A Novel Model for S.M.S Security and SPAM Detection
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Short message service (S.M.S) security is a very important issue in todays time. In spite of the fact that instant messengers have become very popular, S.M.S is still used. S.M.S is prone to several attacks and is not yet marked as a safe means for communication. Security in S.M.S includes message authentication, user authentication, encryption and decryption of the message and Spam detection.This paper provides a model which provides security for all these aspects of S.M.S. It is found that when this model is implemented the accuracy of is 94 %.

Keywords: SMS, spam, ElGamal, ann, SVM, HMAC

Edition: Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

Share this Article

How to Cite this Article?

Nikhila Zalpuri, "A Novel Model for S.M.S Security and SPAM Detection", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV152816, Volume 5 Issue 1, January 2016, 1604 - 1610

87 PDF Views | 66 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'SMS'

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 474 - 478

Wireless Energy Meter and Billing via 'SMS'

P.V. Santhoshi Roja, B. Kiran Babu, V. Samson Deva Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 498 - 500

Remote Control of Electrical Appliance using Wireless Technology 'GSM'

Sindhuja Alla, B.Kiran Babu

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2250 - 2253

Wikipedia on Lower End Mobile

Rashmi.M, Chaithra M

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Similar Articles with Keyword 'spam'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1888 - 1890

Spammer Detection and Identification on Social Network Using Machine Learning

Dr. Shameem Akhter, Noorain Saba

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1121 - 1125

An Efficient Framework for Spam Mail Detection in Attachments using NLP

Amol Malge, Dr. S. M. Chaware

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1979 - 1983

A Survey on Mining User-Aware Rare Sequential Pattern

Salmath Amina KP, Farzin Ahammed T

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2309 - 2312

Email Spam Detection Framework with underlined Coefficient Equality Technique

Harikrishna K, Y Siva Prasad

Share this Article

Similar Articles with Keyword 'ElGamal'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1204 - 1208

Privacy-Preserving Public Auditing for Secure Cloud Storage using ElGamal Public Key Encryption Algorithm

Rahul Vijay Badhe, Shriniwas Gadage

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1716 - 1720

To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack

Sonal Chandrakant Pansare, V. S. Nandedkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 252 - 255

Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange

Nishikant Burande, Gumaste S.V.

Share this Article

Similar Articles with Keyword 'ann'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 338 - 384

Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm

Dr. Niju P. Joseph, Dr. Priyanka Surendran

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1936 - 1938

A Mining Method to Predict Patient's DOSH

Ruchi Rathor, Pankaj Agarkar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Similar Articles with Keyword 'SVM'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 627 - 632

LoG Feature Extraction Based Photographic Detection

Sujitha B Cherkottu, Smija Das

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 2016 - 2019

A Survey on Outlier Detection Methods

Rajani S Kadam, Prakash R Devale

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1907 - 1913

Human Gait Recognition Using Multisvm Classifier

Saranya Sasidharan, Smitha K S, Minu Thomas

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3173 - 3178

An Overview of Pattern Recognition Applications and Its Approaches: A Review

Rajleen Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 984 - 987

Image Analysis Based System for Automatic Detection of Malarial Parasite in Blood Images

Varsha Waghmare, Syed Akhter

Share this Article

Similar Articles with Keyword 'HMAC'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 379 - 381

A Novel Security Model For Password Stealing And Password Reuse Attacks

P.Kasthuri, R.Kokila

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 12, December 2017

Pages: 576 - 579

MMAC: Fast and Secure Message Authentication

Mohammed Ali Mohammed, Loay K. Abood, Makki Maliki

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 2, February 2018

Pages: 1000 - 1004

Cloud Data Auditing Techniques with a Focus on Privacy and Security

Vardireddy Harish Kumar Reddy, K. Sashi Rekha

Share this Article
Top