We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Peer to Peer Secure Communication in Mobile Environment: A Novel Approach

by Ashutosh K. Singh, Shubham Maheshwari, S. Verma, Rahul Dekar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 52 - Number 9
Year of Publication: 2012
Authors: Ashutosh K. Singh, Shubham Maheshwari, S. Verma, Rahul Dekar
10.5120/8231-1316

Ashutosh K. Singh, Shubham Maheshwari, S. Verma, Rahul Dekar . Peer to Peer Secure Communication in Mobile Environment: A Novel Approach. International Journal of Computer Applications. 52, 9 ( August 2012), 24-29. DOI=10.5120/8231-1316

@article{ 10.5120/8231-1316,
author = { Ashutosh K. Singh, Shubham Maheshwari, S. Verma, Rahul Dekar },
title = { Peer to Peer Secure Communication in Mobile Environment: A Novel Approach },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 52 },
number = { 9 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume52/number9/8231-1316/ },
doi = { 10.5120/8231-1316 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:51:50.726624+05:30
%A Ashutosh K. Singh
%A Shubham Maheshwari
%A S. Verma
%A Rahul Dekar
%T Peer to Peer Secure Communication in Mobile Environment: A Novel Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 52
%N 9
%P 24-29
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Peer-to-Peer (P2P) communicating is a networking and distributed communication paradigm which allows symmetric sharing of messages between two entities, ideally without any interception from any third entity. Privacy in peer-to-peer communication is, however, can be compromised via a large number of approaches. It is thereforea need of the hour to provide security against eavesdropping and electronic surveillance while exchanging confidential and/or personal information. SMS or Short Message Service is the most widely used mode of communication for information exchange around the globe. In this paper, an approach to android application is presented which will be helpful for users of android based mobile phones to share textual information via SMS without the fear of it being intercepted by any middle-man. A cryptography technique is implemented which avoids the leakage of clear messages that is being transferred from one end to the other, by encrypting it using an already exchanged private key, thereby making the middle-man unable to decipher the intercepted information. The private key exchange is done using the Diffie-Hellman key exchange algorithm, and AES-128 is used as the encryption/decryption algorithm. The messages sent and received are stored in a database accessible by the application, for future reference to the messages. The implemented application was successfully tested on Android Virtual Machine as well as on mobile phone running android version 2. 3. The message received was a random jumble of characters and the original message was available only through the application.

References
  1. Patnaik, G. K. ; Gore, M. M. Tree-Like Peer-to-Peer Symmetric Key Management in Mobile Ad Hoc Network in Networks and Communication, NETCOM. December 2009.
  2. De Santis, A. ; Castiglione, A. ; Cattaneo, G. ; Cembalo, M. ; Petagna, F. ; Petrillo, U. F. An Extensible Framework for Effi-cient Secure SMS in Complex, Intelligent and Software In-tensive Systems (CISIS), February 2010.
  3. Paul, K. ; Kundu, T. K. Android on Mobile Devices: An Energy Perspective in Computer and Information Technology (CIT), IEEE 10th International Conference, June, 2010.
  4. http://googleblog. blogspot. com/2007/11/wheres-my-gphone. html
  5. Android. http://www. android. com.
  6. Palm Source, Inc. Open Binder. Version 1. http://www. angryredplanet. com/~hackbod/openbinder/docs/html/index. html, 2005.
  7. Reto Meier. Professional android application development. Indiana: Wiley Publishing, Inc. 2009, pp. 6.
  8. developer. android. com/guide/basics/what-is-android. html
  9. Federal Information Processing Standards Publication 197. November 26, 2001.
  10. New Directions in Cryptography. W. Diffie and M. E. Hellman, IEEE Transactions on Information Theory, vol. IT-22, Nov. 1976, pp: 644–654
  11. J. F. DiMarzio. Android, A Programmer's Guide. MCGraw-Hill Osborne
  12. Abdul-Mehdi, Z. T. ; Mahmod, R. Security Management Model for Mobile Databases Transaction Management in Information and Communication Technologies: From Theory to Applications, April, 2008.
  13. Sunghyun Yoon; Soon Seok Lee; Sang-Ha Kim. Seamless and secure P2P communication scheme for mobile Internet devices behind NAT in Consumer Electronics (ICCE), 2012 IEEE International Conference, January, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

android cryptography mobile communication security sms communication