CFP last date
20 December 2024
Reseach Article

Study of SMS Encryption Techniques

Published on February 2016 by Meghana Madhusudanan, Puja Padiya
International Conference on Advances in Science and Technology
Foundation of Computer Science USA
ICAST2015 - Number 2
February 2016
Authors: Meghana Madhusudanan, Puja Padiya
0ddd1444-18a5-406f-95a9-0dde151fa627

Meghana Madhusudanan, Puja Padiya . Study of SMS Encryption Techniques. International Conference on Advances in Science and Technology. ICAST2015, 2 (February 2016), 16-20.

@article{
author = { Meghana Madhusudanan, Puja Padiya },
title = { Study of SMS Encryption Techniques },
journal = { International Conference on Advances in Science and Technology },
issue_date = { February 2016 },
volume = { ICAST2015 },
number = { 2 },
month = { February },
year = { 2016 },
issn = 0975-8887,
pages = { 16-20 },
numpages = 5,
url = { /proceedings/icast2015/number2/24226-3017/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Science and Technology
%A Meghana Madhusudanan
%A Puja Padiya
%T Study of SMS Encryption Techniques
%J International Conference on Advances in Science and Technology
%@ 0975-8887
%V ICAST2015
%N 2
%P 16-20
%D 2016
%I International Journal of Computer Applications
Abstract

Short Message Service (SMS) provides a very convenient way for users to communicate and also gives other facilities. Hence, it is very popular among the users of mobile phones or other portable devices. Use of SMS has a wide importance in every field, be it notifications, advertisements or for personal communication. Though people use it in large scale, there is a lack of knowledge among people regarding its security. The users are unaware of how much the transmission of messages must be trusted. In this paper, a comparative analysis of the latest schemes used for SMS message security in modern mobile devices is done.

References
  1. Muhammad Waseem Khan, "SMS Security in Mobile Devices: A Survey",Int. J. Advanced Networking and Applications Volume: 05, Issue: 02, Pages:1873-1882 (2013)
  2. Jongseok Choi and Howon Kim,"A Novel Approach for SMS Security", International Journal of Security and Its Applications, vol. 6, 2012
  3. N. Gligoric, T. Dimcic, D. Drajic, S. Krco, and N. Chu, "Applicationlayer security mechanism for M2M communication over SMS", Proc. Telecommunications Forum (TELFOR), 2012, 5- 8.
  4. J. Bose and T. Arif,"Encryption in mobile devices using sensors", Proc. Sensors Applications Symposium (SAS), IEEE, 2013, 55-60.
  5. Nor Badrul Anuar, Laingan Kuen, Omar Zakaria, Abdullah Gani, Ainuddin Wahid Abdul Wahab, "GSM Mobile SMS/MMS using Public key Infrastructure: m-PKI",WSEAS TRANSACTIONS on COMPUTERS, Issue 8, Volume 7, August 2008
  6. Chih-Lin Hu and Chien-An Cho, "A Novel Mobile Content Delivery Scenario with Simple Double-Key Secure Access Control", International Journal of Security and its Applications Vol. 3, No. 1, January, 2009
  7. Mary Agoyi, Devrim Seral, "SMS SECURITY: AN ASYMMETRIC ENCRYPTION APPROACH", 2010 Sixth International Conference on Wireless and Mobile Communications
  8. Erfaneh Noroozi, Salwani Mohd Daud, Ali Sabouhi, "Secure Digital Signature Schemes Based on Hash Functions", International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278- 3075, Volume-2, Issue-4, March 2013
  9. Neetesh Saxena, Ashish Payal, "Enhancing Security System of Short Message Service for M-Commerce in GSM", International Journal of Computer Science Engineering Technology (IJCSET) 2012
  10. Neetesh Saxena,Narendra S. Chaudhari, "A Secure Digital SignatureApproach for SMS Security", IP Multimedia Communications A SpecialIssue from IJCA, 2009
  11. N. J. Croft and M. S. Olivier, "Using an approximated one-time pad to secure short messaging service (SMS)", Proc. Southern African Telecommunication Networks and Applications Conference. South Africa, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Sms Elliptical Curve Cryptography Sensor Encryption Gesture Algorithms Compression Gzip