Academia.eduAcademia.edu

Outline

A security mechanism for secure SMS communication

2004, Proceedings of SAICSIT

Abstract

Short Message Service (SMS) has grown in popularity over the years and it has become a common way of communication. SMS is usually used to transport unclassified information, but with the rise of mobile commerce it has become a popular tool for transmitting sensitive information between the business and its clients. By default SMS does not guarantee confidentiality and integrity to the message content. Therefore SMS is not totally secure and reliable. This affects the Wireless Messaging API (WMA)-an optional package for Java 2 Micro Edition that enables SMS messaging on Java-enabled cellular phones. This paper proposes a protocol that can be used to secure a SMS connection between a WMA client and SMS-based server.

References (14)

  1. REFERENCES
  2. BROWN, I., CAJEE , Z., DAVIES, D., AND STROEBEL, S. 2003. Cell phone banking: predictors of adoption in South Africa -an exploratory study. International Journal of Information Management, volume 23, issue 5, 381 -394.
  3. CLEMENTS, T. 2003. SMS -Short but Sweet. Sun Microsystems: http://developers.sun.com/techtopics/mobility/midp/articles/sms/ HAMMONDS, M. B. 2003. Spam -the meat of the problem. Computer Law & Security Report vol 19, issue 5, 388 -391.
  4. ITANI, W., AND KAYSSI, A. 2004. J2ME application-layer end -to-security for m-commerce. Journal of Network and Computer Applications. Volume 27, issue 1, 13 -32.
  5. LO, J., AND BISHOP, J. 2003. Component-based Interchangable Cryptographic Architecture for Securing Wireless Connectivity in Java Applications. Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists, Johannesburg, South Africa, 301 -307
  6. LAM, K.Y, CHUNG, S., GU, M., AND SUN, J. 2003. Lightweight security for mobile commerce transactions. Computer Communications 26, 2052 - 2060.
  7. LAM, K.Y., GOLMANN, D. 1992. Freshness assurance of authentication protocols. Proceedings of the second European Symposium on Research in Computer Science, Toulouse, France, LNCS 648.
  8. LAM, K.Y. 1995. Replay tolerance of authentication protocols. Journal of computer communications, volume 18, issue 12, 988-992.
  9. LORD, S. 2003. Trouble at Telco: When GSM Goes Bad. Network Security, issue 1, 10 -12.
  10. NOKIA FORUM. 2003. A Brief Introduction to Secure SMS Messaging in MIDP. http://www.forum.nokia.com/seap/Developing_MIDP_ChiamPohGuan.pdf
  11. ORTIZ, E. 2002. The wireless Messaging API. Sun Microsystems: http://developers.sun.com/techtopics/mobility/midp/articles/wma/index.html OTTO, K., AND VIRTANEN, T. 2004. MIDP 2.0 Security Enhancements. IEEE international conference on System Sciences. Big Island, Hawaii, January 2004, HI, 287 -294.
  12. PEERSMAN, C., CVETKOVIC, S., GRIFFITHS, P., AND SPEAR, H. 2000. The Global System for Mobile Communications Short Message Service. IEEE Personal Communications. volume 7, issue 3, 15 -23.
  13. SUN MICROSYSTEMS. 2002. The WMA Specification. http://java.sun.com/products/wma/
  14. YUAN, M.J. 2002, Access SMS using the Wireless Messaging API and other packages. http://www-06.ibm.com/developerworks/wireless/library/wi- p2pmsg/