Skip to main content

Secure SMS Based Automatic Device Pairing Approach for Mobile Phones

  • Conference paper
  • 3056 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7996))

Abstract

Bluetooth is recognized as one of the efficient way of data transmission at short distances wirelessly. Despite the fact that Bluetooth is widely accepted wireless standard for data transmission, there are also some security issues associated with Bluetooth. The pairing of Bluetooth and secure sharing of the Bluetooth pairing key is the challenge faced by the Bluetooth infrastructure today. This paper proposes the use of Out Of Band (OOB) channel for key exchange; hence proposing the use of security strengths of Global System for Mobiles (GSM) to securely communicate the encryption keys between the mobile devices, even if the users are not in the visibility range of each other. Once users accept the request to pair their devices, keys are exchanged between them and are used to set a secure communication channel between the mobile devices. The keys are exchanged via Short Message Service (SMS a service provided by GSM) and are automatically delivered to the Bluetooth pairing procedure by eliminating the need to manually communicate the Keys.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boyko, V., MacKenzie, P.D., Patel, S.: Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 156–171. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  2. Alfred, K., Rahim, S., Gene, T., Ersin, U., Wang, Y.: Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS 2009) (2009)

    Google Scholar 

  3. Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: Authentication in ad-hoc wireless networks. In: Proc. NDSS 2002: Network and Distributed Systems Security Symp. The Internet Society (February 2002)

    Google Scholar 

  4. Gehrmann, C., Mitchell, C.J., Nyberg, K.: Manuall authentication for wireless devices. RSA CryptoBytes 7(1), 29–37 (2004)

    Google Scholar 

  5. Stajano, F., Anderson, R.J.: The resurrecting duckling: Security issues for ad-hoc wireless networks. In: Security Protocols Workshop (1999)

    Google Scholar 

  6. Perrig, Song, D.: Hash visualization: a new technique to improve real-world security. In: International Workshop on Cryptographic Techniques and E-Commerce (1999)

    Google Scholar 

  7. Margrave, D.: GSM Security and Encryption, http://www.hackcanada.com/blackcrawl/cell/gsm/gsm-secur/gsm-secur.html (last Accessed on September 12, 2012)

  8. Ameen, Y.: Pakistan has the lowest SMS cost In The World: Research Report, http://www.telecomrecorder.com/2011/01/14/pakistan-has-the-lowest-sms-cost-in-the-world-research-report/ (last Accessed on May 12, 2012)

  9. Stepanov, M.: GSM Security : Available at, Helsinki University of Technology, www.cs.huji.ac.il/~sans/students.../GSM%20Security.ppt (last Accessed on May 12, 2012)

  10. Brute force attack, http://en.citizendium.org/wiki/Brute_force_attack/Draft (last Accessed on May 18, 2012)

  11. SMS URL Parameters for HTTP, http://www.nowsms.com/doc/submitting-sms-messages/url-parameters (last Accessed on July 17, 2012)

  12. Suominen, M.: GSM Security, Helsinki University of Technology, http://www.netlab.tkk.fi/opetus/s38153/k2003/Lectures/g42GSM_security.pdf (last Accessed on April 17, 2012)

  13. Brookson, C.: GSM & PCN Security Encryption, http://www.kemt.fei.tuke.sk/predmety/KEMT414_AK/_materialy/Cvicenia/GSM/PREHLAD/gsmdoc.pdf (last Accessed on April 14, 2012)

  14. Hwu, J.S., Hsu, S.F., Lin, Y.B., Chen, R.J.: End-to-end Security Mechanisms for SMS. International Journal of Security and Networks 1(3/4), 177–183 (2006)

    Article  Google Scholar 

  15. Routing SMS messages to a Specific SMSC Route, http://www.nowsms.com/routing-sms-messages-to-a-specifc-smsc-route (last Accessed on February 14, 2012)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aftab, S., Khalid, A., Raza, A., Abbas, H. (2013). Secure SMS Based Automatic Device Pairing Approach for Mobile Phones. In: Huang, DS., Jo, KH., Zhou, YQ., Han, K. (eds) Intelligent Computing Theories and Technology. ICIC 2013. Lecture Notes in Computer Science(), vol 7996. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39482-9_64

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39482-9_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39481-2

  • Online ISBN: 978-3-642-39482-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics