XTR Cryptosystem for SMS Security

XTR Cryptosystem for SMS Security

IACSIT International Journal of Engineering and Technology, Vol. 4, No. 6, December 2012 XTR Cryptosystem for SMS Security Ashok Kumar Nanda, Member, IACSIT and Lalit Kumar Awasthi, Member, IACSIT are: i) SMS is a personal like phone call but a person can read Abstract—Short message service (SMS) is getting more at any time without any disturbance to the work ii) Messages popular now-a-days. It will play a very important role in the are instantly recorded so that one can refer at any time iii) It is future business areas which will be based on mobile commerce relatively less SPAM free iv) SMS is discreet in nature v) (M-Commerce). Presently, many business organizations use SMS bills are considered as negligible vi) SMS is more SMS for their business purposes. SMS’s security has become a major concern for business organizations and customers. There convenient for deaf and hearing-impaired people to is a need for an end to end SMS Encryption in order to provide communicate vii) SMS is a store-and-forward service viii) a secure medium for communication. Security is main concern SMS doesn't overload the network as much as phone calls ix) for any business company such as banks who will provide these It is possible to send SMS many people at a time x) easy to mobile banking services. Till now there is no such scheme that use xi) common messaging tool among consumers xii) works provides complete SMSs security. The transmission of an SMS across all wireless operators xiii) no specific software in GSM network is not secure at all. Therefore, it is desirable to secure SMS for business purposes by additional encryption. In required to installation. The disadvantages of SMS are: i) this paper, we have analyzed different cryptosystems for Consumes more time to type as compared to phone call ii) No implementing security for SMS’s. Here, we have given a proper authentication of SMS sender iii) Length of SMS is proposal to incorporate XTR cryptosystem and XTR – NR maximum 140 - 160 characters iv) Reliability and versatility message recovery signature scheme into existing SEESMS can be compromised when using SMS v) does not support frames. We have plan to implement XTR cryptosystem with sending media, including videos, pictures, melodies or XTR – NR message recovery signature scheme. So this enhanced scheme will increase the current security level and animations vi) does not offer a secure environment for fastest speed with respect to key generation, encryption confidential data during transmission. The same table decryption with small key size. indicates that few people of United States, EU5 (UK, Germany, France, Spain and Italy) and Japan access financial Index Terms—Performance analysis, SMS security, XTR services such as bank account information and financial news cryptosystem, XTR – NR message recovery signature scheme. or stock quotes using SMS because SMS are not fully secure in wireless environment due to its broadcast nature. I. INTRODUCTION SMS stands for Short Message Service. In 1992, the first SMS Traffic (In Billion) SMS technology enables the sending and receiving of 12000 messages between mobile phones. SMS message contains at 10000 most 140 bytes (1120 bits) of data, so one SMS message can 8000 contain up to 160 characters (if 7-bit character encoding is used) and 70 characters (if 16-bit Unicode UCS2 character 6000 encoding is used). SMS provides a convenient means for 4000 people to communicate with each other using text messages 2000 via mobile devices or Internet connected computers. It is 0 possible to send ringtones, pictures, operator logos, wallpapers, animations, business cards and WAP configurations to a mobile phone with SMS messages. One Source: Portio Research Ltd. major advantage of SMS is that it is supported by 100% GSM Fig. 1. Growth of SMS – world from 2000 to 2015F (F stands for forecast). mobile phones. Almost all subscription plans provided by wireless carriers include inexpensive SMS messaging service. TABLE I: MOBILE BEHAVIOR IN UNITED STATES, EU5 (UK, GERMANY, FRANCE, SPAIN AND ITALY) AND JAPAN – OCTOBER, NOVEMBER, The mobile messaging market is growing rapidly and is a DECEMBER 2010 PERCENT OF TOTAL MOBILE AUDIENCE (AGE 13+) very profitable business for mobile operators. It can be seen US Europe Japan from Figure I that the total number of SMS sent globally as Used Messaging exponential curve during 2000 to 2015F. Sent Text Message 68% 82.7% 41.6% As per Table I, Many people of United States, EU5 (UK, Instant Messaging 17.2% 14.2% 3.6% Germany, France, Spain and Italy) and Japan prefer Accessed Financial Services information exchange as text message (SMS) as compared to Bank Accounts 11.4% 8% 7% instant message by mobiles. The major advantages of SMS Financial news or stock quotes 10.2% 8% 16.5% Source: comScore MobiLens (Feb 2011) Manuscript received June 26, 2012; revised July 20, 2012. SMS is getting more popular now-a-days. It will play a The authors are with the Computer Science and Engineering Department very important role in the future business areas of mobile at National Institute of Technology, Hamirpur, Himachal Pradesh, India (e-mail: [email protected], [email protected]). commerce (M - Commerce) and mobile banking (M - DOI: 10.7763/IJET.2012.V4.495 836 IACSIT International Journal of Engineering and Technology, Vol. 4, No. 6, December 2012 Banking). Up to now many business organizations use SMS There are many incidents of rogue operators gaining for their business purposes. SMS’s security has become a unauthorized access to the SS7 networks of major service major concern for business organizations and customers. providers and routing millions of text messages into those There is a need for an end to end SMS Encryption in order to networks. Therefore it does congestion and blocking other provide a secure medium for communication. Security is genuine SMSs. So it may delay or may not reach to recipients. main concern for any business company such as banks who Quite often they are attempts at delivering massive volumes will provide these mobile banking services. Currently there is of spam into the network. Service providers often end up no such scheme that provides complete SMSs security. building new facilities to deal with the increase in messaging Presently researchers proposed some security concepts traffic - with no corresponding increase in revenue. Spoofing regarding SMS security. Most of the proposals are software is great opportunity for fraud - coaxing users into providing frames to be installed on mobile device and /or on the SIM sensitive personal data, which results in a financial windfall cards to implement security. for the bad guy. In fact, there have been reports of spoofing This paper proposed some idea regarding to exchange cases where messages are sent disguised as official SMS in secure manner at peers’ level. It requires a software government announcements for emergencies. framework to certify the signature of mobile of both sender & Current trends in mobile devices are raising the probability receiver. Here users are allowed to choose cryptosystems of attack. Devices have much more functionality than they and security parameters for transmitting secure message to used to – they have become small computers. achieve better cost and efficiency of the operation with low Currently users expect high level of security while doing memory space and energy consumption. mobile transactions. Some familiar problems are mentioned Rest of paper is organized as follows. Section II provides here for popular M-Commerce: data confidentiality while about related work of SEESMS. Section III describes about transmitting, data and application access must be controlled, SMS Security. Section IV presents regarding SMS data integrity, loss of device must have limited impact, and encryption. Section V discuss XTR algorithm. Section VI is non repudiations. When SMS used for M-Commerce the discussed the comparison of different traditional following services are required [2]: Confidentiality: only the cryptosystem with XTR. Section VII represents valid communicating users can view the SMS. Integrity: the XTR-NYBERG-RUEPPEL (XTR – NR) message recovery SMS can’t be tampered by the intruders. The system should SIGNATURE scheme and followed by discussion with be able to find out such alteration. Non-repudiation: no party future work. can deny the receiving or transmitting the data communicating between them. Authentication: each party has to have the ability to authenticate the other party. II. RELATED WORK Authorization: it has to be ensured that, a party performing Particularly about Secure Extensible and Efficient SMS the transaction is entitled to perform that transaction or not. (SEESMS), the proposal presented by Alfredo De Santis and We realized that security is most essential for mobile users his team members [1] which designed a Java based and network operators to avoid different threats at different framework for exchanging secure SMS. They considered levels. The transmission of an SMS in GSM network is not RSA, DSA and ECDSA algorithms. Here we have secure at all. Therefore it is desirable to secure SMS for considered the same SEESMS frame with Elgamal and XTR business purposes by additional encryption. cryptosystems for SMS security purpose. IV. SMS ENCRYPTION III. SMS SECURITY SMS encryption is the process of transforming SMS Now-a-days, SMS is used for M-Commerce purpose. SMS information using an algorithm to make it unreadable to will play a very vital role in the future banking or commercial purpose because of its simplicity and cheapness. Upcoming anyone except those possessing special knowledge, usually payment system will be based on the mobile device by using referred to as a key. The result of the process is encrypted SMS. Money can be debited or credited from the bank information. Encryption is also used to protect data in transit, through the SMS by using the GSM network.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    4 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us