International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Views: 278 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 7 Issue 4, April 2018 | Popularity: 7 / 10


     

A Secure End-To-End Protocol for Secure Transmission of SMS

Vaidehi V. Mantri, M. Y. Joshi


Abstract: Nowadays, short message service (SMS) is being used in many daily life applications, including healthcare monitoring, mobile banking, mobile commerce etc. Short message service (SMS) is the text communication service component of mobile communication system by using standardized communication that allow to exchange of short text messages between mobile phone devices. Short message service (SMS) plays a vital role in various different fields such as in the medical field, mobile banking etc But the traditional SMS service offered by some of the network operator does not provide the encryption to the information before the SMS has been transmitted. The objective of this dissertation work is to implement an EasySMS protocol which is an efficient and secure protocol, which provides an end-to-end secure communication through SMS between end users. The main components in the Easy SMS protocol are two mobile station, authentication server (AS) which stores all the symmetric keys shared between authentication server (AS) and the respective mobile station (MS), Registration authority which stores all the information related to the mobile subscriber. There are two different phases in the first phase there is only the authentication in the second phase there is actual message exchanged between the two mobile phones within the expiry time. Easy SMS protocol is divided in two different scenarios. First scenario both the mobile station belongs to the same authentication server (AS). Second scenario both the mobile station belongs to the different authentication server (AS). Various encryption algorithms such as AES, Triple DES also hash function that is MD5 algorithm is used which provides data authentication to the short message service (SMS). Easy SMS protocol prevent from various attack which includes SMS disclosure, Over the air modification, Replay attack, Man-in-themiddle attack and impersonation attack.


Keywords: Authentication, Security, SMS, Symmetric key, Over-the-air


Edition: Volume 7 Issue 4, April 2018


Pages: 1042 - 1047



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vaidehi V. Mantri, M. Y. Joshi, "A Secure End-To-End Protocol for Secure Transmission of SMS", International Journal of Science and Research (IJSR), Volume 7 Issue 4, April 2018, pp. 1042-1047, https://www.ijsr.net/getabstract.php?paperid=ART20181790, DOI: https://www.doi.org/10.21275/ART20181790



Similar Articles

Downloads: 186 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article
Top