1. - Academic Science

advertisement
End To End Secure Sms Communication: A
Literature Survey
Nimmya Unnikrishnan
PG scholar
Vidya academy of science and
technology
Thrissur
Divya KV
Asst. Professor
Vidya academy of science and
technology
Thrissur
nimmyaunnikrishnan@gmail.co
m
divyakv@vidyaacademy.ac.in
ABSTRACT
Cipher-SMS protocol is successfully designed
in order to provide end-to-end secure
communication through SMS between mobile
users by using AES and MD5 encryption.
SMS is the most popular data service. Sms
technology is used in security sensitive fields
such as e-banking and e-government. SMS is
transmitted in the form of plaintext between
mobile user (MS) and the SMS center. SMS
contents are stored in the systems of network
operators and can be read by their personnel.
Sms does not offer a secure environment for
confidential data during transmission. The
above requirements can be accomplished by
proposing a protocol called Cipher-SMS
which provides end-to-end security during the
transmission of SMS over the network.
Keywords
Authentication Server, Symmetric Key,
Short Message Service, encryption.
1.
2. INTRODUCTION
Short Message Service (SMS) has become one
of the fastest and strong communication
channels to transmit the information across the
Worldwide. SMS is the most popular mobile
data service.Due to its wide popularity SMS
technology is used in various field
applications. This also include security
sensitive fields such as e-bnking and egovernment.Messages are transmitted as
plaintext between mobile user (MS) and the
SMS center (SMSC), using wireless network.
SMS contents are stored in the systems of
network operators and can be read by their
personnel.SMS is sent as plaintext;
unfortunately sms does not offer an secure
environment for confidential data during
transmission. So the traditional SMS service
offered by various mobile operators
surprisingly does not provide information
security it is strongly required to provide endto-end secure communication between end
users. Security to the SMS is the main
problem .Presently there is no scheme that
provide complete sms security. The above
requirements can be accomplished by
proposing a protocol called Cipher-SMS
which provides end-to-end security during the
transmission of SMS over the network. The
Cipher-SMS protocol achieved by using
cryptographic algorithms of AES and MD5,
The Cipher-SMS protocol prevents the SMS
information from various attacks. Proposed
SMS based framework provides efficient and
more secure solution for SMS Transmission.
Cipher-SMS is the first protocol completely
based on the symmetric key cryptography of
1
AES and hash cryptography of MD5 for
cellular network.
factorization, finite field discrete logarithm
and Elliptic curve discrete logarithm.
1.1 Existing system
Nor Bdarul Anuar et al. [2] proposed a Mobile
messaging using Public Key Infrastructure: mPKI.Uses Diffie and Martin Hellman publickey cryptography. Consists of two keys, which
known as public key and private key, used in
the message encryption. The key pairs are
generated by using the asymmetric
cryptography algorithm and kept secretly.
These early cryptography does not request the
authentication from the sender. most of the
mobile PKI solution has problem on managing
the key distribution. There is the possibility of
losing the private key to the public when
phone is lost.
EasySMS which provides end-to-end secure
communication through SMS between end
users. EasySMS is executed which makes
available the symmetric shared key between
both MS and then ciphering of message takes
place using a symmetric key algorithm. The
working of the protocol is presented by
considering two different scenarios are
SMSSec and PK-SIM protocols.
SMSSec protocol can be used to secure an
SMS communication sent by Java’s Wireless
Messaging API while the PK-SIM protocol
proposes a standard SIM card with additional
PKI functionality.
In EasySMS protocol, a cryptographic
encryption
algorithm
AES/MAES
is
maintained
to
provide
end-to-end
confidentiality to the transmitted SMS in the
network.
2. RELATED WORK
2.1 Short Message Service works
Prof. Rashmi Ramesh chavan. et al. [1]
{Secured Mobile Messaging}.Provide hybrid
compression encryption technique. The
proposed techniques encrypt the SMS in the
form of Elliptic curve encryption technique.
The network architecture of short message
service in GSM .This architecture, the short
message is first delivered from the mobile
station (MS) to a short message service center
(SM-SC) through the base station system
(BSS), the mobile switching center (MSC),
and then the interworking MSC (IWMSC).
The SM-SC then forwards the message to the
GSM network through a specific GSMMSC
called the short message service gateway MSC
(SMS GMSC). The SM-SC may connect to
several GSM networks and to several SMS
GMSCs in a GSM network. The security of
asymmetric cryptosystems is a hard
mathematical problem, such as integer
Mohsen Toorani et al.[3] provided the
introduction of new Secure SMS Messaging
Protocol (SSMS) for the Mobile banking. It
being an application layer protocol is intended
for GSM users as a secure bearer in the mobile
bnking. It uses elliptic curve based public key
solution which uses public key as secret key
for symmetric encryption. So it uses different
keys for encryption and Decryption so security
is very less and overhead is very high.
Proposed an Enhancing Security System of
Short Message Service for M-Commerce in
GSM. Uses asymmetric encryption. The issue
with asymmetric encryption is that it is slower
than symmetric encryption because they
require more computational processing power
and which makes it impractical when trying to
encrypt the confidential data. But here, small
data is to be encrypted like SMS and system
don’t want to send the shared secret key from
one end to another of the peer entities, so
bestmethod is to choose asymmetric
encryption for the SMS. This scheme mainly
uses digital signature schemes (i.e. DSA, and
ECDSA) and public-key based cryptosystems
(i.e. RSA and El-gamal). A modified version
of RSA is proposed with OAEP (Optimal
asymmetric encryption padding) which will
provide more security to the algorithm. SHA-1
algorithm used as the message digest
algorithm and encryption algorithms RSA and
DES is used. SSMS - A Secure SMS
2
Messaging Protocol for the M-Payment
Systems. A new Secure SMS messaging
protocol (SSMS) is introduced. The Global
Service for Mobile communications (GSM)
using no of mobile users suffering high
security problems. The traffic between the
Mobile Station (MS) and the Base Transceiver
Station (BTS) is optionally encrypted with a
weak and broken stream cipher. The
authentication is unilateral and also
vulnerable. It is hardware related mechanism it
uses mobile equipment and a crypto processor
is embedded in the ME.it is very costly
mechanism and security is very less.
Dr V K Govidan et al. [4] on Secured
Messaging Using Hybrid Compression
Technique.In regular messaging system when
SMS sends from A to B at that time until it
receives to B it stored at SMS center,so it is
visible to operator due to that message
disclosure problem occurs. Again there is
problem arises like memory wastage which
hangs mobile phone. SMS technique does not
verify whether messages come from trusted
sender or not. The user does not authenticate
network so that same mobile network get
misused. Sometimes corrupted messages
affect mobile phone badly. it uses
RSA,Elgamal, Elliptical curve algorithms. In
lossy technique data may be loss. Some of the
main technique use is the Huffman Coding,
Run Length Encoding, Arithmetic coding and
Dictionary Based Encoding. Security is very
less.
Marko Hassinen et al. [5] provided application
solution named “Safe SMS”, using java for
achieving confidentiality, integrity and
authentication in SMS without any additional
hardware for ensuring message is not
tempered and authenticates sender. Safe SMS
has two methods for encrypting via quasi
group and Blowfish authentication is the main
problem during communication.
S. H. Shah Newaz et al. [6] proposed scheme
for the enhancement of SMS security system
for GSM users. Thereby, incorporating digital
signature over cipher which is converted so by
existing encryption schemes is made
compatible to GSM security infrastructure.
Encryption can be done with the existing GSM
encryption algorithm, called A8. Then the
encrypted message will create hash and finally
it will be digitally signed. Thus, signed
encrypted message will be transmitted.
Mary Agoyi et al. [7] evaluated encryption
and decryption time for three algorithms RSA,
Elliptic curve and ElGamal to which plain text
of different sizes is provided based on results
one is chosen for further encryption. Their
performance evaluation in securing SMS
shows that key generation, encryption and
decryption time increases with an increase in
key size.Large key size algorithms are not
suitable for SMS encryption due to small
memory and low computational power of
mobile phones.
Na Qi Jing Pan Qun Ding et al. [8] did
improvements on RSA algorithm because the
SMSC will filter out the characters which are
out of prescribed limit, thus the cipher text
can’t reach the destination., they also used
FPGA based on high speed processing tools to
implement the RSA algorithms and apply it in
mobile phone short message encryption
system.
Ch. Rupa et al. [9] proposed accost effective
scheme which uses a concept called Cheating
Text. The original message is embedded in a
meaningful text called cheating text. Here,
index table called (Real Message Index File)
RIF file is hashed and sent to the receiver
along with the cheating text in which the
original message is embedded. Authentication
is achieved by verifying the hash value of the
plain text.
Rishav Ray et al. [10] proposed a scheme to
encrypt messages using randomized data
hiding algorithm to encrypt message using
modified generalized Cipher Method. For
encrypting secret message, a new algorithm
called Modified Generalized Vernam Cipher
Method (MGVCM) is used. For hiding this
secret message, bits of each character of secret
message are inserted in the LSB of eight
randomly selected bytes of the cover file. The
randomized embedding of message in a cover
3
file provides an additional layer of security
over the encryption.
Electronics
[ICCEET]
Hongbo Zhou et al. [11] proposed a scheme
which uses threshold cryptography based
Defense against Cyber Attacks (DCA) for
MANET for solving problems of lower
communication overhead. Invulnerability to
mobile tolerance to missing or faulty server
nodes, cryptography based DCA scheme.
[2] Nor Badrul Anuar, Lai Ngan Kuen, Omar
Zakaria, Abdullah Gani, Ainuddin Wahid
Abdul Wahab “GSM Mobile SMS/MMS
using Public Key Infrastructure: m-PKI”
WSEAS TRANSACTIONS on COMPUTERS
David Lisoněk et al.[12] proposed an
algorithm to send message through GSM
using an asymmetric Rivest, Shamir and
Adleman (RSA) cipher. This application
prevents tapping and substituting techniques to
secure SMS. It is achieved by storing the
public key in a certificate which can be signed
by the certification authority security is the
main issue here.
3. CONCLUSION
CipherSMS protocol is successfully designed
in order to provide end-to-end secure
communication through SMS between mobile
users. The transmission of symmetric key to
the mobile users is efficiently managed by the
protocol. This protocol produces lesser
communication and computation overheads,
utilizes bandwidth efficiently .A new
symmetric key-based solution for secure SMS
messaging. It is an application layer protocol
that
simultaneously
provides
the
confidentiality, integrity authentication, of
message confidentiality. It efficiently combines
AES and digital MD5 Algorithms and uses it
has great computational advantages over the
previously proposed symmetic key solutions
while simultaneously providing the most
feasible security services.
4. REFERENCES
[1] Prof. Rashmi Ramesh Chavan, Prof. Manoj
Sabnees “Secured Mobile Messaging” 2012
International Conference on Computing,
and
Electrical
Technologies
[3] M. Toorani, A. Shirazi, “SSMS-A secure
SMS messaging protocol for the m-payment
systems,” IEEE ISCC, 2008, pp. 700–705.
[4] Dr. V.K. Govindan & B.S. Shajee mohan
“An intelligent text data encryption and
compression for high speed and secure data
transmission over internet”.
[5] M. Hassinen, “Java based Public Key
Infrastructure for SMS Messaging,” ICTTA,
2006, pp. 88-93.
[6] S. H. Shah Newaz, A Proposal for
Enhancing the Security System of Short
Message Service in GSM, IEEE International
Conference on Anti-counterfeiting Security
and Identification, 2008, 235-240.
[7] Mary Agoyi, Devrim Seral, "SMS security:
an asymmetric encryption approach", IEEE-20
I 0, 978-0-7695-4 182-211 0 University
Science, 1989.
[8] Na Qi Jing Pan Qun Ding, The
Implementation of FPGA-based RSA PublicKey Algorithm and Its Application in MobilePhone SMS Encryption System, IEEE
International Conference on Instrumentation,
Measurement, Computer, Communication and
Control, 2011, 700-703.
[9] Ch. Rupa and P.S. Avadhani, Message
Encryption Scheme Using Cheating Text,
IEEE International Conference on Information
Technology, 2009, 470-474.
[10] Rishav Ray, Jeeyan Sanyal, Tripti Das,
Kaushik Goswami, Sankar Das and Asoke
Nath, A new Randomized Data Hiding
Algorithm with Encrypted Secret Message
using Modified Generalized Vernam Cipher
Method:
RAN-SEC
algorithm,
IEEE
4
Information and Communication Technologies
World Congress, 2011, 1211-1216.
[11] Hongbo Zhou, Mutka and Lionel M. Ni,
Multiple-key Cryptography-based Distributed
Certificate Authority in Mobile Ad-hoc
Networks,
IEEE
proceedings
of
GLOBECOM, 2005, 1681-1685.
[12] David Lisoněk and Martin Drahanský,
SMS Encryption for Mobile Communication,
IEEE International Conference on Security
Technology, 2008, 198 – 2011
[15]P. Mondal, P. Desai, S. Ghosh, “An
Efficient SMS-Based Framework for Public
Health Surveillance,” IEEE PHT, 2013, pp.
244-247.
[16]Chong Hee Kim.(2012,Feb.)Improved
Differential Fault Analysis on AES Key
Schedule. IEEE Trans .on IFS,7(1), pp.41-50.
[17] D. Altman, D. Machin, T. Bryant. (2000).
Statistics with Confidence Intervals and
StatisticalGuidelines.BMJ Books,254 pages.
[13] P. Traynor, W. Enck, P. McDaniel, T.
Porta. (2009). Mitigating Attacks on Open
Functionality in SMS-Capable Cellular
Networks. IEEE/ACM Tran. On Network.17
(1), pp. 40-53.
[14]S.Wu.C.Tan, “A High Security Frame
Work For SMS”BMEI, 2009, pp. 1-6.
[18]P. H. Kuaté, J. L. Lo and J. Bishop,
―Secure asynchronous communication for
mobile devices‖, Proceedings of the Warm Up
Workshop for ACM/IEEE ICSE 2010,Cape
Town, South Africa.2009, pp .5-6.
[19] Mary Agoyi, Devrim Seral, “SMS Security:
An Asymetric Encryption Approach”, Sixth
International Conference on Wireless and
Mobile Communications,2010@IEEE,pp 448452.
[20] Asim Mukherjee , “ Transport security
using Mobile Technology “,ISN 2008, june
17-18 2008,Taipie Taiwan 2008@IEEE,pp 275276.
5
Download