Call for Paper - July 2023 Edition
IJCA solicits original research papers for the July 2023 Edition. Last date of manuscript submission is June 20, 2023. Read More

Study of SMS Encryption Techniques

Print
PDF
IJCA Proceedings on International Conference on Advances in Science and Technology
© 2016 by IJCA Journal
ICAST 2015 - Number 2
Year of Publication: 2016
Authors:
Meghana Madhusudanan
Puja Padiya

Meghana Madhusudanan and Puja Padiya. Article: Study of SMS Encryption Techniques. IJCA Proceedings on International Conference on Advances in Science and Technology ICAST 2015(2):16-20, February 2016. Full text available. BibTeX

@article{key:article,
	author = {Meghana Madhusudanan and Puja Padiya},
	title = {Article: Study of SMS Encryption Techniques},
	journal = {IJCA Proceedings on International Conference on Advances in Science and Technology},
	year = {2016},
	volume = {ICAST 2015},
	number = {2},
	pages = {16-20},
	month = {February},
	note = {Full text available}
}

Abstract

Short Message Service (SMS) provides a very convenient way for users to communicate and also gives other facilities. Hence, it is very popular among the users of mobile phones or other portable devices. Use of SMS has a wide importance in every field, be it notifications, advertisements or for personal communication. Though people use it in large scale, there is a lack of knowledge among people regarding its security. The users are unaware of how much the transmission of messages must be trusted. In this paper, a comparative analysis of the latest schemes used for SMS message security in modern mobile devices is done.

References

  • Muhammad Waseem Khan, "SMS Security in Mobile Devices: A Survey",Int. J. Advanced Networking and Applications Volume: 05, Issue: 02, Pages:1873-1882 (2013)
  • Jongseok Choi and Howon Kim,"A Novel Approach for SMS Security", International Journal of Security and Its Applications, vol. 6, 2012
  • N. Gligoric, T. Dimcic, D. Drajic, S. Krco, and N. Chu, "Applicationlayer security mechanism for M2M communication over SMS", Proc. Telecommunications Forum (TELFOR), 2012, 5- 8.
  • J. Bose and T. Arif,"Encryption in mobile devices using sensors", Proc. Sensors Applications Symposium (SAS), IEEE, 2013, 55-60.
  • Nor Badrul Anuar, Laingan Kuen, Omar Zakaria, Abdullah Gani, Ainuddin Wahid Abdul Wahab, "GSM Mobile SMS/MMS using Public key Infrastructure: m-PKI",WSEAS TRANSACTIONS on COMPUTERS, Issue 8, Volume 7, August 2008
  • Chih-Lin Hu and Chien-An Cho, "A Novel Mobile Content Delivery Scenario with Simple Double-Key Secure Access Control", International Journal of Security and its Applications Vol. 3, No. 1, January, 2009
  • Mary Agoyi, Devrim Seral, "SMS SECURITY: AN ASYMMETRIC ENCRYPTION APPROACH", 2010 Sixth International Conference on Wireless and Mobile Communications
  • Erfaneh Noroozi, Salwani Mohd Daud, Ali Sabouhi, "Secure Digital Signature Schemes Based on Hash Functions", International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278- 3075, Volume-2, Issue-4, March 2013
  • Neetesh Saxena, Ashish Payal, "Enhancing Security System of Short Message Service for M-Commerce in GSM", International Journal of Computer Science Engineering Technology (IJCSET) 2012
  • Neetesh Saxena,Narendra S. Chaudhari, "A Secure Digital SignatureApproach for SMS Security", IP Multimedia Communications A SpecialIssue from IJCA, 2009
  • N. J. Croft and M. S. Olivier, "Using an approximated one-time pad to secure short messaging service (SMS)", Proc. Southern African Telecommunication Networks and Applications Conference. South Africa, 2008.