A Secure Protocol for SMS Mobile Banking
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

A Secure Protocol for SMS Mobile Banking

Amol B. Jawanjal, R. B. Joshi

Short Message Service (SMS) is most popular, cheapest and easy-to-use communication technology for mobile phone users. Using SMS, mobile user sends some confidential information such as password, account number, banking information in the form of plaintext from one mobile to another mobile. The hacker can easily read this information and privacy will not be maintained. Nowadays due to lack of security in SMS it is rarely used in many value added services such as mobile banking and e-commerce. For this purpose we provide a solution that provides end to end security to the message with authentication, confidentiality, integrity. Hence we present a secure model for SMS mobile banking services tailored to suit mobile cellular phone users.

Keywords: Authentication, SMS, Mobile banking, Security

Edition: Volume 4 Issue 6, June 2015

Pages: 1478 - 1481

Share this Article

How to Cite this Article?

Amol B. Jawanjal, R. B. Joshi, "A Secure Protocol for SMS Mobile Banking", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155546, Volume 4 Issue 6, June 2015, 1478 - 1481

74 PDF Views | 62 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Authentication'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1724 - 1727

Privacy Preserving Authenticity Framework for Shared Data Cloud Network

P. Vanitha Sree, K. Narayana Rao

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2483 - 2487

Accountability of Data usage in Cloud Computing

Nitin P. Doiphode, Hemlata Channe

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1944 - 1947

Design and Implementation of Tarf for WSNs

Kavita, Amareshwari Patil

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2082 - 2086

Graphical Password Knowledge Based Authentication System Enhancement Using Persuasive Technology

Prof. Uma Yadav, Sarita Sakure

Share this Article

Similar Articles with Keyword 'SMS'

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 474 - 478

Wireless Energy Meter and Billing via 'SMS'

P.V. Santhoshi Roja, B. Kiran Babu, V. Samson Deva Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 498 - 500

Remote Control of Electrical Appliance using Wireless Technology 'GSM'

Sindhuja Alla, B.Kiran Babu

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1440 - 1445

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques

Snehal B Rase, Pranjali Deshmukh

Share this Article

Similar Articles with Keyword 'Mobile banking'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1822 - 1825

Fraud Detection in Banking Sector using Data Mining

B. Rajdeepa, D. Nandhitha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1876 - 1882

Ensuring QoS-Guaranteed Bandwidth Shifting and Redistribution using Mobile Cloud Environment

Dr. K. Suresh Babu, Gardas Pavani

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1478 - 1481

A Secure Protocol for SMS Mobile Banking

Amol B. Jawanjal, R. B. Joshi

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 1042 - 1047

A Secure End-To-End Protocol for Secure Transmission of SMS

Vaidehi V. Mantri, M. Y. Joshi

Share this Article

Research Paper, Computer Science & Engineering, Nigeria, Volume 7 Issue 2, February 2018

Pages: 410 - 415

A Critical Analysis of Electronic Transactions and its Intricacies

Chapman Eze Nnadozie

Share this Article

Similar Articles with Keyword 'Security'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the User's Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article
Top