An Encryption Protocol for End-to-end Secure Transmission of SMS

被引:0
|
作者
Thomas, Minta [1 ]
Panchami, V [1 ]
机构
[1] Toc H Inst Sci & Technol, CSE, Ernakulam 682313, India
关键词
Cryptography; Encryption; Secure Transmission; Symmetric Encryption; Asymmetric Encryption;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Short Message Service (SMS) is a process of transmission of short messages over the network. SMS is used in daily life applications including mobile commerce, mobile banking, and so on. It is a robust communication channel to transmit information. SMS pursue a store and forward way of transmitting messages. The private information like passwords, account number, passport number, and license number are also send through message. The traditional messaging service does not provide security to the message since the information contained in the SMS transmits as plain text from one mobile phone to other. This paper explains an efficient encryption protocol for securely transmitting the confidential SMS from one mobile user to other which serves the cryptographic goals like confidentiality, authentication and integrity to the messages. The Blowfish encryption algorithm gives confidentiality to the message, the EasySMS protocol is used to gain authentication and MD5 hashing algorithm helps to achieve integrity of the messages. Blowfish algorithm utilizes only less battery power when compared to other encryption algorithms. The protocol prevents various attacks, including SMS disclosure, replay attack, man-inthe middle attack and over the air modification.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] SECURE COMMUNICATION IN INTERNET ENVIRONMENTS - A HIERARCHICAL KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION
    LU, WP
    SUNDARESHAN, MK
    IEEE TRANSACTIONS ON COMMUNICATIONS, 1989, 37 (10) : 1014 - 1023
  • [22] A secure end-to-end proximity NFC-based mobile payment protocol
    Bojjagani, Sriramulu
    Sastry, V. N.
    COMPUTER STANDARDS & INTERFACES, 2019, 66
  • [23] An end-to-end secure key management protocol for e-health applications
    Abdmeziem, Mohammed Riyadh
    Tandjaoui, Djamel
    COMPUTERS & ELECTRICAL ENGINEERING, 2015, 44 : 184 - 197
  • [24] Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks
    Harn, Lein
    Hsu, Ching-Fang
    Ruan, Ou
    Zhang, Mao-Yuan
    IEEE SENSORS JOURNAL, 2016, 16 (06) : 1779 - 1785
  • [25] End-to-end protocol to secure ad hoc networks against wormhole attacks
    Khurana, Sandhya
    Gupta, Neelima
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 994 - 1002
  • [26] Secure Provisioning for Achieving End-to-End Secure Communications
    Sousa, Patricia R.
    Resende, Joao S.
    Martins, Rolando
    Antunes, Luis
    AD-HOC, MOBILE, AND WIRELESS NETWORKS (ADHOC-NOW 2019), 2019, 11803 : 498 - 507
  • [27] End-to-end Secure Insurance Telematics
    Salant, Eliot
    Gershinsky, Gidon
    SYSTOR '19: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL SYSTEMS AND STORAGE CONFERENCE, 2019, : 182 - 182
  • [28] A secure end-to-end IoT solution
    Mathur, Avijit
    Newe, Thomas
    Elgenaidi, Walid
    Rao, Muzaffar
    Dooly, Gerard
    Toal, Daniel
    SENSORS AND ACTUATORS A-PHYSICAL, 2017, 263 : 291 - 299
  • [29] FSEE: A Forward Secure End-to-End Encrypted Message Transmission System for IoT
    Cui, Li
    Xing Qianqian
    Yi, Wang
    Wang Baosheng
    Jing, Tao
    Liu, Liu
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [30] Research on End-to-end SMS Confidential Communication System
    Su, Yan
    Huang, Zhi Xing
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1744 - +