A Secure End-To-End Protocol for Secure Transmission of SMS
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 140 , Downloads: 111 | CTR: 79 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 7 Issue 4, April 2018

A Secure End-To-End Protocol for Secure Transmission of SMS

Vaidehi V. Mantri, M. Y. Joshi

Nowadays, short message service (SMS) is being used in many daily life applications, including healthcare monitoring, mobile banking, mobile commerce etc. Short message service (SMS) is the text communication service component of mobile communication system by using standardized communication that allow to exchange of short text messages between mobile phone devices. Short message service (SMS) plays a vital role in various different fields such as in the medical field, mobile banking etc But the traditional SMS service offered by some of the network operator does not provide the encryption to the information before the SMS has been transmitted.The objective of this dissertation work is to implement an EasySMS protocol which is an efficient and secure protocol, which provides an end-to-end secure communication through SMS between end users.The main components in the Easy SMS protocol are two mobile station, authentication server (AS) which stores all the symmetric keys shared between authentication server (AS) and the respective mobile station (MS), Registration authority which stores all the information related to the mobile subscriber.There are two different phases in the first phase there is only the authentication in the second phase there is actual message exchanged between the two mobile phones within the expiry time.Easy SMS protocol is divided in two different scenarios.First scenario both the mobile station belongs to the same authentication server (AS).Second scenario both the mobile station belongs to the different authentication server (AS).Various encryption algorithms such as AES, Triple DES also hash function that is MD5 algorithm is used which provides data authentication to the short message service (SMS).Easy SMS protocol prevent from various attack which includes SMS disclosure, Over the air modification, Replay attack, Man-in-themiddle attack and impersonation attack.

Keywords: Authentication, Security, SMS, Symmetric key, Over-the-air

Edition: Volume 7 Issue 4, April 2018

Pages: 1042 - 1047

Share this Article

How to Cite this Article?

Vaidehi V. Mantri, M. Y. Joshi, "A Secure End-To-End Protocol for Secure Transmission of SMS", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20181790, Volume 7 Issue 4, April 2018, 1042 - 1047

140 PDF Views | 111 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Views: 152 , Downloads: 98 | CTR: 64 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Views: 119 , Downloads: 99 | CTR: 83 %

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1760 - 1762

A Survey on Existing Password Storage Methods and their Security

Samruddhi Patil, Kumud Wasnik

Share this Article

Similar Articles with Keyword 'Security'

Views: 37 , Downloads: 30 | CTR: 81 % | Weekly Popularity: ⮙16

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Views: 49 , Downloads: 40 | CTR: 82 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Views: 165 , Downloads: 40 | CTR: 24 %

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Views: 49 , Downloads: 41 | CTR: 84 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Views: 48 , Downloads: 46 | CTR: 96 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'SMS'

Views: 289 , Downloads: 170 | CTR: 59 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Views: 159 , Downloads: 87 | CTR: 55 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 474 - 478

Wireless Energy Meter and Billing via SMS

P.V. Santhoshi Roja, B. Kiran Babu, V. Samson Deva Kumar

Share this Article

Views: 134 , Downloads: 92 | CTR: 69 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Views: 143 , Downloads: 95 | CTR: 66 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 498 - 500

Remote Control of Electrical Appliance using Wireless Technology GSM

Sindhuja Alla, B.Kiran Babu

Share this Article

Views: 140 , Downloads: 98 | CTR: 70 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1011 - 1013

Transplantation of Native Android Apps onto J2ME Platform

Revati M. Wahul, Meenakshi Chandak, Neha Pandit, Kalyani Mote

Share this Article

Similar Articles with Keyword 'Symmetric key'

Views: 133 , Downloads: 100 | CTR: 75 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article

Views: 129 , Downloads: 105 | CTR: 81 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this Article

Views: 135 , Downloads: 105 | CTR: 78 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2545 - 2549

Implementation of Random Grid Visual Cryptography for Color Images

Snehal N. Meshram, Sneha U. Bohra

Share this Article

Views: 115 , Downloads: 105 | CTR: 91 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1952 - 1957

Navigation Query Security through Privacy Preservation and Cryptography in VANETs

Anuradha T, Saba Tahseen

Share this Article

Views: 151 , Downloads: 107 | CTR: 71 % | Weekly Popularity: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article
Top