Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4770
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:26Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:26Z-
dc.date.issued2012-
dc.identifier.citationSaxena, N., Chaudhari, N. S., & Prajapati, G. L. (2012). An extended approach for SMS security using authentication functions. Paper presented at the Proceedings of the 2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012, 663-668. doi:10.1109/ICIEA.2012.6360809en_US
dc.identifier.isbn9781457721175-
dc.identifier.otherEID(2-s2.0-84871678921)-
dc.identifier.urihttps://doi.org/10.1109/ICIEA.2012.6360809-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4770-
dc.description.abstractNowadays, security of SMS is a crucial aspect because it plays an important role in value added services and mobile commerce. Asymmetric algorithm like Diffie-Hellman can be used to encrypt the SMS message in M-commerce or mobile banking system. We use authentication functions to maintain the integrity of data. Password key exchange protocol based on Diffie-Hellman algorithm generates a secret shared key which can be used in message encryption and in MAC function. MAC (message authentication code) or hash functions are used maintain the integrity of message and can be used with the encryption. These functions also act as an error detecting code or checksum. This paper discusses the comparative analysis of both the authentication functions separately for password key exchange protocol by analyzing some of the security issues. The discussion of this paper concludes that MAC functions are more secure than hash function, but having greater complexity and take more to execute. So, it's better to use hash function for maintaining the integrity of message over a network where the transmitted amount of message is very small (SMS). Here, digital signature is generated with RSA to show the functionality of MD5 and SHA1, which prevents SMS from message modification and non-repudiation attack. © 2012 IEEE.en_US
dc.language.isoenen_US
dc.sourceProceedings of the 2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012en_US
dc.subjectAsymmetric algorithmsen_US
dc.subjectAuthentication functionsen_US
dc.subjectChecksumen_US
dc.subjectComparative analysisen_US
dc.subjectDiffie Hellmanen_US
dc.subjectError detecting codesen_US
dc.subjectKey exchange protocolsen_US
dc.subjectM-commerceen_US
dc.subjectMessage authentication codesen_US
dc.subjectMessage encryptionen_US
dc.subjectMobile bankingsen_US
dc.subjectMobile Commerceen_US
dc.subjectNon-repudiationen_US
dc.subjectSecurity issuesen_US
dc.subjectSMS messagesen_US
dc.subjectSMS securityen_US
dc.subjectValue added serviceen_US
dc.subjectGlobal system for mobile communicationsen_US
dc.subjectHash functionsen_US
dc.subjectIndustrial electronicsen_US
dc.subjectPublic key cryptographyen_US
dc.subjectAuthenticationen_US
dc.titleAn extended approach for SMS security using authentication functionsen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: