Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30121
Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, mobile communication.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1124813

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 686

References:


[1] William Stalling, “Network Security Essentials (Applications and Standards)”, Pearson Education, 2004.
[2] Andrew S. Tanenbaum and David J. Wetherall, Computer Networks, 5th ed, Prentice Hall, New York, 2011.
[3] Anupama Mishra, “Enhancing Security of Caesar Cipher Using Different Methods”, International Journal of Research in Engineering and Technology, Vol. 02, Issue. 09, pp: 327-332. Sep 2013.
[4] Simon Singh, The Code Book, DELACORTE PRESS, New York, 2001.
[5] Md. Khalid Imam Rahmani1, Neeta Wadhwa1 and Vaibhav Malhotra “Alpha-Qwerty Cipher: An Extended Vigenère Cipher”, Advanced Computing: An International Journal (ACIJ), Vol.3, No.3, May 2012.
[6] William Stalling, Network Security Essentials (Applications and Standards), Pearson Education, 2004.
[7] Stallings. W, Cryptography and Network Security, 2nd edition, Prentice Hall, 1999.
[8] H. Feistel, “Cryptography and computer privacy,” Scientific American, vol. 228, pp. 15-23, 1973.
[9] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL. 1997.