A security scheme of SMS system

被引:0
|
作者
Zhang, FZ [1 ]
Yang, HW [1 ]
Song, C [1 ]
机构
[1] Chinese Acad Sci, Comp Network Informat Ctr, Beijing 100080, Peoples R China
关键词
SMS; security; encryption; integrality; A5; MD5;
D O I
10.1117/12.576151
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.
引用
收藏
页码:1333 / 1339
页数:7
相关论文
共 50 条
  • [31] Efficient Remote Control System using SMS and WiFi Technology for Outdoor Security Lighting Applications
    Akorede, M. F.
    Fatigun, J. J.
    Opaluwa, J. A.
    Pouresmaeil, E.
    2017 IEEE PES POWERAFRICA CONFERENCE, 2017, : 512 - 517
  • [32] Stabilizing scheme application for improving power system security in Korea
    Oh, T
    Kim, H
    Kim, C
    Rju, H
    2000 IEEE POWER ENGINEERING SOCIETY WINTER MEETING - VOLS 1-4, CONFERENCE PROCEEDINGS, 2000, : 90 - 93
  • [33] A Novel Security Scheme for Video Conference System with Wireless Terminals
    Xiao, Chen
    Ma, Shilong
    Niu, Jianwei
    Wang, Lifeng
    Shan, Baosong
    Chen, Tan
    SEC 2008: PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL SYMPOSIUM ON EMBEDDED COMPUTING, 2008, : 101 - +
  • [34] INSECURITY OF THE SECURITY SYSTEM - THE EXAMPLE OF THE PENSION SCHEME IN THE REPUBLIC OF CROATIA
    Penda, Ivor Altaras
    POLITICKA MISAO-CROATIAN POLITICAL SCIENCE REVIEW, 2009, 46 (01): : 135 - 166
  • [35] Two-Layer Security Scheme for AMI System in Taiwan
    Hsu, Ping-Hai
    Tang, Wenshiang
    Tsai, Chiakai
    Cheng, Bo-Chao
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 105 - 110
  • [36] A Security Scheme for Cloud-assisted Industrial Control System
    Tu Y.-F.
    Yang G.
    Zhang C.-Z.
    Zidonghua Xuebao/Acta Automatica Sinica, 2021, 47 (02): : 432 - 441
  • [37] Performance of a Security Control Scheme for a Health Data Exchange System
    Gelenbe, Erol
    Pavloski, Mihajlo
    2020 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2020,
  • [38] Security Enhancement With a Hybrid Cooperative NOMA Scheme for MEC System
    Li, Baogang
    Wu, Wenjing
    Zhao, Wei
    Zhang, Haijun
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (03) : 2635 - 2648
  • [39] Thermodynamic study of the SmS2-SmS1.5 system
    Vasilyeva, IG
    Belyaeva, EI
    JOURNAL OF SOLID STATE CHEMISTRY, 1999, 142 (02) : 261 - 265
  • [40] Mobile Commerce Security Model Construction Based on SMS
    Li, Yan
    Chen, Meifang
    Nie, Jie
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,