previously different authors have described different techniques to provide security to the information content in
SMS. An application called SafeSMS was developed in [11] which was used to provide confidentiality, authentication and
integrity in SMS. It used a symmetric algorithm along with a shared secret password to generate the key used for
encryption. An application layer framework called SSMS was developed in [12]. It used elliptic curve-based public key
which uses public keys to provide secret key establishment and was used to provide security to SMS messaging in m-
payment applications. Another framework known as Secure Extensible and Efficient SMS (SEESMS) introduced in [13]
uses public key cryptography for exchanging information between two peers. Shared key is generated for each session in
[14] and [12]. But the major drawback with all the above frameworks are due to the huge overhead they cause which make
them unsuitable for real world applications. PK-SIM [10] and SMSSec [15] are the protocols which provide security
without changing the existing cellular networks architecture. SMSSec is a two phase protocol in which first handshake
uses asymmetric cryptography which occurs only once and uses symmetric cryptography in the second phase. This
protocol is used to provide security for SMS communications sent by Java’s Wireless Messaging API. PK-SIM protocol
uses PKI functionality by proposing a standard SIM card.
Our mobile phone has got many physical limitations. Therefore a protocol which makes use of minimum
computing resources is preferable. But all the above frameworks increase the overall overhead. The proposed protocol
SecuredSMS provide security without changing the existing architecture of cellular networks and also make use of
minimum resources.
3. SECUREDSMS: THE PROPOSED PROTOCOL
This section focuses on the proposed method and architecture of the proposed protocol. Table 1 shows
definition of various symbols used in this paper and their sizes. Table 2 represents various functions used in this paper
with their functions.
3.1 The Proposed Method
A new protocol SecuredSMS is proposed here which provide security for the information content in the SMS. It
provides security for the SMS sent between two mobile users. SecuredSMS has a different protocol structure than
EasySMS [9]. A client server architecture is used here to provide better security. SecuredSMS protocol gets activated in
the mobile phones after entering the corresponding PIN number. This provides additional security. SecuredSMS has got
an additional functionality called Remote destruction and Remote locking. This feature is very useful when mobile
phones are lost or stolen. This functionality can be triggered with the help of a special SMS message. Suppose the mobile
phone with the SecuredSMS functionality is stolen, the user can ask for the help of the Mobile Operator to send a ‘remote
destruction’ SMS message to the mobile phone which destroys the SecuredSMS protocol and its cryptographic
functionalities permanently. In case of a damage or Mobile Operator change, the user can ask the Mobile Operator to
send a ‘remote locking’ SMS message to the mobile phone which lock all the SecuredSMS functionality temporarily.
This can be unlocked later.
Table 1: Abbreviations and Symbols
Table 2: Definition of Functions used
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
39
3.2 Design of SecuredSMS Protocol
In this section, we propose the new protocol named SecuredSMS to provide security the SMS. Two different
scenarios are described here. First scenario is shown in Fig. 1. Here both the mobile users, i.e. both the MS are under the
same Authentication Server (AS). The second scenario is shown in Fig. 2 where both MS are under different AS, which
means both MS belong to different Home Location Register (HLR). The AS is responsible for the storage of all the
symmetric keys shared between the AS and the respective MS. Information related to all the mobile users are stored in
Certified Authority (CA). SIM card gets activated only after the verification of the identity of the mobile user by CA. Each
AS and CA also share a symmetric key to provide information is transmitted between AS and CA.
Scenario 1 : Here both the mobile users (MS) belong to the same AS. This is shown in Fig.1. Here there are two phases.
Fig.1: SecuredSMS Scenario 1: (a) Phase 1 (b) Phase 2
Phase 1: Phase 1 has got a different protocol structure compared to EasySMS. Here it is client server architecture. MS1
represents the mobile user who wants to communicate with another mobile user (MS2). (1). MS1 sends a message to the
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
40
AS which includes the identity of MS1 (IMS1), identity of the mobile user with whom MS1 wants to communicate (IMS2),
International Mobile Subscriber Identity of MS1(IDMS1), a request number ReqNo, a timestamp T1 and a message
authentication code MAC1 = f1SK1(IDMS1||ReqNo). The key shared between MS1 and AS is SK1. (2). On receiving the
message from MS1, AS now knows that MS1 wants to communicate with MS2. AS computes MAC1’ =
f1SK1(IDMS1||ReqNo) and checks whether MAC1’ and MAC1 are same. If the condition satisfies then AS sends a
message to MS2 containing IMS1, IDMS1, T2, MAC1, ReqNo. (3). Now MS2 knows that MS1 wish to communicate with
it. So MS2 sends it’s IDMS2 along with T2 and MAC2 all together encrypted with SK_MS2. SK_MS2 is the symmetric
key shared between AS and MS2.
AS should now confirm the validity of both IDMS1 and IDMS2.(4) For that it sends a message to CA/RA
containing IDMS1, IDMS2, along with a timestamp T3, all encrypted with a symmetric key shared between AS and
CA/RA. (5). CA/RA now checks the validity of both the users and sends a message to AS along with T3. (6). On receiving
the message from CA/RA ,if AS finds that entities are valid then it generates a new timestamp T4, an expiry time for
MS1(ExpT) , a delegate key DK1= f2SK1(T4||ReqNo) and a new message authentication code MAC3 =
f1SK1(T4||ExpT||ReqNo). AS then sends T4, MAC3 and ExpT to MS1. Suppose if AS finds that any of the entities are
invalid then it terminates the connection. (7). On receiving the message from AS, MS1 computes
MAC3’=f1SK1(T4||ExpT||ReqNo) and checks it with the received MAC3. If both are same then MS1 generates DK1.
MS1 then sends T4 and ReqNo to AS encrypted with DK1. (8) AS compares the values of T4 and ReqNo with the values
stored in it. MS1 is authenticated by AS in this way. AS then sends a message to MS2 containing a new timestamp T5,
along with ReqNo, ExpT and the symmetric key DK1, all encrypted with SK_MS2. (9). On receiving message from AS,
MS2 sends an acknowledgment to AS. (10). MS2 also sends a message to MS1 containing ReqNo encrypted with DK1.
On receiving this MS1 checks the value of ReqNo. Also MS1 now knows that MS2 has got the symmetric key DK1.
Phase 2: This phase is same as the phase 2 of EasySMS. After phase1, both MS1 and MS2 has got the symmetric key
DK1. They can now securely transmit the information using this key using a suitable cryptographic algorithm within the
time period ExpT. (1). MS1 sends a message to MS2 containing IDMS1 and a timestamp Ti encrypted with DK1. (2).
MS2 checks whether Ti<=ExpT. If the condition is satisfied then MS2 sends an acknowledgment to MS1 containing the
same received timestamp Ti encrypted with DK1. (3) Now both MS can securely transmit their information. Once the
session gets expired then MS1 needs to send a fresh request to MS2 and phase 1 should be carried out again.
Scenario 2: Here both the mobile users are far away, which means both the MS belong to different AS. Here there are two
phases.
Fig.2: SecuredSMS Scenario 2: (a) Phase 1 (b) Phase 2
Phase 1: (1). This message is same as that of step 1 of scenario 1. This is send by MS1 to its authentication server AS1.
Here SK1 is the symmetric key that is shared between AS1 and MS1. (2). AS1 computes MAC1’ =
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
41
f1SK1(IDMS1||ReqNo) and checks whether MAC1 and MAC1’ are the same. AS1 then sends a message to the
authentication server of MS2 (AS2). This message includes IMS1, IMS2, IDMS1 and ReqNo. (3). AS2 sends a message to
MS2 which includes IMS1, ReqNo, T2 and MAC1. (4). On receiving this message MS2 now understands that MS1 wants to
communicate with it. So MS2 sends a message back to AS2 containing IDMS2, T2 and MAC2 after encrypting all with
SK_MS2. SK_MS2 is the symmetric key shared between AS2 and MS2. (5). AS computes MAC2’ as in scenario 1 and
checks whether MAC2=?MAC2’. In order to verify the validity of both the mobile users, AS2 sends a message to CA/RA
containing IDMS1, IDMS2, T3, all encrypted with the symmetric key SK_AS-CA that is shared between AS2 and
CA/RA. (6). CA/RA now check the validity and reply back to AS2 along with the received timestamp T3 encrypted with
SK_AS-CA (7). If AS2 finds that any of the entities are invalid then the connection is terminated. If all entities are valid
then it informs this to AS1 by simply sending the ReqNo encrypted with SK_AS1-AS2, which is the symmetric key shared
between AS1 and AS2. (8). AS1 now generates a new timestamp T4, ExpT, MAC3 and a delegate key DK1 which is
generated from SK1 with the help of a function f2 and MAC3. MAC3= f1SK1(T4||ExpT||ReqNo) and DK1=
f2SK1(T4||ReqNo). AS1 then sends a message to MS1 containing T4, ExpT, MAC3. (9). MS1 checks whether
MAC3=?MAC3’ as in scenario 1. It then generates DK1 and sends T4 and ReqNo encrypted with DK1 to AS1. (10). AS1
then sends (ReqNo, ExpT, DK1) to AS2 encrypted with SK_AS1-AS2. (11). AS2 now sends a message to MS2 including
(T5, ReqNo ExpT, DK1) using SK_MS2. (12). MS2 has now got the symmetric key DK1. It sends a reply to AS2 by
sending encrypted T5. (13). This step is same as step 10 in scenario 1.
Phase 2: This phase is same as phase 2 described in scenario 1.
4. CONCLUSION
The new protocol SecuredSMS has been designed. This protocol provides security for the information content
that is sent during SMS. It protects SMS from various attacks. The protocol can be activated using a PIN number. It makes
use of a symmetric key which is shared between the end users for secure transmission. A functionality called remote
locking and remote destruction is introduced which is very helpful if the phone is lost or stolen. SecuredSMS was designed
in such a way that it causes lesser computation and communication overhead.
REFERENCES
[1] R. E. Anderson et al., “Experiences with a transportation information system that uses only GPS and SMS,” in
Proc. IEEE ICTD, no.4, Dec.
[2] D. Risi and M. Teófilo, “MobileDeck: Turning SMS into a rich user experience,” in Proc. 6th MobiSys, no. 33,
2009.
[3] K. Yadav, “SMSAssassin: Crowd sourcing driven mobile-based system for SMS spam filtering,” in Proc.
Workshop Hot mobile, 2011, pp. 1–6.
[4] J. Chen, L. Subramanian, and E. Brewer, “SMS-based web search for low-end mobile devices,” in Proc. 16th
MobiCom, 2010, pp. 125–135.
[5] K. Park, G. I. Ma, J. H. Yi, Y. Cho, S. Cho, and S. Park, “Smartphone remote lock and wipe system with
integrity checking of SMS notification,” in Proc. IEEE ICCE, Jan. 2011, pp. 263–264.
[6] A. Nehra, R. Meena, D. Sohu, and O. P. Rishi, “A robust approach to prevent software piracy,” in Proc. SCES,
2012, pp. 1–3.
[7] N. Gligoric, T. Dimcic, D. Drajic, S. Krco, and N. Chu, “Application layer security mechanism for M2M
communication over SMS,” in Proc.20th TELFOR, 2012, pp. 5–8.
[8] S. Gupta, S. Sengupta, M. Bhattacharyya, S. Chattrejee, and B. S. Sharma, “Cellular phone based web
authentication system using 3-D encryption technique under stochastic framework,” in Proc. AH- ICI, 2009,
pp. 1–5.
[9] Neetesh Saxena and Narendra S. Chaudhari, “EasySMS: A Protocol for End-to-End Secure Transmission of
SMS,” IEEE Transactions On Information Forensics And Security, Vol. 9, No. 7, July 2014.
[10] H. Rongyu, Z. Guolei, C. Chaowen, X. Hui, Q. Xi, and Q. Zheng, “A PK-SIM card based end-to-end security
framework for SMS,” Comput. Standard Interf., vol. 31, no. 4, pp. 629–641, 2009.
[11] M. Hassinen, SafeSMS — end-to-end encryption for SMS messages, Proceedings of the 8th International
Conference onTelecommunications, 2, June 15 -17, 2005.
[12] M. Toorani and A. Shirazi, “SSMS—A secure SMS messaging protocol for the m-payment systems,” in Proc.
IEEE ISCC, Jul. 2008, pp. 700–705.
[13] A. De Santis, A. Castiglione, G. Cattaneo, M. Cembalo, F. Petagna, and U. F. Petrillo, “An extensible
framework for efficient secure SMS,” in Proc. Int. Conf. CISIS, 2010, pp. 843–850.
[14] S. Wu and C. Tan,“A high security framework for SMS,” in Proc. 2n
Int. Conf. BMEI, 2009, pp.1–6.
[15] J. L.-C. Lo, J. Bishop, and J. H. P. Eloff, “SMSSec: An end-to-end protocol for secure SMS,” Comput. Security,
vol. 27, nos. 5–6, pp. 154–167, 2008.

More Related Content

What's hot

Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
 
Designing a logical security framework
Designing a logical security frameworkDesigning a logical security framework
Designing a logical security frameworkijsc
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...IJECEIAES
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentIRJET Journal
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
 
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITYAN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITYcsandit
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES ijwscjournal
 
Improved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryptionImproved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryptionConference Papers
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerTELKOMNIKA JOURNAL
 
An analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networksAn analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networkscsandit
 

What's hot (16)

Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...Automated diagnosis of attacks in internet of things using machine learning a...
Automated diagnosis of attacks in internet of things using machine learning a...
 
Designing a logical security framework
Designing a logical security frameworkDesigning a logical security framework
Designing a logical security framework
 
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
 
Mobile based social encyclopedia
Mobile based social encyclopediaMobile based social encyclopedia
Mobile based social encyclopedia
 
Z041106163167
Z041106163167Z041106163167
Z041106163167
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
Efficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed NetworkEfficient and Secure Single Sign on Mechanism for Distributed Network
Efficient and Secure Single Sign on Mechanism for Distributed Network
 
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITYAN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
ASDF WSS 2014 Paper 003
ASDF WSS 2014 Paper 003ASDF WSS 2014 Paper 003
ASDF WSS 2014 Paper 003
 
Improved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryptionImproved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryption
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
An analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networksAn analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networks
 

Viewers also liked

comparison of the analgesic efficacy of medium-frequency alternating current ...
comparison of the analgesic efficacy of medium-frequency alternating current ...comparison of the analgesic efficacy of medium-frequency alternating current ...
comparison of the analgesic efficacy of medium-frequency alternating current ...ACN
 
Whom should we perform intaruterine insemination?
Whom should we perform intaruterine insemination?Whom should we perform intaruterine insemination?
Whom should we perform intaruterine insemination?Tevfik Yoldemir
 
animales y demás
animales y demásanimales y demás
animales y demásfierrojhon
 
Differenciált foglalkozásterv cseh barbara
Differenciált  foglalkozásterv cseh barbaraDifferenciált  foglalkozásterv cseh barbara
Differenciált foglalkozásterv cseh barbaracsehbarbara
 
Davsky Digest december 2014
Davsky Digest december 2014Davsky Digest december 2014
Davsky Digest december 2014Irina Davydenko
 
Power evaluation of adiabatic logic circuits in 45 nm technology
Power evaluation of adiabatic logic circuits in 45 nm technologyPower evaluation of adiabatic logic circuits in 45 nm technology
Power evaluation of adiabatic logic circuits in 45 nm technologyIAEME Publication
 
B5 t5 if_else_for_while
B5 t5 if_else_for_whileB5 t5 if_else_for_while
B5 t5 if_else_for_whileAsiya Petrova
 
05,06/25 EPSKO-PURANSKI BRAHMANIZAM - tečaj: INDIJSKE RELIGIJE I FILOZOFSKI S...
05,06/25 EPSKO-PURANSKI BRAHMANIZAM - tečaj: INDIJSKE RELIGIJE I FILOZOFSKI S...05,06/25 EPSKO-PURANSKI BRAHMANIZAM - tečaj: INDIJSKE RELIGIJE I FILOZOFSKI S...
05,06/25 EPSKO-PURANSKI BRAHMANIZAM - tečaj: INDIJSKE RELIGIJE I FILOZOFSKI S...Iolar
 
Hardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoHardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoIAEME Publication
 
Four switch three phase brushless dc motor drive for hybrid vehicles
Four switch three phase brushless dc motor drive for hybrid vehiclesFour switch three phase brushless dc motor drive for hybrid vehicles
Four switch three phase brushless dc motor drive for hybrid vehiclesIAEME Publication
 
Transformerless three level diode clamped inverter for single phase grid conn...
Transformerless three level diode clamped inverter for single phase grid conn...Transformerless three level diode clamped inverter for single phase grid conn...
Transformerless three level diode clamped inverter for single phase grid conn...IAEME Publication
 

Viewers also liked (16)

comparison of the analgesic efficacy of medium-frequency alternating current ...
comparison of the analgesic efficacy of medium-frequency alternating current ...comparison of the analgesic efficacy of medium-frequency alternating current ...
comparison of the analgesic efficacy of medium-frequency alternating current ...
 
Whom should we perform intaruterine insemination?
Whom should we perform intaruterine insemination?Whom should we perform intaruterine insemination?
Whom should we perform intaruterine insemination?
 
animales y demás
animales y demásanimales y demás
animales y demás
 
Differenciált foglalkozásterv cseh barbara
Differenciált  foglalkozásterv cseh barbaraDifferenciált  foglalkozásterv cseh barbara
Differenciált foglalkozásterv cseh barbara
 
Європейські механізми просування прав пацієнтів в Україні
Європейські механізми просування прав пацієнтів в УкраїніЄвропейські механізми просування прав пацієнтів в Україні
Європейські механізми просування прав пацієнтів в Україні
 
Davsky Digest december 2014
Davsky Digest december 2014Davsky Digest december 2014
Davsky Digest december 2014
 
B4 t4 include_files
B4 t4 include_filesB4 t4 include_files
B4 t4 include_files
 
Power evaluation of adiabatic logic circuits in 45 nm technology
Power evaluation of adiabatic logic circuits in 45 nm technologyPower evaluation of adiabatic logic circuits in 45 nm technology
Power evaluation of adiabatic logic circuits in 45 nm technology
 
Hasil pengamatan termokimia
Hasil pengamatan termokimiaHasil pengamatan termokimia
Hasil pengamatan termokimia
 
B5 t5 if_else_for_while
B5 t5 if_else_for_whileB5 t5 if_else_for_while
B5 t5 if_else_for_while
 
05,06/25 EPSKO-PURANSKI BRAHMANIZAM - tečaj: INDIJSKE RELIGIJE I FILOZOFSKI S...
05,06/25 EPSKO-PURANSKI BRAHMANIZAM - tečaj: INDIJSKE RELIGIJE I FILOZOFSKI S...05,06/25 EPSKO-PURANSKI BRAHMANIZAM - tečaj: INDIJSKE RELIGIJE I FILOZOFSKI S...
05,06/25 EPSKO-PURANSKI BRAHMANIZAM - tečaj: INDIJSKE RELIGIJE I FILOZOFSKI S...
 
Minano nihongo 1
Minano nihongo 1Minano nihongo 1
Minano nihongo 1
 
Hardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked videoHardware implementation of 3 d dct compressed and digitally watermarked video
Hardware implementation of 3 d dct compressed and digitally watermarked video
 
Four switch three phase brushless dc motor drive for hybrid vehicles
Four switch three phase brushless dc motor drive for hybrid vehiclesFour switch three phase brushless dc motor drive for hybrid vehicles
Four switch three phase brushless dc motor drive for hybrid vehicles
 
Transformerless three level diode clamped inverter for single phase grid conn...
Transformerless three level diode clamped inverter for single phase grid conn...Transformerless three level diode clamped inverter for single phase grid conn...
Transformerless three level diode clamped inverter for single phase grid conn...
 
Reflection Paper
Reflection PaperReflection Paper
Reflection Paper
 

Similar to Securedsms a protocol for sms security

A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingIRJET Journal
 
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look  Up Table And Dynamic ...Cryptography On Android Message Application Using Look  Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...IOSR Journals
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSCSCJournals
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperMousselmal Tarik
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA  Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA ijsc
 
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...ijngnjournal
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...IOSR Journals
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open networkeSAT Publishing House
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networksAlexander Decker
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networksAlexander Decker
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMIJNSA Journal
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmIAEME Publication
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Alexander Decker
 
Securing Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating SystemSecuring Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating SystemUniversitas Pembangunan Panca Budi
 
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTSA REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTSIJNSA Journal
 
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTSA REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTSIJNSA Journal
 
Seps aka a secure evolved packet system authentication and key agreement sch...
Seps aka  a secure evolved packet system authentication and key agreement sch...Seps aka  a secure evolved packet system authentication and key agreement sch...
Seps aka a secure evolved packet system authentication and key agreement sch...csandit
 
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...cscpconf
 
A Security Approach for Wireless Sensor Network in Agriculture Industry
A Security Approach for Wireless Sensor Network in Agriculture IndustryA Security Approach for Wireless Sensor Network in Agriculture Industry
A Security Approach for Wireless Sensor Network in Agriculture Industrydrboon
 

Similar to Securedsms a protocol for sms security (20)

A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS Banking
 
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMSLITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
LITERATURE SURVEY: PEER TO PEER TRANSMISSION OF PASSWORD THROUGH SECURE SMS
 
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look  Up Table And Dynamic ...Cryptography On Android Message Application Using Look  Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
 
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMSHybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMS
 
Bhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone PaperBhusa09 Miller Fuzzing Phone Paper
Bhusa09 Miller Fuzzing Phone Paper
 
Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA  Designing A Logical Security Framework for E-Commerce System Based on SOA
Designing A Logical Security Framework for E-Commerce System Based on SOA
 
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
Design of Transparent Distributed IMS Network: Security Challenges Risk and S...
 
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
Third-Party Emergency Alert Systems over Cellular Text Messaging Services Pro...
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open network
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
 
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISMEVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
EVALUATION OF SECURITY ATTACKS ON UMTS AUTHENTICATION MECHANISM
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
 
Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)Multilayer security mechanism in computer networks (2)
Multilayer security mechanism in computer networks (2)
 
Securing Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating SystemSecuring Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating System
 
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTSA REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
 
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTSA REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
A REVIEW OF SELECTED PROPOSALS FOR IMPROVING IDENTITY PRIVACY IN UMTS
 
Seps aka a secure evolved packet system authentication and key agreement sch...
Seps aka  a secure evolved packet system authentication and key agreement sch...Seps aka  a secure evolved packet system authentication and key agreement sch...
Seps aka a secure evolved packet system authentication and key agreement sch...
 
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCH...
 
A Security Approach for Wireless Sensor Network in Agriculture Industry
A Security Approach for Wireless Sensor Network in Agriculture IndustryA Security Approach for Wireless Sensor Network in Agriculture Industry
A Security Approach for Wireless Sensor Network in Agriculture Industry
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Securedsms a protocol for sms security

  • 1. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 37 SECUREDSMS: A PROTOCOL FOR SMS SECURITY Deepthi Sucheendran, Asst Prof. Arun R, Dr. S.Sasidhar Babu, Prof. P.Jayakumar Final Year M.Tech (Cyber Security), Department of Computer Science & Engineering, SNGCE, Kerala, India ABSTRACT Short Message Service (SMS) has become common in many of our daily life applications. Sometimes SMS is used to send confidential information like password, passcode, banking details etc. But in traditional SMS service, information content is transmitted as plain text which is not at all secure. It’s because when SMS is transmitted as plain text without using any encryption mechanisms it is easily subjected to many attacks. In this paper, we propose a protocol called SecuredSMS which make use of the symmetric key shared between the end users thus providing secure and safe communication between two users. The analysis of this protocol shows that it is highly secure as it is able to prevent the information content from various attacks like replay attack, man-in-the-middle attack, over the air modification and impersonation attack. SecuredSMS can be activated in the phone using PIN number. It also provides a way for remote destruction and remote locking in the case if the phone is stolen or lost. Keywords: Authentication, Cryptography, Security, SMS, Symmetric Key. 1. INTRODUCTION Short Message Service (SMS) has become one of the major means for communication. SMS service was first started on December 3, 1992. Even after 21 years, the use of SMS is still increasing. SMS is widely used for many applications which play a major role in daily life. Many Banks are now using SMS service as a means for communication with its customers. Also SMS is used as a means of communication in Transportation Information System [1], SMSAssassin [2], SMS-based web search such as SMSFind [3], private health facilities using SMS [4] and many more. Even though SMS is widely used in many applications, the traditional SMS service has got many drawbacks. The major problem lies in the transmission of information content as no encryption mechanisms are provided before transmission. In traditional SMS service, SMS is sent as plain text which makes it vulnerable to many attacks. Also over the air (OTA) traffic between the Mobile Station (MS) and the Base Transceiver Station (BTS) is encrypted by a weak stream cipher (A5/1 or A5/2). An attacker can easily compromise these algorithms. Thus the SMS contents are not at all secured. It is prone to various attacks like SMS disclosure [5], man-in-the-middle attack [6], replay attack [7] and impersonation attack [8]. The above attacks can be efficiently avoided using SecuredSMS protocol which makes use of a symmetric key for secure transmission of information between users. It also provides a way for Remote destruction and Remote locking [10]. The key idea of this protocol is from EasySMS [9] protocol. 1.1 Organization This paper contains 4 sections. Section 2 contains the literature review of previous work that had provided security to SMS. Section 3 presents the proposed protocol SecuredSMS, which provides security for the information content in the SMS. Section 4 summarizes the work. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 12, December (2014), pp. 37-41 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 38 2. RELATED WORKS Previously different authors have described different techniques to provide security to the information content in SMS. An application called SafeSMS was developed in [11] which was used to provide confidentiality, authentication and integrity in SMS. It used a symmetric algorithm along with a shared secret password to generate the key used for encryption. An application layer framework called SSMS was developed in [12]. It used elliptic curve-based public key which uses public keys to provide secret key establishment and was used to provide security to SMS messaging in m- payment applications. Another framework known as Secure Extensible and Efficient SMS (SEESMS) introduced in [13] uses public key cryptography for exchanging information between two peers. Shared key is generated for each session in [14] and [12]. But the major drawback with all the above frameworks are due to the huge overhead they cause which make them unsuitable for real world applications. PK-SIM [10] and SMSSec [15] are the protocols which provide security without changing the existing cellular networks architecture. SMSSec is a two phase protocol in which first handshake uses asymmetric cryptography which occurs only once and uses symmetric cryptography in the second phase. This protocol is used to provide security for SMS communications sent by Java’s Wireless Messaging API. PK-SIM protocol uses PKI functionality by proposing a standard SIM card. Our mobile phone has got many physical limitations. Therefore a protocol which makes use of minimum computing resources is preferable. But all the above frameworks increase the overall overhead. The proposed protocol SecuredSMS provide security without changing the existing architecture of cellular networks and also make use of minimum resources. 3. SECUREDSMS: THE PROPOSED PROTOCOL This section focuses on the proposed method and architecture of the proposed protocol. Table 1 shows definition of various symbols used in this paper and their sizes. Table 2 represents various functions used in this paper with their functions. 3.1 The Proposed Method A new protocol SecuredSMS is proposed here which provide security for the information content in the SMS. It provides security for the SMS sent between two mobile users. SecuredSMS has a different protocol structure than EasySMS [9]. A client server architecture is used here to provide better security. SecuredSMS protocol gets activated in the mobile phones after entering the corresponding PIN number. This provides additional security. SecuredSMS has got an additional functionality called Remote destruction and Remote locking. This feature is very useful when mobile phones are lost or stolen. This functionality can be triggered with the help of a special SMS message. Suppose the mobile phone with the SecuredSMS functionality is stolen, the user can ask for the help of the Mobile Operator to send a ‘remote destruction’ SMS message to the mobile phone which destroys the SecuredSMS protocol and its cryptographic functionalities permanently. In case of a damage or Mobile Operator change, the user can ask the Mobile Operator to send a ‘remote locking’ SMS message to the mobile phone which lock all the SecuredSMS functionality temporarily. This can be unlocked later. Table 1: Abbreviations and Symbols Table 2: Definition of Functions used
  • 3. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 39 3.2 Design of SecuredSMS Protocol In this section, we propose the new protocol named SecuredSMS to provide security the SMS. Two different scenarios are described here. First scenario is shown in Fig. 1. Here both the mobile users, i.e. both the MS are under the same Authentication Server (AS). The second scenario is shown in Fig. 2 where both MS are under different AS, which means both MS belong to different Home Location Register (HLR). The AS is responsible for the storage of all the symmetric keys shared between the AS and the respective MS. Information related to all the mobile users are stored in Certified Authority (CA). SIM card gets activated only after the verification of the identity of the mobile user by CA. Each AS and CA also share a symmetric key to provide information is transmitted between AS and CA. Scenario 1 : Here both the mobile users (MS) belong to the same AS. This is shown in Fig.1. Here there are two phases. Fig.1: SecuredSMS Scenario 1: (a) Phase 1 (b) Phase 2 Phase 1: Phase 1 has got a different protocol structure compared to EasySMS. Here it is client server architecture. MS1 represents the mobile user who wants to communicate with another mobile user (MS2). (1). MS1 sends a message to the
  • 4. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 40 AS which includes the identity of MS1 (IMS1), identity of the mobile user with whom MS1 wants to communicate (IMS2), International Mobile Subscriber Identity of MS1(IDMS1), a request number ReqNo, a timestamp T1 and a message authentication code MAC1 = f1SK1(IDMS1||ReqNo). The key shared between MS1 and AS is SK1. (2). On receiving the message from MS1, AS now knows that MS1 wants to communicate with MS2. AS computes MAC1’ = f1SK1(IDMS1||ReqNo) and checks whether MAC1’ and MAC1 are same. If the condition satisfies then AS sends a message to MS2 containing IMS1, IDMS1, T2, MAC1, ReqNo. (3). Now MS2 knows that MS1 wish to communicate with it. So MS2 sends it’s IDMS2 along with T2 and MAC2 all together encrypted with SK_MS2. SK_MS2 is the symmetric key shared between AS and MS2. AS should now confirm the validity of both IDMS1 and IDMS2.(4) For that it sends a message to CA/RA containing IDMS1, IDMS2, along with a timestamp T3, all encrypted with a symmetric key shared between AS and CA/RA. (5). CA/RA now checks the validity of both the users and sends a message to AS along with T3. (6). On receiving the message from CA/RA ,if AS finds that entities are valid then it generates a new timestamp T4, an expiry time for MS1(ExpT) , a delegate key DK1= f2SK1(T4||ReqNo) and a new message authentication code MAC3 = f1SK1(T4||ExpT||ReqNo). AS then sends T4, MAC3 and ExpT to MS1. Suppose if AS finds that any of the entities are invalid then it terminates the connection. (7). On receiving the message from AS, MS1 computes MAC3’=f1SK1(T4||ExpT||ReqNo) and checks it with the received MAC3. If both are same then MS1 generates DK1. MS1 then sends T4 and ReqNo to AS encrypted with DK1. (8) AS compares the values of T4 and ReqNo with the values stored in it. MS1 is authenticated by AS in this way. AS then sends a message to MS2 containing a new timestamp T5, along with ReqNo, ExpT and the symmetric key DK1, all encrypted with SK_MS2. (9). On receiving message from AS, MS2 sends an acknowledgment to AS. (10). MS2 also sends a message to MS1 containing ReqNo encrypted with DK1. On receiving this MS1 checks the value of ReqNo. Also MS1 now knows that MS2 has got the symmetric key DK1. Phase 2: This phase is same as the phase 2 of EasySMS. After phase1, both MS1 and MS2 has got the symmetric key DK1. They can now securely transmit the information using this key using a suitable cryptographic algorithm within the time period ExpT. (1). MS1 sends a message to MS2 containing IDMS1 and a timestamp Ti encrypted with DK1. (2). MS2 checks whether Ti<=ExpT. If the condition is satisfied then MS2 sends an acknowledgment to MS1 containing the same received timestamp Ti encrypted with DK1. (3) Now both MS can securely transmit their information. Once the session gets expired then MS1 needs to send a fresh request to MS2 and phase 1 should be carried out again. Scenario 2: Here both the mobile users are far away, which means both the MS belong to different AS. Here there are two phases. Fig.2: SecuredSMS Scenario 2: (a) Phase 1 (b) Phase 2 Phase 1: (1). This message is same as that of step 1 of scenario 1. This is send by MS1 to its authentication server AS1. Here SK1 is the symmetric key that is shared between AS1 and MS1. (2). AS1 computes MAC1’ =
  • 5. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 41 f1SK1(IDMS1||ReqNo) and checks whether MAC1 and MAC1’ are the same. AS1 then sends a message to the authentication server of MS2 (AS2). This message includes IMS1, IMS2, IDMS1 and ReqNo. (3). AS2 sends a message to MS2 which includes IMS1, ReqNo, T2 and MAC1. (4). On receiving this message MS2 now understands that MS1 wants to communicate with it. So MS2 sends a message back to AS2 containing IDMS2, T2 and MAC2 after encrypting all with SK_MS2. SK_MS2 is the symmetric key shared between AS2 and MS2. (5). AS computes MAC2’ as in scenario 1 and checks whether MAC2=?MAC2’. In order to verify the validity of both the mobile users, AS2 sends a message to CA/RA containing IDMS1, IDMS2, T3, all encrypted with the symmetric key SK_AS-CA that is shared between AS2 and CA/RA. (6). CA/RA now check the validity and reply back to AS2 along with the received timestamp T3 encrypted with SK_AS-CA (7). If AS2 finds that any of the entities are invalid then the connection is terminated. If all entities are valid then it informs this to AS1 by simply sending the ReqNo encrypted with SK_AS1-AS2, which is the symmetric key shared between AS1 and AS2. (8). AS1 now generates a new timestamp T4, ExpT, MAC3 and a delegate key DK1 which is generated from SK1 with the help of a function f2 and MAC3. MAC3= f1SK1(T4||ExpT||ReqNo) and DK1= f2SK1(T4||ReqNo). AS1 then sends a message to MS1 containing T4, ExpT, MAC3. (9). MS1 checks whether MAC3=?MAC3’ as in scenario 1. It then generates DK1 and sends T4 and ReqNo encrypted with DK1 to AS1. (10). AS1 then sends (ReqNo, ExpT, DK1) to AS2 encrypted with SK_AS1-AS2. (11). AS2 now sends a message to MS2 including (T5, ReqNo ExpT, DK1) using SK_MS2. (12). MS2 has now got the symmetric key DK1. It sends a reply to AS2 by sending encrypted T5. (13). This step is same as step 10 in scenario 1. Phase 2: This phase is same as phase 2 described in scenario 1. 4. CONCLUSION The new protocol SecuredSMS has been designed. This protocol provides security for the information content that is sent during SMS. It protects SMS from various attacks. The protocol can be activated using a PIN number. It makes use of a symmetric key which is shared between the end users for secure transmission. A functionality called remote locking and remote destruction is introduced which is very helpful if the phone is lost or stolen. SecuredSMS was designed in such a way that it causes lesser computation and communication overhead. REFERENCES [1] R. E. Anderson et al., “Experiences with a transportation information system that uses only GPS and SMS,” in Proc. IEEE ICTD, no.4, Dec. [2] D. Risi and M. Teófilo, “MobileDeck: Turning SMS into a rich user experience,” in Proc. 6th MobiSys, no. 33, 2009. [3] K. Yadav, “SMSAssassin: Crowd sourcing driven mobile-based system for SMS spam filtering,” in Proc. Workshop Hot mobile, 2011, pp. 1–6. [4] J. Chen, L. Subramanian, and E. Brewer, “SMS-based web search for low-end mobile devices,” in Proc. 16th MobiCom, 2010, pp. 125–135. [5] K. Park, G. I. Ma, J. H. Yi, Y. Cho, S. Cho, and S. Park, “Smartphone remote lock and wipe system with integrity checking of SMS notification,” in Proc. IEEE ICCE, Jan. 2011, pp. 263–264. [6] A. Nehra, R. Meena, D. Sohu, and O. P. Rishi, “A robust approach to prevent software piracy,” in Proc. SCES, 2012, pp. 1–3. [7] N. Gligoric, T. Dimcic, D. Drajic, S. Krco, and N. Chu, “Application layer security mechanism for M2M communication over SMS,” in Proc.20th TELFOR, 2012, pp. 5–8. [8] S. Gupta, S. Sengupta, M. Bhattacharyya, S. Chattrejee, and B. S. Sharma, “Cellular phone based web authentication system using 3-D encryption technique under stochastic framework,” in Proc. AH- ICI, 2009, pp. 1–5. [9] Neetesh Saxena and Narendra S. Chaudhari, “EasySMS: A Protocol for End-to-End Secure Transmission of SMS,” IEEE Transactions On Information Forensics And Security, Vol. 9, No. 7, July 2014. [10] H. Rongyu, Z. Guolei, C. Chaowen, X. Hui, Q. Xi, and Q. Zheng, “A PK-SIM card based end-to-end security framework for SMS,” Comput. Standard Interf., vol. 31, no. 4, pp. 629–641, 2009. [11] M. Hassinen, SafeSMS — end-to-end encryption for SMS messages, Proceedings of the 8th International Conference onTelecommunications, 2, June 15 -17, 2005. [12] M. Toorani and A. Shirazi, “SSMS—A secure SMS messaging protocol for the m-payment systems,” in Proc. IEEE ISCC, Jul. 2008, pp. 700–705. [13] A. De Santis, A. Castiglione, G. Cattaneo, M. Cembalo, F. Petagna, and U. F. Petrillo, “An extensible framework for efficient secure SMS,” in Proc. Int. Conf. CISIS, 2010, pp. 843–850. [14] S. Wu and C. Tan,“A high security framework for SMS,” in Proc. 2n Int. Conf. BMEI, 2009, pp.1–6. [15] J. L.-C. Lo, J. Bishop, and J. H. P. Eloff, “SMSSec: An end-to-end protocol for secure SMS,” Comput. Security, vol. 27, nos. 5–6, pp. 154–167, 2008.