End To End Secure Sms Communication: A Literature Survey Nimmya Unnikrishnan PG scholar Vidya academy of science and technology Thrissur Divya KV Asst. Professor Vidya academy of science and technology Thrissur nimmyaunnikrishnan@gmail.co m divyakv@vidyaacademy.ac.in ABSTRACT Cipher-SMS protocol is successfully designed in order to provide end-to-end secure communication through SMS between mobile users by using AES and MD5 encryption. SMS is the most popular data service. Sms technology is used in security sensitive fields such as e-banking and e-government. SMS is transmitted in the form of plaintext between mobile user (MS) and the SMS center. SMS contents are stored in the systems of network operators and can be read by their personnel. Sms does not offer a secure environment for confidential data during transmission. The above requirements can be accomplished by proposing a protocol called Cipher-SMS which provides end-to-end security during the transmission of SMS over the network. Keywords Authentication Server, Symmetric Key, Short Message Service, encryption. 1. 2. INTRODUCTION Short Message Service (SMS) has become one of the fastest and strong communication channels to transmit the information across the Worldwide. SMS is the most popular mobile data service.Due to its wide popularity SMS technology is used in various field applications. This also include security sensitive fields such as e-bnking and egovernment.Messages are transmitted as plaintext between mobile user (MS) and the SMS center (SMSC), using wireless network. SMS contents are stored in the systems of network operators and can be read by their personnel.SMS is sent as plaintext; unfortunately sms does not offer an secure environment for confidential data during transmission. So the traditional SMS service offered by various mobile operators surprisingly does not provide information security it is strongly required to provide endto-end secure communication between end users. Security to the SMS is the main problem .Presently there is no scheme that provide complete sms security. The above requirements can be accomplished by proposing a protocol called Cipher-SMS which provides end-to-end security during the transmission of SMS over the network. The Cipher-SMS protocol achieved by using cryptographic algorithms of AES and MD5, The Cipher-SMS protocol prevents the SMS information from various attacks. Proposed SMS based framework provides efficient and more secure solution for SMS Transmission. Cipher-SMS is the first protocol completely based on the symmetric key cryptography of 1 AES and hash cryptography of MD5 for cellular network. factorization, finite field discrete logarithm and Elliptic curve discrete logarithm. 1.1 Existing system Nor Bdarul Anuar et al. [2] proposed a Mobile messaging using Public Key Infrastructure: mPKI.Uses Diffie and Martin Hellman publickey cryptography. Consists of two keys, which known as public key and private key, used in the message encryption. The key pairs are generated by using the asymmetric cryptography algorithm and kept secretly. These early cryptography does not request the authentication from the sender. most of the mobile PKI solution has problem on managing the key distribution. There is the possibility of losing the private key to the public when phone is lost. EasySMS which provides end-to-end secure communication through SMS between end users. EasySMS is executed which makes available the symmetric shared key between both MS and then ciphering of message takes place using a symmetric key algorithm. The working of the protocol is presented by considering two different scenarios are SMSSec and PK-SIM protocols. SMSSec protocol can be used to secure an SMS communication sent by Java’s Wireless Messaging API while the PK-SIM protocol proposes a standard SIM card with additional PKI functionality. In EasySMS protocol, a cryptographic encryption algorithm AES/MAES is maintained to provide end-to-end confidentiality to the transmitted SMS in the network. 2. RELATED WORK 2.1 Short Message Service works Prof. Rashmi Ramesh chavan. et al. [1] {Secured Mobile Messaging}.Provide hybrid compression encryption technique. The proposed techniques encrypt the SMS in the form of Elliptic curve encryption technique. The network architecture of short message service in GSM .This architecture, the short message is first delivered from the mobile station (MS) to a short message service center (SM-SC) through the base station system (BSS), the mobile switching center (MSC), and then the interworking MSC (IWMSC). The SM-SC then forwards the message to the GSM network through a specific GSMMSC called the short message service gateway MSC (SMS GMSC). The SM-SC may connect to several GSM networks and to several SMS GMSCs in a GSM network. The security of asymmetric cryptosystems is a hard mathematical problem, such as integer Mohsen Toorani et al.[3] provided the introduction of new Secure SMS Messaging Protocol (SSMS) for the Mobile banking. It being an application layer protocol is intended for GSM users as a secure bearer in the mobile bnking. It uses elliptic curve based public key solution which uses public key as secret key for symmetric encryption. So it uses different keys for encryption and Decryption so security is very less and overhead is very high. Proposed an Enhancing Security System of Short Message Service for M-Commerce in GSM. Uses asymmetric encryption. The issue with asymmetric encryption is that it is slower than symmetric encryption because they require more computational processing power and which makes it impractical when trying to encrypt the confidential data. But here, small data is to be encrypted like SMS and system don’t want to send the shared secret key from one end to another of the peer entities, so bestmethod is to choose asymmetric encryption for the SMS. This scheme mainly uses digital signature schemes (i.e. DSA, and ECDSA) and public-key based cryptosystems (i.e. RSA and El-gamal). A modified version of RSA is proposed with OAEP (Optimal asymmetric encryption padding) which will provide more security to the algorithm. SHA-1 algorithm used as the message digest algorithm and encryption algorithms RSA and DES is used. SSMS - A Secure SMS 2 Messaging Protocol for the M-Payment Systems. A new Secure SMS messaging protocol (SSMS) is introduced. The Global Service for Mobile communications (GSM) using no of mobile users suffering high security problems. The traffic between the Mobile Station (MS) and the Base Transceiver Station (BTS) is optionally encrypted with a weak and broken stream cipher. The authentication is unilateral and also vulnerable. It is hardware related mechanism it uses mobile equipment and a crypto processor is embedded in the ME.it is very costly mechanism and security is very less. Dr V K Govidan et al. [4] on Secured Messaging Using Hybrid Compression Technique.In regular messaging system when SMS sends from A to B at that time until it receives to B it stored at SMS center,so it is visible to operator due to that message disclosure problem occurs. Again there is problem arises like memory wastage which hangs mobile phone. SMS technique does not verify whether messages come from trusted sender or not. The user does not authenticate network so that same mobile network get misused. Sometimes corrupted messages affect mobile phone badly. it uses RSA,Elgamal, Elliptical curve algorithms. In lossy technique data may be loss. Some of the main technique use is the Huffman Coding, Run Length Encoding, Arithmetic coding and Dictionary Based Encoding. Security is very less. Marko Hassinen et al. [5] provided application solution named “Safe SMS”, using java for achieving confidentiality, integrity and authentication in SMS without any additional hardware for ensuring message is not tempered and authenticates sender. Safe SMS has two methods for encrypting via quasi group and Blowfish authentication is the main problem during communication. S. H. Shah Newaz et al. [6] proposed scheme for the enhancement of SMS security system for GSM users. Thereby, incorporating digital signature over cipher which is converted so by existing encryption schemes is made compatible to GSM security infrastructure. Encryption can be done with the existing GSM encryption algorithm, called A8. Then the encrypted message will create hash and finally it will be digitally signed. Thus, signed encrypted message will be transmitted. Mary Agoyi et al. [7] evaluated encryption and decryption time for three algorithms RSA, Elliptic curve and ElGamal to which plain text of different sizes is provided based on results one is chosen for further encryption. Their performance evaluation in securing SMS shows that key generation, encryption and decryption time increases with an increase in key size.Large key size algorithms are not suitable for SMS encryption due to small memory and low computational power of mobile phones. Na Qi Jing Pan Qun Ding et al. [8] did improvements on RSA algorithm because the SMSC will filter out the characters which are out of prescribed limit, thus the cipher text can’t reach the destination., they also used FPGA based on high speed processing tools to implement the RSA algorithms and apply it in mobile phone short message encryption system. Ch. Rupa et al. [9] proposed accost effective scheme which uses a concept called Cheating Text. The original message is embedded in a meaningful text called cheating text. Here, index table called (Real Message Index File) RIF file is hashed and sent to the receiver along with the cheating text in which the original message is embedded. Authentication is achieved by verifying the hash value of the plain text. Rishav Ray et al. [10] proposed a scheme to encrypt messages using randomized data hiding algorithm to encrypt message using modified generalized Cipher Method. For encrypting secret message, a new algorithm called Modified Generalized Vernam Cipher Method (MGVCM) is used. For hiding this secret message, bits of each character of secret message are inserted in the LSB of eight randomly selected bytes of the cover file. The randomized embedding of message in a cover 3 file provides an additional layer of security over the encryption. Electronics [ICCEET] Hongbo Zhou et al. [11] proposed a scheme which uses threshold cryptography based Defense against Cyber Attacks (DCA) for MANET for solving problems of lower communication overhead. Invulnerability to mobile tolerance to missing or faulty server nodes, cryptography based DCA scheme. [2] Nor Badrul Anuar, Lai Ngan Kuen, Omar Zakaria, Abdullah Gani, Ainuddin Wahid Abdul Wahab “GSM Mobile SMS/MMS using Public Key Infrastructure: m-PKI” WSEAS TRANSACTIONS on COMPUTERS David Lisoněk et al.[12] proposed an algorithm to send message through GSM using an asymmetric Rivest, Shamir and Adleman (RSA) cipher. This application prevents tapping and substituting techniques to secure SMS. It is achieved by storing the public key in a certificate which can be signed by the certification authority security is the main issue here. 3. CONCLUSION CipherSMS protocol is successfully designed in order to provide end-to-end secure communication through SMS between mobile users. The transmission of symmetric key to the mobile users is efficiently managed by the protocol. This protocol produces lesser communication and computation overheads, utilizes bandwidth efficiently .A new symmetric key-based solution for secure SMS messaging. It is an application layer protocol that simultaneously provides the confidentiality, integrity authentication, of message confidentiality. It efficiently combines AES and digital MD5 Algorithms and uses it has great computational advantages over the previously proposed symmetic key solutions while simultaneously providing the most feasible security services. 4. REFERENCES [1] Prof. Rashmi Ramesh Chavan, Prof. Manoj Sabnees “Secured Mobile Messaging” 2012 International Conference on Computing, and Electrical Technologies [3] M. Toorani, A. Shirazi, “SSMS-A secure SMS messaging protocol for the m-payment systems,” IEEE ISCC, 2008, pp. 700–705. [4] Dr. V.K. Govindan & B.S. Shajee mohan “An intelligent text data encryption and compression for high speed and secure data transmission over internet”. [5] M. Hassinen, “Java based Public Key Infrastructure for SMS Messaging,” ICTTA, 2006, pp. 88-93. [6] S. H. Shah Newaz, A Proposal for Enhancing the Security System of Short Message Service in GSM, IEEE International Conference on Anti-counterfeiting Security and Identification, 2008, 235-240. [7] Mary Agoyi, Devrim Seral, "SMS security: an asymmetric encryption approach", IEEE-20 I 0, 978-0-7695-4 182-211 0 University Science, 1989. [8] Na Qi Jing Pan Qun Ding, The Implementation of FPGA-based RSA PublicKey Algorithm and Its Application in MobilePhone SMS Encryption System, IEEE International Conference on Instrumentation, Measurement, Computer, Communication and Control, 2011, 700-703. [9] Ch. Rupa and P.S. Avadhani, Message Encryption Scheme Using Cheating Text, IEEE International Conference on Information Technology, 2009, 470-474. [10] Rishav Ray, Jeeyan Sanyal, Tripti Das, Kaushik Goswami, Sankar Das and Asoke Nath, A new Randomized Data Hiding Algorithm with Encrypted Secret Message using Modified Generalized Vernam Cipher Method: RAN-SEC algorithm, IEEE 4 Information and Communication Technologies World Congress, 2011, 1211-1216. [11] Hongbo Zhou, Mutka and Lionel M. Ni, Multiple-key Cryptography-based Distributed Certificate Authority in Mobile Ad-hoc Networks, IEEE proceedings of GLOBECOM, 2005, 1681-1685. [12] David Lisoněk and Martin Drahanský, SMS Encryption for Mobile Communication, IEEE International Conference on Security Technology, 2008, 198 – 2011 [15]P. Mondal, P. Desai, S. Ghosh, “An Efficient SMS-Based Framework for Public Health Surveillance,” IEEE PHT, 2013, pp. 244-247. [16]Chong Hee Kim.(2012,Feb.)Improved Differential Fault Analysis on AES Key Schedule. IEEE Trans .on IFS,7(1), pp.41-50. [17] D. Altman, D. Machin, T. Bryant. (2000). Statistics with Confidence Intervals and StatisticalGuidelines.BMJ Books,254 pages. [13] P. Traynor, W. Enck, P. McDaniel, T. Porta. (2009). Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks. IEEE/ACM Tran. On Network.17 (1), pp. 40-53. [14]S.Wu.C.Tan, “A High Security Frame Work For SMS”BMEI, 2009, pp. 1-6. [18]P. H. Kuaté, J. L. Lo and J. Bishop, ―Secure asynchronous communication for mobile devices‖, Proceedings of the Warm Up Workshop for ACM/IEEE ICSE 2010,Cape Town, South Africa.2009, pp .5-6. [19] Mary Agoyi, Devrim Seral, “SMS Security: An Asymetric Encryption Approach”, Sixth International Conference on Wireless and Mobile Communications,2010@IEEE,pp 448452. [20] Asim Mukherjee , “ Transport security using Mobile Technology “,ISN 2008, june 17-18 2008,Taipie Taiwan 2008@IEEE,pp 275276. 5