International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108 | Views: 287 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 7, July 2015 | Popularity: 6.6 / 10


     

Improving the Security of SMPP Protocol using TLS

Akash R. Kotecha, H. P. Channe


Abstract: In human life, Communication medium plays an important role in sharing the information. At many times, information is confidential so need to maintain the confidentiality of information is necessary. Short Message Service (SMS) has become an important way of communication for mobile users. SMS contains plain text which is transmitted to end user through layers of network. Nowadays, SMS is used widely for value added services and is suitable for versatile managing account, installment updates, SOS calls, stock and new cautions, route and flight enquiries so forth. These sorts of messages are generally created using computer application and are sent over Short Message Peer-to-Peer (SMPP) Protocol. SMPP uses TCP/IP connection to send messages over application layer. SMPP convention has no efforts to establish safety indicated which permits quick conveyance of SMS messages in mass. Sometimes messages may be lost in a network which may effect on the revenue loss or information leaked to third party. In this paper, we have proposed a way to secure the messages using Transport Layer Security (TLS) protocol. We have modified the structure of TLS for SMS submission.


Keywords: Short Message Service, Short Message Peer to Peer, Transport Layer Security, Cryptography


Edition: Volume 4 Issue 7, July 2015


Pages: 2646 - 2649



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Akash R. Kotecha, H. P. Channe, "Improving the Security of SMPP Protocol using TLS", International Journal of Science and Research (IJSR), Volume 4 Issue 7, July 2015, pp. 2646-2649, https://www.ijsr.net/getabstract.php?paperid=SUB157022, DOI: https://www.doi.org/10.21275/SUB157022



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023

Pages: 581 - 585

Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security

R. Vidhya, R. Sathya

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 1362 - 1373

Design and Implementation of a Novel Hybrid Quantum-Classical Processor for Enhanced Computation Speed

Mohammed Saleem Sultan, Mohammed Shahid Sultan

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1349 - 1363

IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing

Ponnarasan Krishnan

Share this Article



Top