skip to main content
10.1145/2381716.2381729acmotherconferencesArticle/Chapter ViewAbstractPublication PagescubeConference Proceedingsconference-collections
research-article

A secure approach for SMS in GSM network

Published: 03 September 2012 Publication History

Abstract

The Short Message Service (SMS) is one of very popular kind of superior and well-tried services with a global availability in GSM networks. This paper deals with an SMS security for mobile communication. The transmission of an SMS in GSM network is not secure; therefore it is desirable to secure SMS by additional encryption. A proposed approach, based on encryption and digital signature efficiently embeds the confidentiality, integrity, authentication, and non-repudiation in the SMS messages. In the next part, there is the description of design and implementation of the application, which encrypts SMS by DES, Triple DES, AES and Blowfish algorithms and finally signs SMS by DSA or RSA algorithm respectively. At the end, we described attacks on secured SMS and future extension of the application.

References

[1]
Agoyi Mary, Seral Devrim. 2010. SMS Security: An Asymmetric Encryption Approach. Sixth International Conference on Wireless and Mobile Communications. IEEE 2010, 448--452.
[2]
Santis Alfredo De, Castiglione Aniello and Petrillo Umberto Ferraro. 2010. An Extensible Framework for Efficient Secure SMS. International Conference on Complex, Intelligent and Software Intensive Systems. IEEE 2010, 843--850.
[3]
Khozooyi Nassim, Tahajod Maryam, khozooyi Peyman. 2009. Security in Mobile Governmental Transactions. 2009 Second International Conference on Computer and Electrical Engineering. IEEE 2009, 168--172.
[4]
Toorani M. and Shirazi A. Beheshti. 2008. SSMS - A secure SMS messaging protocol for the m-payment systems. in IEEE Symposium on Computers and Communications. IEEE July 2008, 700--705.
[5]
Lisonek D., Drahansky M. 2008. SMS Encryption for Mobile Communication. in International Conference on Security Technology. IEEE Dec 2008, SECTECH '08, 198--201.
[6]
Narendiran C., Rabara S. Albert, Rajendran N. 2008. Performance Evaluation on End-to-End Security Architecture for Mobile Banking System. 978-1-4244-2829-8/08/$25.00, IEEE 2008.
[7]
Hashemi Mahmoud Reza, Soroush Elahe. 2006. A Secure m-Payment Protocol for Mobile Devices. IEEE CCECE/CCGEI, Ottawa. May 2006, 294--297.
[8]
Toorani Mohsen, Shirazi Ali Asghar Beheshti. 2008. Solutions to the GSM Security Weaknesses. the Second International Conference on Next Generation Mobile Applications, Services, and Technologies. IEEE 2008, 576--581.
[9]
Barkan Elad and Biham Eli. 2006. Conditional Estimators: an Effective Attack on A5/1. in proceedings of SAC 2005. Springer 2006, Lecture Notes in Computer Science 3897, 1--19.
[10]
Biryukov Alex, Shamir Adi and Wagner David. 2001. Real Time Cryptanalysis of A5/1 on a PC. in proceedings of Fast Software Encryption 2000. Springer 2001, Lecture Notes in Computer Science 1978, 1--18.
[11]
Stallings W. 2006. Cryptography and network security. Prentice Hall. New Jersey, United State.
[12]
Garza-Saldana J. J. and Diaz-Perez A. 2008. State of security for SMS on mobile devices. Proceedings of the Electronics, Robotics and Automotive Mechanics Conference, 110--115.
[13]
Sidek Salman Firdaus bin Haji. 2010. The Development of the Short Messaging Service (SMS) Application for the School Usage. 978-1-4244-6716-7/10/$26.00, IEEE 2010, 1382--1386.
[14]
Ekdahl Patrik and Johansson Thomas. 2003. Another Attack on A5/1. IEEE Transactions on Information Theory. vol. 49, no. 1, 284--289.
[15]
Web http://en.wikipedia.org/wiki/Data_Encryption_Standard
[16]
Web http://www.rsa.com/rsalabs/node.asp?id=2231
[17]
Gonzalez Tom. 2007. A Reflection Attack on Blowfish. Journal of Latex Class Files. vol. 6, no. 1, January 2007, 1--3.
[18]
http://en.wikipedia.org/wiki/Digital_Signature_Algorithm
[19]
Biham Eli, Dunkelman Orr, and Keller Nathan. 2005. A Related-Key Rectangle Attack on the Full KASUMI. Advances in Cryptology, proceedings of ASIACRYPT 2005. Springer 2005, Lecture Notes in Computer Science 3788, 443--461.
[20]
Kim Jongsung, Hong Seokhie, Preneel Bart, Biham Eli, Orr Dunkelman, and Keller Nathan. 2009. Related Key Boomerang and Rectangle Attacks.
[21]
Xuan Zuguang, Du Zhenjun, Chen Rong. 2009. Comparison Research on Digital Signature Algorithms in Mobile Web Services. International Conference on Management and Service Science. IEEE 2009, MASS '09, 1--4.
[22]
Saxena Neetesh and Payal Ashish. 2011. Enhancing Security System of Short Message Service for M-Commerce in GSM. International Journal of Computer Science & Engineering Technology (IJCSET). ISSN: 2229-3345, vol. 2, no. 4, April 2011, 126--133.
[23]
Saxena Neetesh, Chaudhari Narendra S. 2011. A Secure Digital Signature Approach for SMS Security. International journal of Computer Application (IJCA). Special issues on IP Multimedia Communications, published by Foundation of Computer Science. ISBN: 978-93-80864-99-3, Oct. 2011, New York, USA, 98--102.

Cited By

View all
  • (2021)Communication channels for exchanging agricultural information among Tanzanian farmers: A meta-analysisIFLA Journal10.1177/0340035221102383747:4(570-579)Online publication date: 6-Jul-2021
  • (2020)BlueDoorProceedings of the 18th International Conference on Mobile Systems, Applications, and Services10.1145/3386901.3389025(286-298)Online publication date: 15-Jun-2020
  • (2018)BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile UsersIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.2799223(1-1)Online publication date: 2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CUBE '12: Proceedings of the CUBE International Information Technology Conference
September 2012
879 pages
ISBN:9781450311854
DOI:10.1145/2381716
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • CUOT: Curtin University of Technology

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 September 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. AES
  2. DES
  3. DSA
  4. RSA
  5. asymmetric encryption
  6. block cipher

Qualifiers

  • Research-article

Conference

CUBE '12
Sponsor:
  • CUOT

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Communication channels for exchanging agricultural information among Tanzanian farmers: A meta-analysisIFLA Journal10.1177/0340035221102383747:4(570-579)Online publication date: 6-Jul-2021
  • (2020)BlueDoorProceedings of the 18th International Conference on Mobile Systems, Applications, and Services10.1145/3386901.3389025(286-298)Online publication date: 15-Jun-2020
  • (2018)BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile UsersIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.2799223(1-1)Online publication date: 2018
  • (2017)A secure lightweight protocol for SMS mutual authentication protocols based on symmetic-key encryption2017 17th International Symposium on Communications and Information Technologies (ISCIT)10.1109/ISCIT.2017.8261196(1-6)Online publication date: Sep-2017
  • (2014)Secure-AKAWireless Personal Communications: An International Journal10.1007/s11277-014-1821-078:2(1345-1373)Online publication date: 1-Sep-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media