A Novel Model for S.M.S Security and SPAM Detection
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Short message service (S.M.S) security is a very important issue in todays time. In spite of the fact that instant messengers have become very popular, S.M.S is still used. S.M.S is prone to several attacks and is not yet marked as a safe means for communication. Security in S.M.S includes message authentication, user authentication, encryption and decryption of the message and Spam detection.This paper provides a model which provides security for all these aspects of S.M.S. It is found that when this model is implemented the accuracy of is 94 %.

Keywords: SMS, spam, ElGamal, ann, SVM, HMAC

Edition: Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

Share this Article

How to Cite this Article?

Nikhila Zalpuri, "A Novel Model for S.M.S Security and SPAM Detection", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152816, Volume 5 Issue 1, January 2016, 1604 - 1610

125 PDF Views | 98 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'SMS'

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 474 - 478

Wireless Energy Meter and Billing via SMS

P.V. Santhoshi Roja, B. Kiran Babu, V. Samson Deva Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 498 - 500

Remote Control of Electrical Appliance using Wireless Technology GSM

Sindhuja Alla, B.Kiran Babu

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2169 - 2172

Spotting and Segregation of Sinkhole Node in MANET

Jeeja Borkar, Vaishali Malekar

Share this Article

Similar Articles with Keyword 'spam'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1888 - 1890

Spammer Detection and Identification on Social Network Using Machine Learning

Dr. Shameem Akhter, Noorain Saba

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1368 - 1371

Spam and Zombie Detection System with Machine Learned Spot Algorithm

Manishankar.S, Sobin E. S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2309 - 2312

Email Spam Detection Framework with underlined Coefficient Equality Technique

Harikrishna K, Y Siva Prasad

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1121 - 1125

An Efficient Framework for Spam Mail Detection in Attachments using NLP

Amol Malge, Dr. S. M. Chaware

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1573 - 1575

A Service Provider Level SMS Spamming Detection System

Bhavana Alam, Fazeel Zama

Share this Article

Similar Articles with Keyword 'ElGamal'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1716 - 1720

To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack

Sonal Chandrakant Pansare, V. S. Nandedkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 252 - 255

Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange

Nishikant Burande, Gumaste S.V.

Share this Article

Similar Articles with Keyword 'ann'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1334 - 1337

Mutation Testing Techniques in Software Testing: A Review

Dushyant Singh, Parulpreet Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Similar Articles with Keyword 'SVM'

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1682 - 1686

Support Vector Machine Based MRI Brain Tumor Detection

Nazima Yousuf, Mrigana Walia

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1615 - 1620

Traffic Sign Detection via Graph Based Ranking and Segmentation Algorithm

Premsai Cheedella

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2016 - 2019

A Survey on Outlier Detection Methods

Rajani S Kadam, Prakash R Devale

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1907 - 1913

Human Gait Recognition Using Multisvm Classifier

Saranya Sasidharan, Smitha K S, Minu Thomas

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 11, November 2016

Pages: 1892 - 1896

Review on Gait Recognition Using Artificial Intelligence

Drishty, Jasmeen Gill

Share this Article

Similar Articles with Keyword 'HMAC'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 379 - 381

A Novel Security Model For Password Stealing And Password Reuse Attacks

P.Kasthuri, R.Kokila

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 12, December 2017

Pages: 576 - 579

MMAC: Fast and Secure Message Authentication

Mohammed Ali Mohammed, Loay K. Abood, Makki Maliki

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 2, February 2018

Pages: 1000 - 1004

Cloud Data Auditing Techniques with a Focus on Privacy and Security

Vardireddy Harish Kumar Reddy, K. Sashi Rekha

Share this Article
Top